Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No. 619682 ) Business Convergence WS#2 Smart Grid Technologies.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Stephen S. Yau CSE , Fall Security Strategies.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Information Security Update CTC 18 March 2015 Julianne Tolson.
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
Seán Paul McGurk National Cybersecurity and Communications
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security Operations Security Domain #9.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Enterprise Cybersecurity Strategy
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Thandi Tesfagiorgis Supervisor: Prof John Ledger (University of Johannesburg) Co Supervisor: Andrew Paverd (Oxford University)
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Principles Identified - UK DfT -
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Suggestion for Summarizing Process of the Principles
Cybersecurity - What’s Next? June 2017
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Frameworks, Standards, Guidelines, and Best Practices
How to Mitigate the Consequences What are the Countermeasures?
Group Meeting Ming Hong Tsai Date :
Securing Critical Chemical Assets: The Responsible Care® Security Code
PLANNING A SECURE BASELINE INSTALLATION
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies and Project Use Cases Embedding Security Software Sébastien Breton, Airbus Defence & Space CyberSecurity

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Forewords  Be reminded that there are two cultures:  For IT People, security means cybersecurity  For ICS people, security means safety and reliability  In electric systems, safety and reliability are of paramount importance, and any cyber security measures should not jeopardize power system operations! IT: Information Technology ICS: Industrial Control System Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Outline  Introduction  Cybersecurity context: today’s grid  Cybersecurity concepts  Defence-in-depth  Incident handling  Critical elements  Cyber-physical attacks  Preventing the hack  Can your smart grid system survive from a cyber attack?  Conclusion Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Introduction  Cybersecurity must be considered as a whole system approach  Security requirements to be implemented in a given system must be drawn from a security risk analysis, which, in the specific field of smart grid systems, must take into account not only cyber risks and physical risks, but combined cyber-physical risks, so as to deter cyber-physical threats Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Cyber Security Context: today’s grid  Blackouts, reported in several cities since 2000 (Northeast, Florida, etc.), could have been caused by cyber-attacks against the electric grid  U.S. Department of Homeland Security investigated over 200 serious cyber-attacks against critical infrastructure during the first half of 2013  Electric grid targeted in over half of these attacks  Blackhat: Pentesting Smart Grid and SCADA with SamuraiSTFU Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Defence-in-depth  Setting up a cybersecurity strategy, based on a layered approach, to mitigate the risk: Embedding Security Software Prevention Continuous actions and measures put in place to reduce the risk of threats E.g.: Patch management process, software updates, security by design Detection Approaches to identify anomalous behaviours and discover intrusion E.g.: Intrusion detection system, traffic inspection Response Emergency operation plans and incident mitigation activities (short term actions) E.g.: Containing a cyber attack, modifying firewall filtering rules Recovery Reconstitution of smart grid operations E.g.: Remediation activities

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Incident handling [1] Preparation [2] Identification [3] Containment [4] Eradication [5] Recovery [6] Lessons learned Embedding Security Software SANS: Sysadmin, Audit, Networking and Security

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Critical elements  The cybersecurity strategy should consider the following critical elements as being all necessary for each prevention, detection, response, recovery building blocks: TECHNOLOGY PROCESS PEOPLE Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Critical elements applied to prevention (Example) PEOPLE CYBER SECURITY AWARENESS TRAINING (SECURE CODING) PROCESS TRUSTED SUPPLY CHAIN PATCH VALIDATION TECHNOLOGY UP-TO-DATE ALGORITHM STANDARD Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Cyber-physical attacks  Cyber-physical attacks (also called blended attacks) cause a greater impact and/or different consequences than a cyber or physical attack could cause individually  To address the enhanced impacts, risks and vulnerabilities for both cyber and physical attacks must be considered  Can your smart grid system survive from a cyber attack? Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Common control system vulnerabilities and weaknesses Embedding Security Software Software / Product Security Weaknesses Improper input validation Poor code quality Permissions, privileges and access controls Improper authentication Insufficient verification of data authenticity Cryptographic issues Credentials management Configuration and maintenance Configuration weaknesses Permissions, privileges and access controls Improper authentication Credentials management Security configuration and maintenance Planning, policy, procedures Audit and accountability configuration Network security weaknesses Common network design weaknesses Weak firewall rules Network component configuration (Implementation) vulnerabilities Audit and accountability Source: Cyber–Physical System Security for the Electric Power Grid, Proceedings of the IEEE | Vol. 100, No. 1, January 2012

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Embedding security software  Large scale key management and cryptographic algorithm  Integrity of the software is not simply checking a CRC « signature »  It must rely on cryptographic signature, which implies managing secret elements (cryptographic keys). It is the only way to truly authenticate the software editor  Don’t implement your own cryptographic algorithm. You’ll fail!  Secure communications  Must be based on standard protocols with a given cryptograhic key size  Managing technological obsolescence… !  Authentication of remote critical controls  Protection against eavesdropping (encrypt!)  Get your software product independently assessed or pentested  And of course, it is all about human people:  Provide relevant training (secure coding…) Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Conclusion  To address new security challenges, cyber security needs to be integrated with system theory to guarantee resilience of the grid  MAS²STERING shall provide:  Cross domain (power/electrical to cyber/digital) security event detection (SIEM), analysis and response  Secure communications in regards of the privacy concerns  Role-based access control (RBAC) to authenticate, authorize and grant access to the smart grid system Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Backup slides Embedding Security Software

project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Bibliography  NIST Guidelines for Smart Grid Cybersecurity  Volume 1 – Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirementsines for Smart Grid Cybersecurity  Volume 2 – Privacy and the Smart Grid  Volume 3 – Supportive Analyses and References  SANS Institute  The Incident Handlers Handbook  The CERT Division  Secure coding  OWASP Embedding Security Software