Integrated Factory Acceptance Test (IFAT) as Security Best Practice 10/27/2015FoxGuard Solutions1 Larry Alls, Security Engineering Manager FoxGuard Solutions.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

Life Science Services and Solutions
Software Engineering CSE470: Process 15 Software Engineering Phases Definition: What? Development: How? Maintenance: Managing change Umbrella Activities:
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
Increasing customer value through effective security risk management
1 Steve Chenoweth Friday, 10/21/11 Week 7, Day 4 Right – Good or bad policy? – Asking the user what to do next! From malware.net/how-to-remove-protection-system-
CS351 © 2003 Ray S. Babcock Software Testing What is it?
Lecture 11 Reliability and Security in IT infrastructure.
SE is not like other projects. l The project is intangible. l There is no standardized solution process. l New projects may have little or no relationship.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Stephen S. Yau CSE , Fall Security Strategies.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
Release Management and Rollout A very brief overview.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Introduction to Network Defense
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Effective Methods for Software and Systems Integration
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Dillon: CSE470: SE, Process1 Software Engineering Phases l Definition: What? l Development: How? l Maintenance: Managing change l Umbrella Activities:
Framework: ISA-95 WG We are here User cases Studies
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Using Business Scenarios for Active Loss Prevention Terry Blevins t
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
1 Availability Policy (slides from Clement Chen and Craig Lewis)
SECURITY ENGINEERING 2 April 2013 William W. McMillan.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
The Handover Process P6.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Microsoft Management Seminar Series SMS 2003 Change Management.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security Vulnerabilities in A Virtual Environment
WATERFALL DEVELOPMENT MODEL. Waterfall model is LINEAR development lifecycle. This means each phase must be completed before moving onto the next!!! WHAT.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Cyber Security Issues in HEP and NP Grids Bob Cowles — SLAC NC August 2004.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
1 ITOM 6.2 Data Center Migrations Tricks of the Trade Andy Abbas Co-Founder and VP.
Proactive Incident Response
3.6 Fundamentals of cyber security
Server Upgrade HA/DR Integration
Secure Software Confidentiality Integrity Data Security Authentication
Auditing Application Controls
I have many checklists: how do I get started with cyber security?
Authors: Helen J. Wang, Chuanxiong Guo, Daniel R
Presentation transcript:

Integrated Factory Acceptance Test (IFAT) as Security Best Practice 10/27/2015FoxGuard Solutions1 Larry Alls, Security Engineering Manager FoxGuard Solutions

Good Afternoon  Brief History of Threats  Security Myths  Layered Defense  Implementing a layered defense in the Industrial Controls System (ICS) network  Factory Acceptance Testing  IFAT – Questions to ask – Helpful hints – Lessons learned – Outcome – Benefits 10/27/2015FoxGuard Solutions2

Evolution of Security Challenges 10/27/2015FoxGuard Solutions3 GLOBAL Infrastructure Impact REGIONAL Networks MULTIPLE Networks INDIVIDUAL Networks INDIVIDUAL Computer Target and Scope of Damage Rapidly Escalating Threat First Gen  Boot viruses Weeks Second Gen  Macro viruses  Denial of Service Days Third Gen  Distributed Denial of Service  Blended threats Minutes Next Gen  Flash threats  Massive “bot”- driven DDoS  Damaging payload worms Seconds 1980s1990s TodayFuture

Evolution of Threats and Exploits 10/27/2015FoxGuard Solutions4 Packet Forging/Spoofing Password Guessing Self Replicating Code (WORM) Password Cracking Vulnerability Scanning Audit Disablement Back Door Exploits Session Hijacking Sniffers Stealth Diagnostics High Low Pulsing Zombies Self Installing Root Kits Time Dynamic Capabilities Intelligent Bots Complexity Expertise Required Mitnick or Wozniak Script Kiddies ~90s Today

Think about it…  Implementing security on control systems at power plants is becoming more and more critical for the reliability of our electric sector.  Why is that? – Because NERC says so? – Because of terrorist threats?  What does this mean to the plant and the plant operators?  How do we take the IT best practice of layered defense and apply it to a control system environment?  What is the impact of installing security on a control system?  How does it affect the plant, the vendor, and the integrator? 10/27/2015FoxGuard Solutions5

Common Security Myths  Only specific users have access to my systems and I know who they are  We air-gap the ICS network so it’s not exploitable  Our firewall is bulletproof  What’s the worst that can happen? 10/27/2015FoxGuard Solutions6

Worst-Case? 10/27/2015FoxGuard Solutions7

Repeat After Me! Disregard Security and your network:  Is vulnerable  Is exploitable  And someone will access it 10/27/2015FoxGuard Solutions8

Why? 10/27/2015FoxGuard Solutions9  Control systems use IT systems and networking technologies – NIST Special publication is riddled with information about the addition of IT technologies and how they pose threats to the ICS system, and what needs to be done to mitigate these threats.  Control systems may have implemented IT based solutions, but they have not kept up with IT technology. – ICS was designed to last 15 – 20 years – Lifecycle for typical IT system is years – Combined with the security myths and the ever growing IT threats, it’s time to act

Implementing Security in the ICS  Challenging due to different vendors  Can you integrate these solutions into a single solution  Vendors don’t usually integrate their systems with one another  Some power providers are toying with the idea of managing their security from a single management layer, but are finding it challenging because of the different vendor solutions  This type of solution calls for some network designing and extensive testing prior to deployment 10/27/2015FoxGuard Solutions10

Factory Acceptance Testing  TEST, TEST, and TEST AGAIN!!!  The answer for integrating anything into the ICS has always been a Factory Acceptance Test (FAT)  Implementing security is no exception  Integrated Security Factory Acceptance Test (IFAT) – Vendors, customer and integrator come together prior to installation to “work out” site specific issues and test every facet of the security install – These issues would normally have to be dealt with during the outage – This process saves the plant considerable time during the outage as it relates to the cyber-security installation – They can then concentrate on other upgrades that are being performed knowing that the added security is not going to impact start-up 10/27/2015FoxGuard Solutions11

Questions to Ask  What vendors will be integrated into this plan?  Are they willing to work with the other vendors in a neutral environment?  To what extent will they cooperate?  Who will integrate this solution?  Who will write the test plans and oversee the IFAT?  What facilities are needed to accommodate the vendors?  What onsite security will be required by each vendor?  How can we maintain secure data transactions?  How can NDAs be handled between vendors? 10/27/2015FoxGuard Solutions12

Top 5 Things to Remember 1.Communicate early, honestly, and thoroughly 2.Manage expectations on all sides 3.Not all the vendors will participate equally 4.Expect surprises that were not anticipated 5.Have clear definitions for Success and Failure 10/27/2015FoxGuard Solutions13

Lessons Learned  Get complete requirements from all vendors and set up well in advance  Run at least two mock IFATs prior to having the real IFAT  Have clear applicable test plans and procedures  Keep personnel limited  Allow ample time for complete testing 10/27/2015FoxGuard Solutions14

Closing the IFAT  Intangible product: Confidence – Confidence that the system to be delivered meets expectations. This confidence is built from a long process consisting of several major milestones, one of which is the IFAT; another being the successful installation and execution of “real” science on the system.  Tangible product: The certification of a formal agreement – A signed agreement detailing what passed, what failed, and the remediation plan for each failure/deficiency. If the remediation plan cannot be fully addressed at the IFAT, then a deadline for presenting this plan to the customer should be set. If another IFAT is required, this should be part of the remediation plan. In the worst case, the remediation plan may include how the system will be corrected on site, after installation at the customer facility. 10/27/2015FoxGuard Solutions15

Who Benefits? 10/27/2015FoxGuard Solutions16  The Vendor This approach validates all the hard work that the vendor has put into its system Reduced loss / cost due to false expectations Improved customer relations / confidence  The Customer Confidence in the systems Minimal impact during installation Reduced implementation costs Reduced costs due to non-compliance  The Integrator Expectations of delivery are clear Increased success rate of implementations Reduced losses due to false expectations

Questions? Larry Alls, Security Engineering Manager FoxGuard Solutions FoxGuard Solutions provides cyber security, including HMI patching and updates, to industrial control systems. 10/27/2015FoxGuard Solutions17