ORNL is managed by UT-Battelle for the US Department of Energy Cyber Security Assessment of the SNS ICS Karen S. White 10/18/15.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Confidential & Proprietary to Cooper Compliance Corporation Revised September 8, 2014 AUDiT-READY TM.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
<<Date>><<SDLC Phase>>
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
David A. Brown Chief Information Security Officer State of Ohio
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Information Security Policies and Standards
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Computer Security: Principles and Practice
Controls for Information Security
Stephen S. Yau CSE , Fall Security Strategies.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network security policy: best practices
Chapter 7 Database Auditing Models
Website Hardening HUIT IT Security | Sep
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
COEN 252 Computer Forensics
Seán Paul McGurk National Cybersecurity and Communications
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Kenneth Osborne, 9/14/07 Inter Group communications at the Advanced Light Source. Overview of the different methods of communication between different.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
5/18/2006 Department of Technology Services Security Architecture.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Security Vulnerabilities in A Virtual Environment
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Role Of Network IDS in Network Perimeter Defense.
Information Security tools for records managers Frank Rankin.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Securing Network Servers
WSU IT Risk Assessment Process
Cybersecurity - What’s Next? June 2017
Critical Security Controls
NRC Cyber Security Regulatory Overview
Enterprise Roles and Structures:
Operating System Security
PLANNING A SECURE BASELINE INSTALLATION
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

ORNL is managed by UT-Battelle for the US Department of Energy Cyber Security Assessment of the SNS ICS Karen S. White 10/18/15

Background News reports detailing increasing cyber attacks on industrial control systems led to ORNL management concerns ORNL COO directed the Office of Independent Oversight (IO) to conduct an assessment of cyber security of industrial control systems at ORNL The objective of this assessment was to perform a cyber security review of ORNL ICS at high risk nuclear and accelerator facilities to safely determine the vulnerabilities, risk and mitigations in place

Attacks on Industrial Control Systems US Department of Homeland Security ICS-CERT responded to 245 attacks on US industrial control systems in FY14

US Government a popular target

Approach The IO consulted with ORNL IT cyber team to plan review IO decided to engage an outside firm to conduct the review Assessment team was directed to focus on two areas: –The security posture of ICS implementations with respect to threats from the ORNL enterprise network and the ORNL supplied visitor network –The security posture of ICS implementations with respect to threats originating from remote access

How SNS prepared Conducted self assessment using DHS ICS-CERT Cyber Security Evaluation Tool (CSET) based on NIST Used the results of this analysis to make targeted improvements –Completed conversion to more rigorous account management –Added Intrusion Detection System –Audited all accounts and role authorizations including prox card access to server rooms Prepared package of relevant documentation: network diagram, policies, architecture, etc. Captured network data requested by assessors

SNS ICS Large distributed system based on the Experimental Physics and Industrial Control System (EPICS) framework EPICS is developed by a collaboration across many laboratories and used for integrated control at US DOE labs and many others worldwide EPICS provides a flexible, layered architecture and integrates a variety of front end platforms This scalable, distributed architecture allows new devices, capability, functionality to be added as needed Emphasis on commercial, configurable, collaborative solutions

Protection Systems Two systems provide protection functions apart from the ICS Communication from protection systems to the ICS provides integrated status to operators but is not required for required shutdown to occur Machine Protection System shuts off the beam when predefined conditions are detected that may damage the machine Personnel Protection System shuts off the beam if entry to the accelerator enclosure is attempted during beam operations

SNS ICS Architecture ORNL RAN FIREWALLDMZ CF CONTROL CONTROL SYSTEM NETWORK - CHANNEL ACCESS FAST PROTECT SYSTEM BEAM PERMIT SYSTEM TIMING SYSTEM MASTER FRONT END CONTROL LINAC CONTROL RING CONTROL TARGET CONTROL PERSONNEL PROTECTION SYSTEM PPS SENSORS, CONTROL ELEMENTS, CONTROLLERS FRONT END SENSORS, CONTROL ELEMENTS, CONTROLLERS CF SENSORS, CONTROL ELEMENTS, CONTROLLERS RING SENSORS, CONTROL ELEMENTS, CONTROLLERS TARGET SENSORS, CONTROL ELEMENTS, CONTROLLERS LINAC SENSORS, CONTROL ELEMENTS, CONTROLLERS OPI SERVERS FIREWALL ORNL FIREWALL

SNS ICS Isolation Isolated behind a firewall with limited exemptions No wireless access points on ICS network DMZ allows limited remote access for authorized staff using three factor authentication Read-only access is provided inside ORNL System is run in isolation mode (air gapped) when ORNL experiences elevated cyber security threats –No remote access or monitoring –Control and monitoring from dedicated control room only Controls system data –Includes code and real-time process variable values –No sensitive, confidential, classified or PII

SNS ICS System Administration System is administered in partnership with ORNL ITSD staff –Linux machines – Controls Group –Windows machines and network – ITSD System leverages ITSD cyber services and experts –UCAMS – passwords –ORNL external firewall –Two factor authentication –Intrusion Detection System –System log monitoring and analysis –Cyber incident response and investigation

SNS ICS Cyber Security Challenge is to achieve the proper balance between meeting control system requirements and keeping system secure Many specialized devices are needed to control unique accelerator subsystems –Devices generally do not offer cyber protection mechanisms available in typical enterprise IT solutions Access limited to authorized, trained staff –Accelerator operators and physicists –Accelerator subsystem support technicians and engineers

Assessment Assessment team –Reviewed provided documents and PCAP data –Interviewed ORNL ITSD and SNS staff –Toured facilities –Conducted wireless assessment

Review Summary Overall the HFIR network is in good shape but there is room for improvement SNS is doing a good job of securing their systems and equipment The decision to align controls with NIST Special Publication , Guide to Industrial Control System (ICS) Security puts SNS and HFIR on the right track to providing consistent, verifiable security The wireless assessment of the SNS facility did not turn up any unknown access points. Unknown access points were identified on the HFIR network

Opportunities for Improvement - SNS Until moving to a tool for maintaining the PLC logic files, extra care should be taken to verify any changes in the PLC logic before it is put into use Move the logbook status entries behind the password system already in place or enforce policy to restrict sensitive information from being placed on the publicly readable logbook The EPICS system should have some form of security assessment performed

External Website

Relevant Enterprise Recommendation Use digital signatures to verify that an is legitimate for functions like authorizing Prox card access

Conclusion Announcement of the upcoming review motivated us to take a more careful look at our cyber security provisions We were able to make some improvements based on our self assessment Improved self imposed policies and formalized existing practices ICS-CERT good resources for free on-line tools and training