Industrial Security in Upravljanje Z Industrijskimi Omrežji
Total Page:16
File Type:pdf, Size:1020Kb
4. Poglavje Industrial Security in upravljanje z industrijskimi omrežji Matjaž Demšar GSM: +386 (31) 684 810 [email protected] reliable industrial communication networks are the backbone of a digital enterprise Industrial Security – Essential in the Age of Digitalization Challenges for Companies Productivity, Cost Pressure and Regulations • Externally caused incidents Protect through increasing connectivity Protect Productivity against • Internal misbehavior • The evolving Threat Landscape • For qualified personnel Reduce cost Costs • For essential Security Technologies Comply • Reporting Requirements Comply to regulations • Minimum Standards to • Security Know-how challenge bring everyone to the table IT-Security Industrial Security confidentiality availability integrity integrity availability confidentiality Challenges are similar but reality is very different in IT and Industrial (OT) Security IT Security Industrial Security Confidentiality Availability 3-5 years Asset lifecycle 20-40 years Forced migration (e.g. PCs, smart phone) Software lifecycle Usage as long as spare parts available High (> 10 “agents” on office PCs) Options to add security SW Low (old systems w/o “free” performance) Low (~2 generations, Windows 7 and 10) Heterogeneity High (from Windows 95 up to 10) Standards based (agents & forced patching) Main protection concept Case and risk based The ever-changing threat landscape Professional Hackers Vulnerabilities § § Cybersecurity laws and Internet of § § Things Regulations Evolution of the cyber threat landscape Digital Information Processing Digital Connectivity Digital Automation and Intelligence 1950s – 1960s 1970s 1980s 1990s 1991 1999 2000s 2010s 2015 2020s Internet of Things, Smart Military, governments and other Computers make their way The World Wide Web becomes and autonomous systems, organizations implement into schools, homes, business and Mobile flexibility publicly accessible Artificial Intelligence, Big computer systems industry Data Digital enhancement of The globe is connected Cloud computing enters the Home computer is introduced Industry 4.0 electrification and automation by the internet mainstream Industroyer/Chrashoverride Cyberwar WannaCry Stuxnet Phishing Targeting Critical Morris Worm Infrastructure AT&T Hack Blue Boxing NotPetya The threat landscape keeps growing and AOHell Cryptovirology Cloudbleed changing and attackers are targeting industrial Level Seven Crew hack sl1nk SCADA hacks and critical infrastructures Denial of service attacks Meltdown/Spectre Challenges and drivers Most critical threats to Industrial Control systems Outdated operating systems² Windows NT 4.0 30. June 2004 Industrial Control System Security Windows XP 08. April 2014 Top 10 Threats and Countermeasures1 Windows 7 14. January 2020 Infiltration of Malware via Removable Media Windows 10 14. October 2025 1 and External Hardware 2 Malware Infection via Internet and Intranet 3 Human Error Sabotage Compromising of Extranet and Cloud 4 Components 5 Social Engineering and Phishing 6 (D)Dos Attacks Control Components Connected to the 7 Internet 8 Intrusion via Remote Access 9 Technical Malfunctions and Force Majeure Compromising of Smartphones in the 10 Production Environment 1 Source © BSI Publications on Cyber Security | Industrial Control System Security 2019 2 Source © Microsoft Industrial Security Lifecycle of security management Assess Security Evaluation of the current security status of an ICS environment Manage Security Comprehensive security through monitoring and vulnerability Implement Security management Risk mitigation through implementation of security measures Industrial Security Phases in details • IEC 62443 • ISO 27001 • Penetration testing • Industrial Security Monitoring • Industrial Vulnerability • User Training Management • OT network infrastructure • Patch Management • Automation Firewalls • Remote Incident Handling • Application Whitelisting • Antivirus • Industrial Anomaly Detection Assess Security Following a risk-based approach … covers a holistic analysis of threats and vulnerabilities, the identification of risks … … and recommen- Assess dations of security Security measures to close the identified gaps. IEC 62443 Assessment Assessment of compliance to the IEC 62443 international standard • Focus on parts 2-1 “Establishing an industrial automation and control system security program” and 3-3 “Security for industrial process measurement and control – Network and system security” Result chart bar • 2 days on-site with the customer, coordinated by a security consultant and a security engineer Result spider diagram • Questionnaire-based checklist to identify and classify risks Questionnaire • Up to 30 pages report containing recommendations for risk mitigation measures ISO 27001 Assessment Assessment of security according to the ISO 27001 international standard • 1 day on-site workshop with the customer, to identify and classify risks • Coordinated by a security consultant and a security engineer • Typical attendants: Management and customer’s responsible for production, IT-security and physical security, maintenance staff, engineering staff, … • Offline evaluation of the results • Up to 30 pages report containing analysis, recommendations for risk mitigation measures and prioritization of actions (based on cost/benefit scenario) Network Scanning Detection of relevant vulnerabilities in the production environment Rapid transparency over vulnerabilities and end of life information mitigations in automation Visualization environments of scan results Industrial scan profiles optimized for production environment … reduce the risk of downtimes … provide relevant results only Service delivery by automation specialists ensures project‘s success by … deep system know-how Vulnerabilities, … combined expertise within IT and OT area configuration Selected Open-Source and problems Commercial Tools Implement Security To mitigate risks … means the Implementation of security measures … … to increase the Implement protection level Security of shop-floor environments. Page 16 June 2018 Security Awareness Training Challenge • 91% of the security incidents in 2015 consisted of stolen credentials by use of phishing e-mails1 • Only 3% of targeted individuals reported the phishing e-mail1 Goal • 70% of all security incidents are caused by human error2 Increase security awareness among shop-floor staff to avoid security Common approach incidents caused by human error • No cyber security training at all • Cyber security training for the office environment focusing on classic IT-security topics Weak points of common approach • Increased vulnerability due to human error threats • Lack of automation perspective when training staff on cyber security topics 1 Source © Verizon 2016 2 Source © Ponemon Institute Research 2013 OT network infrastructure and policies Policy Consulting Industrial Network Security Consulting • Cell segmentation of networks based on • Establish new or review and enhance IEC 62443 standard or SIMATIC PCS 7 and existing policies, processes, WinCC security concept procedures and work instructions which influence • Design and planning of a perimeter security in the shop-floor protection (DMZ – demilitarized zone) • Integration with existing enterprise • Perimeter firewall rule establishment, cybersecurity practices review and implementation • Examples: Patch and backup strategy, handling of removable media Unsecure Zone DMZ Protected Zone Page 18 Automation Firewall Next Generation Challenge • Shop-floor landscape changed from isolated islands to highly complex networks • Automation networks historically grown and often Goal evolved to huge flat networks without any segmentation Increase network security with Today’s solutions • Perimeter protection for the office environment or the whole site a perimeter protection solution in • Perimeter protection for the automation network but controlled line with security requirements for by office IT without automation know-how industrial automation and tested and approved for usage with Siemens Weak points of today’s solution process control system • Spread of failures due to flat networks • Inconsistent configuration of protection measures due to lack of automation expertise (e.g. perimeter firewall configured to protect the office against the automation network and not the other way around) • No perimeter protection at all Digital Factory Division Application Whitelisting Challenges Our Solution In 90% of attacks in 2014, old vulnerabilities that With Application Whitelisting application, only trusted already had patches available were leveraged – some of applications are allowed to run on the computer systems. which were more than decade old1. These applications are maintained in a positive list (whitelist). It prevents executions of unknown applications and Total zero-day vulnerabilities increased exponentially executables like malware or unwanted applications. in the last years2: Application Whitelisting application must be approved for use • 2013: 23 in different automation and process control software products like SIMATIC PCS 7, WinCC, and SINUMERIK3. • 2014: 24 (+4%) • 2015: 54 (+125%), more than one per week 1 Source © CNN Money 1 Source: © CNN Money | 2 Source: © Symantec 2| Source3 Selected © Symantec SINUMERIK 840D PCU50.X versions 3 Selected SINUMERIK 8400 PCU50 X versions Antivirus Challenges Solution The total number of 2015 vulnerabilities reflects 77% Antivirus software protects systems and single files from virus increase compared