Cyber Security Education Consortium 2008...

50
Critical Infrastructure and Automated Control Systems Security: A Strategy for Securing Against Cyber Attacks Dr. Thomas L. Pigg Dr. Thomas L. Pigg Director of the Tennessee CSEC Director of the Tennessee CSEC

Transcript of Cyber Security Education Consortium 2008...

Page 1: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Critical Infrastructure and Automated Control Systems Security: A

Strategy for Securing Against Cyber Attacks

Dr. Thomas L. Pigg Dr. Thomas L. Pigg Director of the Tennessee CSECDirector of the Tennessee CSEC

Page 2: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

CSECMission

• The Cyber Security Education Consortium is a National Science Foundation ATE Regional Center of Excellence dedicated to building an information security workforce who will play a critical role in implementing the national strategy to secure cyberspace.

Page 3: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

CSEC Sites

Page 4: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Tennessee CSEC Mission

• Phase 1– Train the trainer

• Phase 2– Develop Student

Curriculum/Courses/Concentrations • Phase 3

– Develop Partnerships with Business, Industry and Government

Page 5: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Core Train the Core Train the Trainer Trainer

WorkshopsWorkshops• Principles of Information

Assurance• Network Security• Enterprise Security Management • Secure E-Commerce • Digital Forensics

Page 6: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

New CSEC Courses• Automation and Control Systems

– Control Systems Architecture– Control Systems Software Applications– Control Systems Security I and II

• Mobile Communications Devices– Mobile Device Architecture– Mobile Device Programming – Mobile Device Hardware

• Secure Coding– Secure Programming I and II– Software Testing – Software Security

Page 7: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

• SCADA(Supervisory Control and Data Acquisition)

• DCS (Distributed Control Systems)• ICS (Industrial Control Systems)• BAS (Building Automation Systems)• PLC (Programmable Logic

Controllers)• Smart Grid

What are What are Control SystemsControl Systems

Page 8: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Critical Critical InfrastructuresInfrastructures

• Agriculture & Food• Banking & Finance• Chemical• Commercial Facilities• Communications• Critical Manufacturing

Page 9: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Critical Critical InfrastructuresInfrastructures

• Dams• Defense Industrial Base• Emergency Services• Energy• Government Facilities• Healthcare & Public Health

Page 10: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Critical Critical InfrastructuresInfrastructures

• Information Technology• National Monuments & Icons• Nuclear Reactors, Materials &

Waste• Postal & Shipping• Transportation Systems• Water

Page 11: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Key Critical Key Critical InfrastructuresInfrastructures

• Key Sectors for Control Systems Security• Energy (Electricity, Oil, and Natural

Gas)• Water & Wastewater• Nuclear• Chemical• Dams• Transportation• Critical Manufacturing

Page 12: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current Trends Current Trends in Control in Control SystemsSystems• Continued move to open

protocols• Continued move to more COTS

operating systems & applications

• More remote control & management

• More network access to systems

• More widespread use of wireless

Page 13: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current State of Current State of SecuritySecurity

• Control Systems protocols with little or no security

• Migration to TCP/IP networks with its inherent vulnerabilities

• Interconnection with enterprise networks• Old operating systems & applications with

poor patching practices• Little monitoring of Control Systems for attacks

being done• Vendors not securing their product offerings

adequately

Page 14: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current State of Current State of SecuritySecurity

• Increased risk of insider attacks by outsourced IT services

• Experts seeing increased interest in Control Systems by terrorists & foreign governments

• Evidence that nation-states have been taking remote control of Control Systems

• Denial by some companies that there is a problem

• Some companies are now starting to see the need and address the issues

Page 15: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Real Control System Security

Breaches• Diamler-Chrysler Plant Shutdown

– Zotob worm – August 2005• First Energy’s Nuclear Plant

Infestation– Slammer worm – January 2003

• Maroochy Shire Sewage– Release of millions of gallons of

sewage - January 2000 – Perpetrator accessed system 46 times

Page 17: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

AURORA Test

Page 19: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current ThreatsCurrent Threats• Internet Based Threats

• Worms• Viruses• Denial of Service Attacks• Targeted Attacks

• Terrorist• Foreign Nation• Former Insider

Page 20: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current ThreatsCurrent Threats• Physical Threats

• Natural Disasters• Man-made Disasters (War,

Riots, etc.)• Terrorist Attacks

Page 21: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current ThreatsCurrent Threats• Internal Threats

• Disgruntled employee• On-site contractor• Unintentional attack

• IT worker• Curious Employee

Page 22: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Current ThreatsCurrent Threats• Targeted Attacks

• Can use any threat & threat agent• Internet• Internal• Physical• Social Engineering• Etc.

Page 23: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• CIA• Confidentiality• Integrity• Availability

Page 24: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• Technical Controls• Firewalls• IDS• Smart Cards• Access Controls

Page 25: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• Administrative Controls• Security Policies &

Procedures• Security Awareness• People

Page 26: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• TCP/IP• Patches & Updates• Intrusion Detection Systems

• Control Systems Monitoring• Signatures for Control

Systems• Anti-Virus Software

Page 27: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• Access Control Methods• Passwords• Multi-Factor

• Smart Cards• RFID• Proximity• Biometric

Page 28: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• Authentication• Active Directory

• Control Systems Integration

• Certificates

Page 29: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

IT Security for IT Security for Control SystemsControl Systems

• Authorization• Role Based• Area of Responsibility• Station Access Control

Page 30: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Network based• Inspects all network traffic

on that segment (incoming & outgoing)

• Uses pattern based signatures

• Anomaly based uses baseline• Uses network tap or

mirrored port• Monitors multiple hosts

Page 31: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Host based• Inspects network traffic for a

specific host• Better at protecting a

machines specific function• Misses LAN based attacks

Page 32: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Commercial• Pre-configured fee based IDS

• CA eTrust• McAfee IntruShield & Entercept• SonicWall• StillSecure Strata Guard

Page 33: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Open Source• Snort• Base• Sguil – Real-time GUI

interface• OSSEC (Open Source Host-

based Intrusion Detection System)

Page 34: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Using an IDS Using an IDS with a Control with a Control

SystemSystem• IPS• Intrusion Prevention System• Automated Response

• Dynamically change firewall ruleset

• NIST IDS Guide (SP800-94)

Page 35: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

• Network Segmentation• DMZ Design

• Can use ISA S99 standard as guide

• Design to protect each segment

• Allows for centralized services

Page 36: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

• Network Segmentation• Centralized Services

• Anti-Virus• Updates & Patches• Active Directory Services• Data Historians• System Management

Page 37: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

• Secure Remote Access• Secured VPN connections• Escorted Access for vendors

• Require secured tokens• Call in by vendor with

request• Issue 1-time code for

access

Page 38: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

• IDS/IPS for Control Systems• Which one to use?• Where to use?• HIDS or Application Whitelisting?• UTM – Unified Threat

Management

Page 39: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

• Security Event Monitoring & Logging• Network Devices

• Switches, Routers, Firewalls, IDS

• Computing Devices• Historians, Servers, Operator

consoles

• Field Devices• RTU, PLC, Telemetry Devices,

Embedded Devices

Page 40: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

• Security Framework• NIPP• NERC CIP• CSSP DHS• NIST

Page 41: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

Page 42: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Security Security SolutionsSolutions

Page 43: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control Systems Control Systems Security Security

InitiativesInitiatives• NIPP (

National Infrastructure Protection Plan)• CIPAC (

Critical Infrastructure Partnership Advisory Council)

• ICSJWG (Industrial Control Systems Joint Working Group)

• ICS-Cert (Industrial Control Systems Cyber Emergency Response Team)

• Strategy for Securing Control Systems

Page 44: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control Systems Control Systems Security Security

InitiativesInitiatives• CSSP (Control Systems Security Program)• Idaho National Laboratory

• National SCADA Test Bed Program• SCADA & Control Systems Procurement

Project• Smart Grid Interoperability Standards

Project• UK NISCC - Now CPNI (Centre for the

Protection of National Infrastructure)• PCSF/SCySAG (SCADA Cyber Self

Assessment Working Group) - Historical

Page 45: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control Systems Control Systems RegulationsRegulations

• NERC (North American Electric Reliability Council)• Develop & enforce reliability standards

• CIDX/ACC – Now ChemITC (American Chemistry Council)• CFATS guidance & assessment tools

Page 46: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control Systems Control Systems RegulationsRegulations

• ISA SP99 (Industrial Automation & Control System Security) – International Society of Automation• Part 1 Standard: Concepts,

Terminology & Models• Part 2 Standard: Establishing an

Industrial Automation & Control Systems Security Program

• Part 3 Standard: Technical Requirements for Industrial Control Systems (Currently in development

Page 47: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control Systems Control Systems RegulationsRegulations

• AGA 12 – Discontinued and used in IEEE 1711 Trial Standard• Encryption of Serial Communications• Serial Encrypting Transceivers now

available• API Standard 1164 (American Petroleum

Institute)• Standard on SCADA security for pipelines• NIST – National Institute of Standards

and Technology

Page 48: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control Systems Control Systems RegulationsRegulations

• SP800-82 – Guide to Industrial Control Systems (ICS) Security

• NIST initiative on Critical Infrastructure Protection (CIP)

• Uses ISO 15408 Common Criteria methodology

Page 49: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Control System Security

Takeaway• The 7 Things Every Plant Manager Should

Know About Control System Security – John Cusimano – Director of Security Solutions for exida– http://www.exida.com/images/uploads/

The_7_Things_Every_Plant_Manager_Should_Know_About_Control_System_Security.pdf

Page 50: Cyber Security Education Consortium 2008 Retreatcyberexpo.memphis.edu/2011/presentations/2011/Tom_Pi… · PPT file · Web viewCritical Infrastructure and Automated Control Systems

Contact Information

Dr. Thomas L. PiggProfessor of Computer Information

SystemsJackson State Community College2046 N. ParkwayJackson, TN 38305(731) 424-3520 Ext. [email protected]