Protecting SCADA in the Cyber Battlefield
Total Page:16
File Type:pdf, Size:1020Kb
Protecting SCADA In the Cyber Battlefield MARK WILSON NETWORK ANALYST EASTERN MUNICIPAL WATER DISTRICT February 12, 2013 Executive Order, IMPROVING CRITICAL INFRASTRUCTURE CYBER SECURITY Homeland Security Presidential Directive-7 was revoked and replaced with (Presidential Policy Directive)-21 https://www.dhs.gov /sites/default/files/publications/dhs-eo13636-analytic-report-cybersecurity-incentives-study.pdf What is PPD-21? Homeland Security Presidential Directive 7 (HSPD-7) established the U.S. national policy for identification of and prioritization for protection of critical infrastructure. Signed by George W. Bush on December 17, 2003 it modified previous policy for a post-9/11 country. HSPD-7 was revoked by the Presidential Policy Directive 21 (PPD-21) on Critical Infrastructure Security and Resilience on February 12, 2013. PPD-21 states that "Plans developed pursuant to HSPD-7 shall remain in effect until specifically revoked or superseded."[1]Multiple changes came out of PPD-21, including a six actions with specific deadlines. One of those actions was to update the National Infrastructure Protection Plan within 240 days. PPD-21 added agriculture to the list of industries for critical infrastructure protection in December 2003. HSPD-7 replaces the 1998 Presidential Decision Directive 63 (PDD-63) that omitted agriculture and food. These directives designate the physical systems that are vulnerable to terrorist attack and are essential for the minimal operation of the economy and the government. Federal agencies are to develop plans to prepare for and counter the threat. In terms of combating terrorism and weapons of mass destruction (WMD), agriculture was included in the National Security Council’s WMD preparedness group formed by Presidential Decision Directive 62 (PDD-62) in 1998. Agro terrorism preparedness is more directly addressed by HSPD-9. https://en.wikipedia.org/wiki/Homeland_Security_Presidential_Directive_7 You MUST Become the Warrior Those who Believe this Philosophy… “But this is the way we have always done it” Then here is your next office system upgrade. Computer Phone THOSE WHO BELIEVE THIS PHILOSOPHY… “BUT THIS IS THE WAY WE HAVE DONE IT FOR THE LAST 30 YEARS.” Then here is your next office system upgrade. Computer Phone The connection A word ….. Don’t skimp on hardware! No Alexa enabled Firewalls please. THE CIA TRIAD Not this CIA THE CIA TRIAD Confidentiality Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it THE CIA TRIAD Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle . Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people. These measures include file permissions and user access controls. Version control maybe used to prevent erroneous changes or accidental deletion by authorized users becoming a problem. THE CIA TRIAD Availability is best ensured by rigorously maintaining all hardware, performing hardware repairs immediately when needed and maintaining a correctly functioning operating system environment that is free of software conflicts. You have 7 OSI layers to reference. Do not forget the Physical layer through the application layer. So what… I’m a small utility, why would anyone attack me? My equipment is protected. So I’m told by the contractor. Nobody connects to my network. It’s too old. And on… And on… And on… And on… And on… https://www.hackers-arise.com/scada-hacking https://www.shodan.io/explore/category/industrial-control- systems Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. 3. I have full control of my network. 4. Nobody wants to hack me. 5. My equipment is secure because it uses Obscure Protocols 6. Social Engineering is not an issue. Misconceptions: 1. My SCADA system is Air gapped. Definition: Anair gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. How is your network upgraded and maintained? Although Air gapped disconnects you from another network, Contractors or employees must hav e access to the system to do maintenance. Air-Gap Vs Non Air-gap Air Gap. (Does not connect to another network, Period.) Isolates physically from other networks. Do you really know that what is on your machines ? Malware can come in on USB devices or through connected laptops etc. How do you monitor what is actually sitting in your network ? Contractors plug in on the backside to do work, how do you know they are safe? STUXNET was deployed by USB devices. Non Air-Gap (connected networks via router etc) Uses systems and processes to constantly monitor traffic flow for viruses, malware, odd traffic and the connected machines on the network. Networks. SCADA – Supervisory, Control and Data Acquisition. Simple in design. Static in it’s setup. Not very dynamic. Very little administration. Minimal Protocols Redundancy relies usually on hardware. Should be fairly easy to diagram Enterprise Complex design Very dynamic. Administration on all fronts. Redundancy is based on hardware and software. Every protocol and port running Wil d, Wil d West of traffic. Can be difficult to diagram being dynamic. Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. Ok, you have to trust employees to do work. What happens normally is that the ingress is not intentional. Usually a USB, laptop with malware. FUN FACT. Many intentional ingresses and hacks to networks are the result of disgruntled employees. Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. 3. I have full control of my network. Do you regularly walk your network? Are you certain about what has been connected to it is truly locked down? Do you have HVAC systems tied to your SCADA network? Wireless devices lurking in the midst? Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. 3. I have full control of my network. 4. Nobody wants to hack me. Nobody will want to attack us. To be sure, the majority of hackers choose targets that present some opportunity for monetary gain, and very few of these adversaries would wish to cause physical harm to people or property. However, we live in a time where vandals, disgruntled employees, terrorist organizations, and even nation states have interest in attacking our critical infrastructure. These attacks occur all too frequently, and threaten to increase as our adversaries become more skilled and our systems more open. I’m a Target yes. But collaterally • There were 19 known vulnerabilities to industrial control systems in 2010, in 2015 that figure has rose to 189. As yet, we can’t be sure how that number has changed over the past two years, however, what we can be sure of is that the threats to ICS will continueto grow as adv ersaries gain a more adv anced knowledge of these systems as well as access to better hacking equipment. • In 2017, only 1.7% of all reported vulnerabilities were found in SCADA products. Down from 2.8% in 2016. 52.2% of the issues have no known solution. 443 of the reported v ulnerabilities were found to hav e no risk due to inaccurate disclosures. Our reliance on industrial control systems to driv e the technologies that make our liv es better will only produce more and more of them. ICS component manufacturers will have to keep up and quickly spot the v ulnerabilities and resolv e them. We may also see more embedded security coming into the industrial control systems in future. Close collaboration and continuous cross communication between critical infrastructure authorities, cyber security software dev elopers and the ICS hardware OEM´s will be required in order to beat the tools of sophisticated attackers. A robust ICS Cyber Security system stands between a chaos and a cyber attack, and since all of the critical infrastructures relies on the ICS systems, it is therefore imperativ e on the industries and relev ant government bodies that comprehensiv e compliance procedures are updated regularly to keep up with ev olving threats. Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. 3. I have full control of my network. 4. Nobody wants to hack me. 5. My equipment is secure because it uses Obscure Protocols In the past this may have been true, but today utilities rely on a multitude of commercial technologies. From communication protocols, operating systems like Microsoft and Linux, to common databases, utilities have turned to common software and hardware tools to save money and create efficiencies. Unfortunately these systems are often well understood by hackers, and provide an easier target of entry than a truly proprietary system. IOT devices use the same principles and protocols. This market it growing very rapidly. IoT (Internet of Things is using the same protocols and base hardware) Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. 3. I have full control of my network. 4. Nobody wants to hack me. 5. My equipment is secure because it uses Obscure Protocols 6. Social Engineering is not an issue. (in the context of information security) The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Misconceptions: 1. My SCADA system is Air gapped. 2. I only trust my employees. 3. I have full control of my network. 4. Nobody wants to hack me. 5. My equipment is secure because it uses Obscure Protocols 6.