SlideShare a Scribd company logo
The journey to
ICS
Disclaimer
I am employed in the Infosec industry
but not authorised to speak on behalf of my
employer or clients.
Everything I say is from a personal point of
view.
About me
@lvandenaweele
- Security consultant at PwC Belgium
- +5 years information security
- +2 years within Industrial Security
- Travel, food, beer
..not an expert yet, but eager to learn.
Special thanks to
@chrissistrunk
- Proving Ground Mentor
About this talk..
Where can you find Operational Technology
And much more..
What are the risks?
- Human Safety
- Human Safety
- Environmental effects
What are the risks?
- Human Safety
- Environmental effects
- Material damage
What are the risks?
- Human Safety
- Environmental effects
- Material damage
- High Impact events
- Etc
What are the risks?
OT Clichés
- Built to last for decades
- Uses specific means of communication
- Availability is key, above security
- At some point, human interaction
(e.g. operators watching the grid)
Operational Technology [OT]
Operational
Technology
Industrial
Control
Systems [ICS]
Network
Other
components
(apps,
systems)
Some Vocabulary
- PCS - Process Control System
- BMS - Building Management System
- EMS - Energy Management System
- DMS - Distribution Management System
- DCS - Distributed Control System
- SCADA - Supervisory Control and Data Acquisition
- PLC - Programmable Logic Controller
- MTU - Master Terminal Unit
- HMI - Human Machine Interface
- WAN – Wide Area Network
- LAN – Local Area Network
- MAN – Metropolian Area Network
- FAN – Field Area Network
- PAN – Personal Area Network
Some Vocabulary
Industrial Control Systems
DCS vs SCADA
IT vs OT
IT Systems OT Systems
Data Confidentiality Low - High Low - Moderate
Data Integrity Low - Moderate Very High
Availability Low - Moderate Very High (99.9999% uptime common)
Time Criticality Delays tolerated Critical
Patching Frequent Infrequent to nearly impossible
System Life Cycle 3 - 5 years 10 - 30+ years
Security Standards ISO 27002, COBIT, NIST, etc. IEC 62443, CIP, NEI, IEEE 1686, etc.
Operating Systems COTS COTS, RTOS, Embedded OS (Firmware)
Interoperability Not critical Critical (security often not considered)
Communication Protocols TCP/IP primarily HART, DNP3, Mod/FieldBus, ICCP, TCP/IP,
etc.
Communication Topology LAN/WAN, Telco, etc. LAN/WAN, Telco, Satellite, Serial, MWave, etc.
What’s all inside?
Business Zone
DMZ
Operations Zone
Process Control Zone
Safety Zone
Enforcement Zone
Enforcement Zone
Industrial Switch Industrial FirewallData Diode
ICS Aware Routers
Safety Zone
Safety Valve Safety PLC
Safety Gear
Process Control Zone
Sensors Motors Actuators Instrumentation
PLC s
Dedicated Control
Operator
Workstation
Control Processes RTU s
Data Historians
Engineering
Workstations
Communication front
ends
Level 0
Process Control
Network
Level 1
Control Devices
Level 2
Supervisory Control LAN
ProcessControlZone
Process Control Zone
Level 0 – Process Control Network
Sensors Motors Actuators Instrumentation
Level 0
Process Control
Network
Valves IED - Intelligent Electronic
Device
Sensors
Process Control Zone
Level 1 – Control Devices
PLC s
Dedicated Control
Operator
Workstation
Control Processes RTU s
Level 1
Control Devices
PLC - Programmable Logic
Controller
RTU - Remote
Terminal Unit
Dedicated Operator
Workstation
Process Control Zone
Level 2 – Supervisory Control LAN
Data Historians
Engineering
Workstations
Communication front
ends
Level 2
Supervisory Control LAN
Data Historian
Control Room
HMI Panel
Operations Zone
Level 3 – Operations Support
Sensors Motors Actuators Instrumentation
PLC s
Dedicated Control
Operator
Workstation
Control Processes RTU s
Data Historians
Engineering
Workstations
Communication front
ends
Simulation &
modeling systems
Operations
Analysis Systems
Engineering
workstation
Test systems
Level 0
Process Control
Network
Level 1
Control Devices
Level 2
Supervisory Control LAN
Level 3
Operations Support
Enforcement zone
ProcessControlZone
OperationsZone
DMZ, Business Zone
Jump host
environment
Patch
Management
AV Server Application Server
Enforcement zone
Site directory
replicas
Local file servers
Site specific Remote
Access
Corporate internet, e-mail, public websites,etc
DMZ
Level 4
Plant Network
Level 5
Enterprise Business Network
DMZBusinessZone
Sensors Motors Actuators Instrumentation
PLC s
Dedicated Control
Operator
Workstation
Control Processes RTU s
Data Historians
Engineering
Workstations
Communication front
ends
Simulation &
modeling systems
Operations
Analysis Systems
Engineering
workstation
Test systems
Jump host
environment
Patch
Management
AV Server Application Server
Enforcement zone
Site directory
replicas
Local file servers
Site specific Remote
Access
Corporate internet, e-mail, public websites,etc
Level 0
Process Control
Network
Level 1
Control Devices
Level 2
Supervisory Control LAN
Level 3
Operations Support
DMZ
Level 4
Plant Network
Level 5
Enterprise Business Network
Enforcement zone
Enforcement zone
ProcessControlZone
OperationsZone
DMZBusinessZone
Source: https://isc.sans.edu/diaryimages/images/purdue.png
Network Architecture
The mystery of air gaps
What you think is in place
Source: ISBN-13: 978-1597496452
Network Architecture
The mystery of air gaps
But actually..
Source: ISBN-13: 978-1597496452
Network Architecture
Protocols
Raw Data Protocols
- HART / ModBus
- Reads data (measurements)
- Sends commands (start pumps)
- Clear text
- No authentication
High Level Data Protocols
- OPC / ICCP / MMS
- Sending data, commands
between databases/applications
- Creates human readable
information
- Likely to act like bridge between
corporate and control networks
Network Architecture
Protocols - ModBus TCP
- 502/TCP
- open protocol
- Master/Slave
- Simple request/response protocol
- Function codes
- No Security
Network Architecture
Protocols - OPC
- Object Linking and Embedding for Process Control
- First released in 1996
- 4840/TCP
- Open Standard
- Acts as a bridge between different application
- Often the link between corporate and control network
Attack Landscape
Source: https://ics-radar.shodan.io
Attack Landscape
Types of Attacks
- Denial of Service (DoS)
- Insecure Protocols
- Hardcoded Credentials
- Database Attacks
- Man-in-the-Middle Attacks
- Physical Attacks
- Rogue Modems
- Etc
Attack Landscape
Types of Attacks
Common Weaknesses
- Unpatched systems
Common Weaknesses
- Approved patches
This document contains <<REDACTED >>proprietary information. Information contained
herein is to be used solely for the purpose submitted, and no part of this document or its
contents shall be reproduced, published, or disclosed to a third party without the express
permission of <<REDACTED >>.
<<REDACTED >> DISCLAIMS THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PURPOSE AND MAKES NO EXPRESS WARRANTIES EXCEPT
AS MAY BE STATED IN ITS WRITTEN AGREEMENT WITH AND FOR ITS
CUSTOMER.
In no event is <<REDACTED >> liable to anyone for any direct, special, or consequential
damages. The information and specification in this document are subject to change
without notice.
(source: Publically available patch list on vendor website)
Common Weaknesses
- Poor authentication/authorisation
Common Weaknesses
- Ineffective physical security
Common Weaknesses
- Rogue Access Points
- Unnecessary software
- Harsh conditions
Common Weaknesses
- Limited use of host anti-virus
- Poor authentication/authorisation
- Little or no cyber security monitoring
- Requirement for 3rd party access
- Poor Audit and Logging
- Legacy equipment
- Unmanned field sites
- Harsh environments
- Etc
- Preferably in test environment or during FAT/SAT
(Things will break!)
- Know your toolbox
- Capture traffic across different levels
- Close communication with control center
Assessing Control Systems
So how can we protect ourselves
Industrial Control Systems
System Security
- Hardening
- Identity & Access Management
- Patch Management
- Malware detection & prevention
Network Security
- Security zoning & DMZs
- Firewalls & IPS
- VPN Access
Plant Security
- Physical Security
- Policies & procedures
- BCM & DRP
But first.. build a team
Operations, Security, Maintenance and IT
Have to work together to have a good
SCADA security team
Insight on current situation
- Create an Inventory
- Determine and verify current security levels
- Policies and Procedures
- Regulatory compliance
- Create awareness
- Talk to people
One step at a time
- Network Architecture changes
- Monitoring
- Authentication
- Responsabilities
- Compliance
Common pitfalls
- Compliance vs effectiveness
- Non-flexible approach
- Throwing money at the problem
- Lack of communication
Standards
- NERC CIP
- IEC 62443 (ISA99)
- IEEE 1686
- NIST SP800-82 rev 2
- Etc [link]
Questions

More Related Content

What's hot

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Digital Bond
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
Inc 15 Scada Cyber Security
Inc 15 Scada Cyber SecurityInc 15 Scada Cyber Security
Inc 15 Scada Cyber Security
BGA Cyber Security
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Priyanka Aash
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
Jim Gilsinn
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
Nozomi Networks
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
Avishek Priyadarshi
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale fun
Jan Seidl
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Snort IPS
Snort IPSSnort IPS
Snort IPS
Simone Tino
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 

What's hot (20)

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
Inc 15 Scada Cyber Security
Inc 15 Scada Cyber SecurityInc 15 Scada Cyber Security
Inc 15 Scada Cyber Security
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale fun
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Snort IPS
Snort IPSSnort IPS
Snort IPS
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 

Viewers also liked

Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
Digital Bond
 
I C S J W G San Antonio
I C S J W G  San  AntonioI C S J W G  San  Antonio
I C S J W G San Antonio
Digital Bond
 
Small business
Small businessSmall business
Small business
Alro Sumay
 
Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
Jim Fenton
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security Experts
James Arlen
 
Notacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsNotacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security Experts
James Arlen
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
Maurice Dawson
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
Derek Harp
 
Cyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control SystemsCyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control Systems
David Spinks
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
pgmaynard
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Ahmed Al Enizi
 
ICS security
ICS securityICS security
ICS security
Ahmed Shitta
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
Narinrit Prem-apiwathanokul
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
Ahmed Sherif
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
Digital Bond
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
Digital Bond
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
Aleksandr Timorin
 

Viewers also liked (20)

Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
I C S J W G San Antonio
I C S J W G  San  AntonioI C S J W G  San  Antonio
I C S J W G San Antonio
 
Small business
Small businessSmall business
Small business
 
Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security Experts
 
Notacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsNotacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security Experts
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
Cyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control SystemsCyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control Systems
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
ICS security
ICS securityICS security
ICS security
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 

Similar to The journey to ICS - Extended

CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
Day4
Day4Day4
Day4
Jai4uk
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
CrispnCrunch
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
matthew.maisel
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Felipe Prado
 
PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIsafe and IT security  - Peter Brown of Siemens A&DPROFIsafe and IT security  - Peter Brown of Siemens A&D
PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIBUS and PROFINET InternationaI - PI UK
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
sequi_inc
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
AVEVA
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
EnergySec
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
Charles Li
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
sequi_inc
 
architectures trim.pptx
architectures trim.pptxarchitectures trim.pptx
architectures trim.pptx
ssuserc945ac
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
Alan Tatourian
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
Matt Loong
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
Wavestone
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
Ben Rothke
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 

Similar to The journey to ICS - Extended (20)

CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Day4
Day4Day4
Day4
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics
 
PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIsafe and IT security  - Peter Brown of Siemens A&DPROFIsafe and IT security  - Peter Brown of Siemens A&D
PROFIsafe and IT security - Peter Brown of Siemens A&D
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
 
architectures trim.pptx
architectures trim.pptxarchitectures trim.pptx
architectures trim.pptx
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
New internet security
New internet securityNew internet security
New internet security
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

The journey to ICS - Extended

  • 2. Disclaimer I am employed in the Infosec industry but not authorised to speak on behalf of my employer or clients. Everything I say is from a personal point of view.
  • 3. About me @lvandenaweele - Security consultant at PwC Belgium - +5 years information security - +2 years within Industrial Security - Travel, food, beer ..not an expert yet, but eager to learn.
  • 4. Special thanks to @chrissistrunk - Proving Ground Mentor
  • 6. Where can you find Operational Technology And much more..
  • 7. What are the risks? - Human Safety
  • 8. - Human Safety - Environmental effects What are the risks?
  • 9. - Human Safety - Environmental effects - Material damage What are the risks?
  • 10. - Human Safety - Environmental effects - Material damage - High Impact events - Etc What are the risks?
  • 11. OT Clichés - Built to last for decades - Uses specific means of communication - Availability is key, above security - At some point, human interaction (e.g. operators watching the grid)
  • 13. Some Vocabulary - PCS - Process Control System - BMS - Building Management System - EMS - Energy Management System - DMS - Distribution Management System - DCS - Distributed Control System - SCADA - Supervisory Control and Data Acquisition - PLC - Programmable Logic Controller - MTU - Master Terminal Unit - HMI - Human Machine Interface
  • 14. - WAN – Wide Area Network - LAN – Local Area Network - MAN – Metropolian Area Network - FAN – Field Area Network - PAN – Personal Area Network Some Vocabulary
  • 16. IT vs OT IT Systems OT Systems Data Confidentiality Low - High Low - Moderate Data Integrity Low - Moderate Very High Availability Low - Moderate Very High (99.9999% uptime common) Time Criticality Delays tolerated Critical Patching Frequent Infrequent to nearly impossible System Life Cycle 3 - 5 years 10 - 30+ years Security Standards ISO 27002, COBIT, NIST, etc. IEC 62443, CIP, NEI, IEEE 1686, etc. Operating Systems COTS COTS, RTOS, Embedded OS (Firmware) Interoperability Not critical Critical (security often not considered) Communication Protocols TCP/IP primarily HART, DNP3, Mod/FieldBus, ICCP, TCP/IP, etc. Communication Topology LAN/WAN, Telco, etc. LAN/WAN, Telco, Satellite, Serial, MWave, etc.
  • 18. Business Zone DMZ Operations Zone Process Control Zone Safety Zone Enforcement Zone
  • 19. Enforcement Zone Industrial Switch Industrial FirewallData Diode ICS Aware Routers
  • 20. Safety Zone Safety Valve Safety PLC Safety Gear
  • 21. Process Control Zone Sensors Motors Actuators Instrumentation PLC s Dedicated Control Operator Workstation Control Processes RTU s Data Historians Engineering Workstations Communication front ends Level 0 Process Control Network Level 1 Control Devices Level 2 Supervisory Control LAN ProcessControlZone
  • 22. Process Control Zone Level 0 – Process Control Network Sensors Motors Actuators Instrumentation Level 0 Process Control Network Valves IED - Intelligent Electronic Device Sensors
  • 23. Process Control Zone Level 1 – Control Devices PLC s Dedicated Control Operator Workstation Control Processes RTU s Level 1 Control Devices PLC - Programmable Logic Controller RTU - Remote Terminal Unit Dedicated Operator Workstation
  • 24. Process Control Zone Level 2 – Supervisory Control LAN Data Historians Engineering Workstations Communication front ends Level 2 Supervisory Control LAN Data Historian Control Room HMI Panel
  • 25. Operations Zone Level 3 – Operations Support Sensors Motors Actuators Instrumentation PLC s Dedicated Control Operator Workstation Control Processes RTU s Data Historians Engineering Workstations Communication front ends Simulation & modeling systems Operations Analysis Systems Engineering workstation Test systems Level 0 Process Control Network Level 1 Control Devices Level 2 Supervisory Control LAN Level 3 Operations Support Enforcement zone ProcessControlZone OperationsZone
  • 26. DMZ, Business Zone Jump host environment Patch Management AV Server Application Server Enforcement zone Site directory replicas Local file servers Site specific Remote Access Corporate internet, e-mail, public websites,etc DMZ Level 4 Plant Network Level 5 Enterprise Business Network DMZBusinessZone
  • 27. Sensors Motors Actuators Instrumentation PLC s Dedicated Control Operator Workstation Control Processes RTU s Data Historians Engineering Workstations Communication front ends Simulation & modeling systems Operations Analysis Systems Engineering workstation Test systems Jump host environment Patch Management AV Server Application Server Enforcement zone Site directory replicas Local file servers Site specific Remote Access Corporate internet, e-mail, public websites,etc Level 0 Process Control Network Level 1 Control Devices Level 2 Supervisory Control LAN Level 3 Operations Support DMZ Level 4 Plant Network Level 5 Enterprise Business Network Enforcement zone Enforcement zone ProcessControlZone OperationsZone DMZBusinessZone Source: https://isc.sans.edu/diaryimages/images/purdue.png
  • 28. Network Architecture The mystery of air gaps What you think is in place Source: ISBN-13: 978-1597496452
  • 29. Network Architecture The mystery of air gaps But actually.. Source: ISBN-13: 978-1597496452
  • 30. Network Architecture Protocols Raw Data Protocols - HART / ModBus - Reads data (measurements) - Sends commands (start pumps) - Clear text - No authentication High Level Data Protocols - OPC / ICCP / MMS - Sending data, commands between databases/applications - Creates human readable information - Likely to act like bridge between corporate and control networks
  • 31. Network Architecture Protocols - ModBus TCP - 502/TCP - open protocol - Master/Slave - Simple request/response protocol - Function codes - No Security
  • 32. Network Architecture Protocols - OPC - Object Linking and Embedding for Process Control - First released in 1996 - 4840/TCP - Open Standard - Acts as a bridge between different application - Often the link between corporate and control network
  • 34. Attack Landscape Types of Attacks - Denial of Service (DoS) - Insecure Protocols - Hardcoded Credentials - Database Attacks - Man-in-the-Middle Attacks - Physical Attacks - Rogue Modems - Etc
  • 37. Common Weaknesses - Approved patches This document contains <<REDACTED >>proprietary information. Information contained herein is to be used solely for the purpose submitted, and no part of this document or its contents shall be reproduced, published, or disclosed to a third party without the express permission of <<REDACTED >>. <<REDACTED >> DISCLAIMS THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PURPOSE AND MAKES NO EXPRESS WARRANTIES EXCEPT AS MAY BE STATED IN ITS WRITTEN AGREEMENT WITH AND FOR ITS CUSTOMER. In no event is <<REDACTED >> liable to anyone for any direct, special, or consequential damages. The information and specification in this document are subject to change without notice. (source: Publically available patch list on vendor website)
  • 38. Common Weaknesses - Poor authentication/authorisation
  • 39. Common Weaknesses - Ineffective physical security
  • 40. Common Weaknesses - Rogue Access Points - Unnecessary software - Harsh conditions
  • 41. Common Weaknesses - Limited use of host anti-virus - Poor authentication/authorisation - Little or no cyber security monitoring - Requirement for 3rd party access - Poor Audit and Logging - Legacy equipment - Unmanned field sites - Harsh environments - Etc
  • 42.
  • 43. - Preferably in test environment or during FAT/SAT (Things will break!) - Know your toolbox - Capture traffic across different levels - Close communication with control center Assessing Control Systems
  • 44. So how can we protect ourselves Industrial Control Systems System Security - Hardening - Identity & Access Management - Patch Management - Malware detection & prevention Network Security - Security zoning & DMZs - Firewalls & IPS - VPN Access Plant Security - Physical Security - Policies & procedures - BCM & DRP
  • 45. But first.. build a team Operations, Security, Maintenance and IT Have to work together to have a good SCADA security team
  • 46. Insight on current situation - Create an Inventory - Determine and verify current security levels - Policies and Procedures - Regulatory compliance - Create awareness - Talk to people
  • 47. One step at a time - Network Architecture changes - Monitoring - Authentication - Responsabilities - Compliance
  • 48. Common pitfalls - Compliance vs effectiveness - Non-flexible approach - Throwing money at the problem - Lack of communication
  • 49. Standards - NERC CIP - IEC 62443 (ISA99) - IEEE 1686 - NIST SP800-82 rev 2 - Etc [link]