Using PI to Aggregate & Correlate Security Events to Detect Cyber Attacks Dale Peterson Digital Bond, Inc.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Department of Energy PI for Security and Securing PI Dale Peterson Digital Bond, Inc. © 2008 Digital Bond, Inc.
NERC Security Requirements – What Vendors Should Provide James W. Sample, CISSP, CISM Manager of Information Security California ISO.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
AVG Internet Security 7.5 Product presentation.
System Security Scanning and Discovery Chapter 14.
System and Network Security Practices COEN 351 E-Commerce Security.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Lesson 19: Configuring Windows Firewall
CONFIDENTIAL & PROPRIETARY 1 WAF and Identity and Access Management Integration The Next Step in the Evolution of Application Security Best Practices Jan.
OPC Alarm.NET.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
Vulnerability Types And How to Use Them.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Welcome to the Minnesota SharePoint User Group. Introductions / Overview Project Tracking / Management / Collaboration via SharePoint Multiple Audiences.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Hands-On Ethical Hacking and Network Defense
COEN 252 Computer Forensics
Module 14: Configuring Print Resources and Printing Pools.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Chapter 6 of the Executive Guide manual Technology.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
By Jim White WiredCity, Div. of OSIsoft Copyright c 2004 OSIsoft Inc. All rights reserved. Cyber Security Tools.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Strong Authentication to any Application Using SecureLogin and NMAS TM Scott Kiester and John Jolly Software Engineer Novell, Inc.
Microsoft Management Seminar Series SMS 2003 Change Management.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Application Security in a cyber security program
2 © 2005 OSIsoft, Inc. – Company Confidential PI Utilization: Strategies for Leveraging Existing Technologies in Refining.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
4000 Imaje 4020 – Software Imaje 4020 – Content ■ Content of Chapter Software: 1. Flash Up 2. Netcenter 3. FTP 4. Active X 5. XCL commands 6. Exercise.
1 © 2008 OSIsoft, Inc. – All Rights Reserved PI T&D Users Group via LiveMeeting June 18, 2008 Transmission & Distribution Webinar PI for Asset Model and.
Remote Access Using a Netgear DG834 Router 1http://
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Kevin Watson and Ammar Ammar IT Asset Visibility.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
The Ultimate SharePoint Admin Tool
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
Module Overview Installing and Configuring a Network Policy Server
Real-time protection for web sites and web apps against ATTACKS
CompTIA Server+ Certification (Exam SK0-004)
Secure Software Confidentiality Integrity Data Security Authentication
Kennesaw State University
IS4680 Security Auditing for Compliance
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Using PI to Aggregate & Correlate Security Events to Detect Cyber Attacks Dale Peterson Digital Bond, Inc.

Agenda Hardening the PI Server – Architecture considerations – Using Bandolier to audit PI server security Using PI to Detect Cyber Attacks – Dept of Energy funded research project – Digital Bond’s Portaledge

PI Security 101 Architecture – Put PI servers in the right zone or zones Do not allow access to control center for PI Do not use two Ethernet cards and become a bridge Leverage PI to PI communication to move between zones of different security levels Is access to your PI data mission critical?

PI Security 101 OSIsoft provides guidance on securing PI Digital Bond has yet to see it followed!!! – piadmin username and password for PI trusts Bandolier – A Dept. of Energy funded research project

Identifying the Problem How do we establish an optimal / best possible secure configuration for our control system servers? How do we verify that this configuration has not changed over time? Can we do this using existing security tools at a low or no additional cost?

Solution: Bandolier Collaborate with vendor and asset owner partners to identify the optimal security configuration Assess and extract security configuration data Create audit files that can be used in Nessus and other scanners Deliver through subscriber content and vendor support channels

Multiple Levels of Audit Tests Operating System Settings Policies Account Management Logging Ownership and Permissions Services Processes Windows Registry Configuration Files Supporting Application Settings Web Servers Application Servers Database Servers SSH Servers LDAP Servers Authentication Libraries Control System Application Settings Authentication and Authorization Configuration Files Default Accounts Logging Application File Ownership and Permissions Services

Bandolier Security Audit File Batch file extracts security parameters from PI – Runs piconfig and a few other programs and dumps results to a file that can be audited ~222 Security Audit Checks – 26 Application Checks – 196 Operating System Checks

NERC CIP Compliance Aid CIP-007 R1: Test Procedures CIP-007 R2: Ports and Services CIP-007 R5: Accounts and Services CIP-007 R8: Vulnerability Assessment See the SCADApedia Page

Nessus Compliance Check Plugin Only uses one Nessus plugin! Safer than traditional scanning – Secure management connection. NOT a Nessus scan! Evaluates the “known good” not “known bad” Exporting to OVAL/XCCDF for use in other vulnerability scanners and security tool

Bandolier Costs and Requirements Prerequisites – Digital Bond Site Subscription $100 / Year – Nessus Professional Feed Subscription $1,200 / Year Many organizations already have a Nessus subscription – Administrator credentials for PI server

Questions

Detecting Cyber Attacks Security log events are everywhere – Firewalls, routers, switches – IDS/IPS – Server and workstation operating systems – SCADA and DCS applications, field devices, … Aggregate and evaluate events – Multiple events can decrease false positives – Multiple events can better

Security Event Managers (SEM) A class of IT security product – ArcSight and LOGIIC Aggregates & correlates security events – Used to detect attacks and forensics Weakness – Does not have interfaces to bring in control system information

Question? What do we use in control systems to aggregate and analyze information? A Historian A PI Server

PI Historian Advantages over SEM Already exist on many control systems – Especially in the energy sector Already interface to control system devices and applications Interface to IT devices and applications Has an advanced correlation capability, ACE

Portaledge A Digital Bond research project – Funded by the US Department of Energy – OSIsoft is a major partner and contributor Goal: Use PI Server as a SCADA SEM – Aggregate security events – Correlate security events using ACE – Alert when cyber attacks are detected

Event Taxonomy Availability Process Manipulation Reconnaissance Meta Events Process Manipulation Event Triggers Availability Event Triggers - Computer System - Field Device - Network Device - Perf Degradation - … - Computer System - Field Device - Network Device - Perf Degradation - … Reconnaissance Event Triggers Reconnaissance Event Triggers - Change in Scale - Change in Display - Firmware upload - … - Change in Scale - Change in Display - Firmware upload - … -Web Crawling - File Probing - Error Reaction Web Crawling - File Probing - Error Reaction -... Event Class Trigger Event Meta Event C C

Event Class Events One or more Events in an Event Class with a commonality generate an Event Class Event – Commonalities: time, IP address, … Will contain a chain of Events – Length and diversity of chains can be used to measure confidence – Chains can be used for escalation process

Event Classes Availability Communication Enumeration Escalation Exploitation Obfuscation Process Manipulation Reconnaissance

Release Packages Subscriber content on digitalbond.com – $100 / year, YES that’s all – Business model is to get research deployed – FREE for 3 months for event attendees who ask me for a free subscription Requires appropriate PI licenses – PI Server, SMT, ACE, Datalink, Excel

Release Package - I Spreadsheet to create PI Tags with SMT plugin – Will require some customization for IP address – Will require copy / paste for multiple data sources Spreadsheet to create modules, alias and properties in the Module Database – Alias PI Tag names for use in ACE These are common functions for PI Admins

Release Package - II ACE Modules – ACE Module DLL and related files – VB.NET files for customization if desired – Context spreadsheet to load ACE module using the SMT Module Database Plugin Documentation – Detailed Portaledge documentation on SCADApedia – Notes and instructions available

Release Package - III DataLink Display – Basic display that shows a scroll of Events – Customers can display results in a variety of ways PI Users are highly experienced on displaying data – Future research to build security dashboard Better way to display alerts so operators can escalate Security metrics to show the security state of the system

Release Schedule Released Today – Availability Event Class – Computer System Availability Event – Field Device Availability Event – Network Device Availability Event – Performance Degradation Availability Event [3] – Simple Network Availability Event Next – Enumeration Event Class All complete in 2009

Questions

Contact Info Dale Peterson, for -Bandolier, Portaledge and other research -SCADA Security Blog and SCADApedia -Whitepapers, podcasts, presentations, …