Creating Realistic Cybersecurity Policies

Slides:



Advertisements
Similar presentations
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Advertisements

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Website Hardening HUIT IT Security | Sep
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Information Security tools for records managers Frank Rankin.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
Safeguarding CDI - compliance with DFARS
CS457 Introduction to Information Security Systems
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Enhancing Network Security
BUILD SECURE PRODUCTS AND SERVICES
OIT Security Operations
Trend Micro Consumer 2010 Easy. Fast. Smart.
Chapter 5 Electronic Commerce | Security Threats - Solution
3 Do you monitor for unauthorized intrusion activity?
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Data and database administration
Cyber Security for SCADA Networks
100% Exam Passing Guarantee & Money Back Assurance
Network Security Analysis Name : Waleed Al-Rumaih ID :
Tim Carter Sales Director Sybase Confidential Propriety.
Secure Software Confidentiality Integrity Data Security Authentication
Intelligent Buildings and Cybersecurity
Chapter 5 Electronic Commerce | Security Threats - Solution
Security in the Workplace: Information Assurance
Threat Management Gateway
Lecture 14: Business Information Systems - ICT Security
NYBA 2017 Technology, Compliance &
Tim Carter Sales Director Sybase Confidential Propriety.
Security in Networking
Information Security: Risk Management or Business Enablement?
Cloud Testing Shilpi Chugh.
I have many checklists: how do I get started with cyber security?
Protecting Your Maps and Data when using ArcGIS Server
Cyber Security Why You Should Care.
SAM GDPR Assessment <Insert partner logo here>
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Bartosz Kajak, David Blanco,
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Firewalls Routers, Switches, Hubs VPNs
ISASecure® Certification - An End User Perspective
Securing the Threats of Tomorrow, Today.
12 STEPS TO A GDPR AWARE NETWORK
How to Mitigate the Consequences What are the Countermeasures?
Security week 1 Introductions Class website Syllabus review
Test 3 review FTP & Cybersecurity
6. Application Software Security
Global One Communications
Presentation transcript:

Creating Realistic Cybersecurity Policies David Blanco SCADA Security Adviser AUTOSOL Inc

https://autosoln.com/news-events/cshm-2017/ Materials White Paper & Presentation available for download: https://autosoln.com/news-events/cshm-2017/

Agenda Attacks against SCADA SCADA Security Challenges Separate SCADA & IT Cyber Policies SCADA Cybersecurity Policymaking Questions

What kind of attacks are SCADA systems facing?

Attacks against SCADA Increasing trends of attacks North America has most SCADA on Internet ICS-CERT reported 189 new equipment vulnerabilities ICS-CERT responded to 295 incidents in 2015 True attack numbers are underreported

Attacks against SCADA Unencrypted Encrypted Field Office Internet Corporate Office Field Office Firewall & VPN Concentrator SCADA Server Field Office Unencrypted Encrypted

Attacks against SCADA MIT & Kyle Wilhoit Honeypot 28 Days 39 Attacks 11 Countries

Attacks against SCADA MIT & Kyle Wilhoit Honeypot Death of security by obscurity Actively hunting Flank IT

Attacks against SCADA Unencrypted Encrypted Field Office Internet Random User Internet Corporate Office Field Office Firewall & VPN Concentrator SCADA Server Field Office Unencrypted Encrypted

Attacks against SCADA German Steel Mill IT to OT Blocked controllers Caused Explosion

Attacks against SCADA German Steel Mill Accidental access very dangerous Safety logic failed

Attacks against SCADA Unencrypted Encrypted Field Office Internet Corporate Office Field Office Firewall & VPN Concentrator SCADA Server Field Office Unencrypted Encrypted

Attacks against SCADA Turkish Pipeline Explosion Valve control Pipeline over pressurized Suppressed alarms to controllers Deleted logs $460 million

Attacks against SCADA Turkish Pipeline Explosion Targeting Field equipment Destruction is goal Control is key

Attacks against SCADA Unencrypted Encrypted Field Office Internet Corporate Office Field Office Firewall & VPN Concentrator SCADA Server Field Office Unencrypted Encrypted

Attacks against SCADA PLC Blaster Targeting Field equipment Spread directly between PLC’s Exploits features of equipment NOT exploiting a vulnerability

Attacks against SCADA What’s the difference between a hack and an accident? Not the results. Can you prove the difference? 1000+ deaths from SCADA hacking SCADA hacking is a strategic weapon

Why are SCADA attacks able to succeed?

SCADA Security Challenges

SCADA Security Challenges Availability Confidentiality SCADA IT Pg. 5 Integrity Confidentiality Availability Integrity

SCADA Security Challenges Availability Confidentiality SCADA IT Pg. 5 Integrity Confidentiality Availability Integrity

SCADA Security Challenges Availability Confidentiality SCADA IT Pg. 5 Integrity Confidentiality Availability Integrity

SCADA Security Challenges Legacy Equipment Issues Older than attacks Static defenses against elements Not security devices Vendors are not cyber experts Features become vulnerabilities

SCADA Security Challenges Safety Logic Here to protect against automation Not a cyber defense Air Gapping 2 million public SCADA IP’s 94,000 Modbus devices “…in no case have we ever found the operations network, the SCADA system or energy management system separated from the enterprise network.”

How does all this affect cybersecurity policies?

Separate SCADA & IT Cyber Policies

Separate SCADA & IT Cyber Policies IT policy: Regularly apply updates to all servers SCADA Implementation: Hold off on applying updates until test is run Schedule downtime/backup server for update

Separate SCADA & IT Cyber Policies IT policy: Uniformity in hardware & software SCADA Implementation: Assets in field for over 30 years Diverse because of acquisitions

Separate SCADA & IT Cyber Policies IT policy: Physically restrict access to network equipment SCADA Implementation: Assets geographically diverse Physical security applicable only at some sites.

Separate SCADA & IT Cyber Policies Focus on actionable to achieve the doable Security comes from good implementation Do what can implemented on what can be protected Cybersecurity policy is an enterprise wide opportunity

Separate SCADA & IT Cyber Policies SCADA needs to craft its own cyber security policies Understands business Understand how policies will impact business Knows the ROI for assets Understands the capabilities of equipment Knows the risks of hacks None IT SCADA Vulnerable Secure

What should a SCADA cybersecurity policy do?

SCADA Cybersecurity Policymaking Blueprints for security NIST Framework for Improving Critical Infrastructure No technology specifics ISA-99 / ISA 62443 1-4 Use Cases “Planning” phase 4-4 Implementation “Planning” phase Move us forward Ideas to take to the test lab

SCADA Cybersecurity Policymaking Identify strategically important assets Protect the field equipment Hackers target the field Focus on prevention Can stop damage No backups Controlling access = safety

SCADA Cybersecurity Policymaking Deploy Security to the Field Target of Hackers Rabbit Fence Analogy

SCADA Cybersecurity Policymaking Identify the correct security technology Design security into the process Avoid “bolt-on” solutions Easy to implement Hard to defend How it affects the process is what matters

SCADA Cybersecurity Policymaking Encryption Process of securely encoding a message Scales both functionally and technologically Open sourced is secured source Public Key Infrastructure Data only valuable if correct

SCADA Cybersecurity Policymaking

SCADA Cybersecurity Policymaking Defense in Depth Firewalls and virus scans Strategic Chokepoint Deeper OT Security Two Factor Authentication Networking Logs at device level Extend life of legacy equipment Unauthorized PLC-to-PLC communication Defend against hidden ports Defend against Zero Days

SCADA Cybersecurity Policymaking FIPS 140-2 National Institute of Standards and Technology Communications Security Establishment Canada Required for “critical” communications by USG Documented process for security Certified compliance by third party TRANSITION:

SCADA Cybersecurity Policymaking Multi-user tier Officer and User levels Encryption AES 256, RSA 2048 Public Key Infrastructure Create Security boundary No backdoors Clearly Enable FIPS Mode No Default Passwords New PKI TRANSITION:

SCADA Cybersecurity Policymaking TRANSITION:

SCADA Cybersecurity Policymaking FIPS 140-2 criticisms Inhibits development FIPS prohibits changes to certified models Restricts innovation Long development cycles

SCADA Cybersecurity Policymaking FIPS 140-2 enhances SCADA’s security lasts 5 years before renewal SCADA equipment has no schedule Validation process changes every year

SCADA Cybersecurity Policymaking FIPS 140-2 enhances SCADA’s security Market forces push innovation Voluntary compliance Patch vulnerabilities for market access Stuxnet Transmitter Example Committed vendor market

SCADA Cybersecurity Policymaking FIPS 140-2 enhances SCADA’s legacy security FIPS market is also a legacy market

Conclusion SCADA needs its own Cybersecurity Policy Focus on Prevention Defend the field Encryption enhances security with low impact FIPS 140-2 has test lab ready devices

Please complete your course evaluation online: www.cshmsurvey.com

Supplemental Talking Points for Q&A Link between Geopolitics and SCADA Hacking