Cyber Security E-Handbook
Total Page:16
File Type:pdf, Size:1020Kb
PROJECT 07-07 | NOVEMBER 2008 Cyber Security E-Handbook PROJECT 07-07 Cyber Security E-Handbook Prepared by Randall R. Nason, PE C.H. Guernsey & Company 5555 North Grand Blvd Oklahoma City, OK 73112 www.chguernsey.com and David Greer, Executive Director Institute for Information Security University of Tulsa Tulsa, OK 74104 www.utulsa.edu and Jerald Dawkins, Ph.D., President True Digital Security 5110 S Yale Ave, Suite 310 Tulsa, Oklahoma 74135 www.truedigitalsecurity.com for National Rural Electric Cooperative Association Cooperative Research Network 4301 Wilson Boulevard Arlington, Virginia 22203 The National Rural Electric Cooperative Association The National Rural Electric Cooperative Association (NRECA), founded in 1942, is the national service organization supporting more than 900 electric cooperatives and public power districts in 47 states. Electric cooperatives own and operate more than 44% of the distribution lines in the nation and provide power to 12% of the population. © Cyber Security E-Handbook Copyright © 2008 by The National Rural Electric Cooperative Association. Reproduction in whole or in part is strictly prohibited without prior written approval of the National Rural Electric Cooperative Association, except that reasonable portions may be reproduced or quoted as part of a review or other story about this publication. Legal Notice This work contains findings that are general in nature. Readers are reminded to perform due diligence in applying these findings to their specific needs, as it is not possible for NRECA to have sufficient understanding of any specific situation to ensure applicability of the findings in all cases. Neither the authors nor NRECA assume liability for how readers may use, interpret, or apply the information, analysis, templates, and guidance herein or with respect to the use of, or damages resulting from the use of, any information, apparatus, method, or process contained herein. In addition, the authors and NRECA make no warranty or representation that the use of these contents does not infringe on privately held rights. This work product constitutes the intellectual property of NRECA and its suppliers, as the case may be, and contains confidential information. As such, this work product must be handled in accordance with the CRN Policy Statement on Confidential Information. Contact: Randall R. Nason, PE David Greer, Executive Director Jerald Dawkins, Ph.D., President C.H. Guernsey & Company Institute for Information Security True Digital Security 5555 North Grand Blvd University of Tulsa 5110 S Yale Ave, Suite 310 Oklahoma City, OK 73112 Tulsa, OK 74104 Tulsa, Oklahoma 74135 Phone: 405.416.8213 Phone: 918.631.6525 Phone: 866.430.2595 e-mail: [email protected] e-mail: [email protected] e-mail: [email protected] Contents – iii contents Executive Summary vii Section 1 Cyber Security and Electric Cooperatives 1 The Why and How of Cyber Security 1 Section 2 Cyber-Security Primer 5 Dimensions of Security 5 Engineering for Security 6 Security Controls 7 Section 3 Protecting Electric Cooperatives’ Business Systems 17 Safeguarding Workstations, Laptops, and Desktops 17 Defending the Network 23 Protecting Information Services 33 Section 4 Protecting Electric Distribution Control Systems 35 SCADA Systems 35 Attacks on SCADA Systems 36 Security for SCADA Systems 38 Security Questions and Recommendations for SCADA Systems 40 Section 5 Roadmap: Cyber-Security Framework and Standards 43 Critical Infrastructure Protection 43 INFOSEC Guidelines for the Utility Industry 45 Cyber-Security Framework 47 Appendix A Description of NERC Cyber-Security Standards (CIP-002–009) 51 Appendix B Glossary of Terms 55 Appendix C References 59 Appendix D Abbreviations 61 iv – Illustrations illustrations FIGURE PAGE A.1 Security and Cyber Security Architecture and Protection vii 3.1 Typical Firewall Hardware Device—Barracuda Firewall 25 4.1 SCADA System Attack Entry Points 36 Tables – v tables TABLE PAGE 2.1 Devices for Physically Securing Computer Equipment 12 (Prices subject to change) 3.1 Firewall Devices 26 3.2 Common Firewall Traffic 27 4.1 SCADA Vulnerabilities as Reported by the DoE 37 Executive Summary – vii executive summary lectric cooperatives face a range of informa- operational, and managerial controls to create Etion security threats, from computer crimi- layered defenses for an information system. nals seeking social security numbers (SSNs) on The diagram below, Figure A.1, illustrates the corporate networks to cyber terrorists aiming to major elements and considerations of a cyber- take down the power grid by attacking a control security program for electric cooperatives. A net- network. Defending against such threats means work must strategically apply security solutions building a cyber-security program that mitigates such as firewalls, virtual private networks (VPNs), risks, addresses compliance and regulatory re- and intrusion-detection systems. Security controls quirements, and results in streamlined operations must also reside on desktops, personal comput- and increased productivity. ers (PCs), and laptops to protect the data that The objective of this handbook is to introduce rest on them. Antivirus software, hard-drive en- basic concepts and technologies of cyber secu- cryption, and access-control systems all support rity, and offer guidance for protecting modern defense in depth. At the application level, data- electric cooperatives. Cyber security is a cyclic bases, messaging programs, and e-mail systems risk-management process protecting information demand their own specific security solutions. systems in four dimensions: confidentiality, in- Supervisory control and data acquisition (SCADA) tegrity, availability, and nonrepudiation. A ro- systems, which provide real-time control and bust security program integrates technical, monitoring of electric distribution systems, create Network & Bus Applications: •Passwords + Wireless •PCI Compliance + DMZ •Int. Vulnerability Scan Cyber Security: SCADA: •Internet/Extranet •Live Data Access •Firewalls + Appliances •Remote Access •Ext. Vulnerability Scan •Historical Data Access •Patch Mgmt. •Control vs Monitoring •Intrusion Detection + •Compliance Agencies Intrusion Prevention •Network Firewall (IDS/IPS) •PC Firewall •Honey Pots •Anti-Virus Other: Physical Security: Security & Cyber •Back-up + Restoration •Access Control + Logs Security Architecture •Internet Insurance •Video Cameras & Protection: •Separation of Duties •Climate Control •Layered Protection •Security Administration •Back-up Power •Tech Architecture •Security Administration (UPS + Generator) (Diagrams & Docs) Staff Certification •Fire Suppress Desktop & Files: Messaging: •Identity Theft •E-mail + Attachments •Phishing •Instant Messaging (IM) •Data Theft (Internal & External) •Flash/Thumb Drives Controls: •Spyware + Ad-ware •Technical •Spam •Operational •Managerial •Incident Management •Logs FIGURE A.1: Security and Cyber-Security Architecture and Protection. viii – Executive Summary executive summary special security challenges. Their time and mis - components of a security plan that keeps assets sion criticality, coupled with the trend for greater out of the wrong hands. remote access and historically weak security, A robust cyber-security program is more than make SCADA systems attractive targets for cyber a collection of techniques and technologies thrown terrorists. SCADA security calls for protecting ex - together in defense of a network. A sustainable ternal connections through strong authentica - program must bind these into a cohesive frame - tion, engaging application-level access controls, work driven by risk and compliance, and sup - and implementing routine patch management. ported by assessment and training. A security Technical controls must be supported by op - program is shaped by its organizational risk and erational controls such as patch management regulatory requirements. Security assessments and vulnerability scans to be effective. Manager - and audits guide the intelligent development of ial controls such as separation of duty policies a strategic security plan. Ultimately, however, a and training programs support both—and thus security program is built on a culture supported ensure that systems and procedures are imple - by training and education. This handbook intro - mented systematically. Physical security is criti - duces these necessary ingredients and provides cal as well. Video cameras, security guards, door the recipe for a successful cyber-security pro - locks, and fire-suppression systems are vital gram for electric cooperatives. Cooperative Checklist Electric cooperatives vary greatly in size. As a 8. File server protection result, information technology (IT) resources 9. Spam protection and needs vary greatly across cooperatives. 10. Corporate security policy The following are some tips to concentrate ef - forts on the most important aspects of cyber Top 10 items for SCADA networks security to get the greatest return for the time 1. Gateway firewall and effort spent. 2. Backup and disaster recovery plans 3. Remote access control Top 10 items for corporate networks 4. SCADA application hardening 1. Gateway firewall 5. Virus scan/spyware blocker 2. Server virus scan/spyware blocker 6. Patching 3. Desktop virus scan/spyware blocker 7. SCADA database security 4. Gateway virus scan/ spyware blocker 8. SCADA network auditing 5. Patching 9. Accurate time source 6. Backup and disaster recovery plans 10. SCADA network security