Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical...

17
Keynote - Critical Infrastructure Kung-Fu: Evaluating Attacks and How to Defend

Transcript of Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical...

Page 1: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

Keynote - Critical Infrastructure Kung-Fu:Evaluating Attacks and How to Defend

Page 2: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

About Me

2

Background/Experience

● B.S. General Science, United States Naval Academy

● US Navy Information Warfare Officer, Retired

● Technical Director, SIGINT Technical Analysis (STA) Team, Ft. Meade, Maryland

● Founder of Booz Allen Dark Labs– R&D Cyber Incubator

● NOT a black-belt in any martial arts, but I’ve dabbled in Tae Kwon Do, Judo, Karate, Boxing, and Wrestling...

Chad Gray

Principal

PwC US/MX

Cybersecurity & Privacy

Summary

● Leader in C&P Practice, based out of

Tysons/McLean Office is Washington D.C.

● Champion for Aerospace & Defense client

sector

● Specializes in Operational Technology (OT)

and Internet of Things (IoT) security

Page 3: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

Agenda

3

● Discussion of OT, IoT, and Critical Infrastructure● Characterizing the Cyber Threat● Staying Ahead of the Threat● Call to Action

Page 4: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

Discussion of OT, IoT, and Critical Infrastructure

4

Operational Technology (OT)

● Technology that detects or causes change through monitoring or control of physical devices, processes, and events

● Where Cyber meets the physical world

● Examples:○ HMIs, Historians○ PLCs, IEDs, RTUs○ Sensors, Actuators

Internet of Things (IoT)

● Networked electronic devices beyond typical desktops, servers, phones, and tablets

● Through connectivity, allow greater interaction of data and abilities

● Examples:○ IP Cameras○ Biometric sensors○ Home Automation○ Medical Devices○ HVAC Systems○ VR/AR Headsets

Critical Infrastructure

● Assets essential for a functioning and safe society and economy

● Can be classified at several levels - societal, national, regional, local

● Example:○ Trans-oceanic fiber○ Electric Power○ Health Sector○ Emergency Services○ Transportation○ Water/Wastewater○ Financial

Page 5: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

Photo goes here

PwC

What is the Threat

5

Criminal Actors

• Financially motivated• Types:

- Intellectual Property Theft- Direct Gain - Ransomware- Indirect Gain - Destabilization for Stock

Market Gain• Trends:

- Moving from high-volume low-yield ransomware to targeted high-yield attacks

- Repurposing of leaked nation-state tools

Page 6: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC 6PwC 6

Nation State Actors

What is the Threat (continued)

• Politically, Ideologically, Strategically, Defensively motivated

• Types:- Targeted Exploitation- Prepositioning- Deny, Degrade, Disrupt, Destroy

• Trends:- From clumsy, overt, attributable methods to

covert, targeted, and surgical methods- Misattribution- Becoming more process oriented towards

achieving a specific effect- Targeting Safety Instrumented Systems (SIS)

Page 7: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

The OT Cybersecurity Kill ChainHow Threat Actors Can Use IT to Manipulate OT Systems

Targeted OT Attacks● Threat actors use inherent vulnerabilities in OT systems to reach specific

machines, individuals, networks, or organizations across all industries● These exploitations are often signature-less and difficult to detect using

traditional security defenses● Over time, threat actors will gradually strengthen their foothold, until they

are able to move laterally to critical systems and manipulate core OT functions or exfiltrate data

● Threat actors can maintain a persistent presence across multiple devices, until they are identified and removed

Intelligence

GatheringInitial

Exploitatio

n

Command

& Control

Privilege

Escalation

Data

Exfiltration

Conduct

background

research

Execute initial

attack

Establish

foothold

Enable

persistence

Conduct

enterprise

recon

Move laterally

to new systems

Escalate

privileges

Gather and

encrypt data of

interest

Exfiltrate or

alter data from

affected

systems

Maintain

persistent

presence

Intelligence

Gathering Initial Exploitation Command & Control Privilege Escalation Function Manipulation/Data Exfiltration

Page 8: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

How to Stay Ahead of the Threat

8

Know Yourself

● Can’t defend what you don’t know you have

● Hardware, Software, Firmware, Network, Protocols

● People, Processes, Technology

● Third-Party and Supply-Chain

● Versions, Patch Levels● CWE and CVE

Follow A Program

● Start with Existing Standards

● IEC 62443, NIST 800-82● Start from the Enterprise

down versus control level up

● Build relationships, understanding, and buy-in across IT and OT Organizations

Get a Good Stance

● Establish Security Zones● Control flow of data● Establish and Manage

Firewall Rules● Whitelist processes (design

deterministically)● Whitelist access● Segment your SIS systems● Guard Workstations, HMIs,

and Data Historians● Backup logic/configurations

Page 9: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

How to Stay Ahead of the Threat (continued)

9

Protect Yourself

● Establish Monitoring to “see” threats or bad hygiene

● Industrial SIEMs - Level 1,2,3● EDRs/Agents on Level 2,3 IT

Assets● Log Aggregation● Think OT/IT Fusion for

viewing in SOC to correlate across both environments

Analyze Your Foe

● With ability to “see”, create analytics to spot bad behaviors

● Build Use-Cases for Mitre Att&ck Framework - but beyond for the OT environment

● Apply machine learning techniques on logs and/or historian data

● Ingest Threat Intel

Page 10: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

How to Stay Ahead of the Threat (continued)

10

Test Yourself

● Conduct “technical testing” (not calling it a “pentest”)

● Evaluate attack surface● People, Process, and

Technology● Use different modes - White

Hat, Grey Hat, Black Hat● Insider Threat simulation● Crisis Management

Simulation

Practice Sparring

● Red Team - begin to emulate likely attack scenarios and/or actors

● Blue Team - Conduct training simultaneously to spot attacks and respond procedurally

● Build Attack Trees

Page 11: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

How to Stay Ahead of the Threat (continued)

11

Master Your Domain

● Conduct Threat Hunting - Employ the “1%”● Create a Research Environment to test new technologies, equipment, protocols● Looking for the Unknown/Unknowns (new actors, new techniques, new vulnerabilities, new exploits)

Page 12: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

How to Stay Ahead of the Threat (continued)

12

Defeat Your Adversary

● Stay ahead of actor’s ability to evolve their techniques● Keep moving - employ newer architecture, standards, and security measures to stay ahead● Be disruptive - invest in innovation to create environments that are a first seen for your foe● Force the enemy to play by your rules, not theirs

Page 13: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

“I will forget the mistakes of the past, and press on to greater achievements”

13

• Chun Kuk Do - 2nd Rule• Get out of old habits - start forming new ones• Don’t set sights on being good enough - focus on being great

-Chuck Norris

Page 14: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

“To be the best, you have to constantly be challenging yourself, raising the bar, pushing the limits of what you can do. Don’t stand still...leap forward!”

14

• 1st American Olympic Medalist in Judo• 1st and longest reigning UFC Female Champion

-Ronda Rousey

Page 15: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

PwC

“Be Like Water - Remain fluid, adapt, and force your opponent to fight a different fight”

15

• Develop your own styles• Be unpredictable, and difficult for your adversary - to make

them go away, or at least stay a step behind• Don’t stop changing - constantly evolve. Be a moving target

-Bruce Lee

Page 16: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

Confidential information for the sole benefit and use of PwC’s client.

PwC’s ICS Security program componentsHelping our clients from strategy through execution

12

1. Technical Assessments

2. MaturityAssessment

3. Program and Organizational

Alignment

4. OT Security Program

Dev. and Strategy

6. Remediation and Maturity Advancement

We work side-by-side with our clients to

implement controls to remediate identified

risks and vulnerabilities, from developing

enterprise OT cybersecurity programs, to

implementing tools and technologies to

protect and mature vulnerable systems.

Remediation and Maturity Adv.

Design of a strategic program responsible for the protection of OT assets.

Efficient integration leveraging current IT infrastructure and

organizational structure.

OT Security Program Dev. and Strategy

OT Security

Performing physical site visits to various sites, evaluating security

controls, and penetration testing, to identify any gaps in coverage and

risks from OT vulnerabilities in the environment.

Technical Assessments

Analysis of your OT security program and

supporting governance models, including

cooperation between IT and OT,

supporting processes, and technology

capabilities.

Maturity Assessment

Working with IT and OT stakeholders to

better align objectives and

responsibilities to increase efficiency

and decrease overall operating costs.

Program and Org. Alignment

5. IncidentResponse

Helping clients perform investigation of

anomalous activity within the OT

environment and assisting with any

incident response activities as necessary.

Incident Response

Page 17: Keynote - Critical Infrastructure Kung-Fu · 2019-02-13 · PwC Discussion of OT, IoT, and Critical Infrastructure 4 Operational Technology (OT) Technology that detects or causes

Thank you

pwc.com

© 2019 PwC. All rights reserved. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity.

Please see www.pwc.com/structure for further details. This proposal is protected under the copyright laws of the United States and other countries. This proposal contains information that is

proprietary and confidential to PricewaterhouseCoopers LLP, and shall not be disclosed outside the recipient's company or duplicated, used or disclosed, in whole or in part, by the recipient for any

purpose other than to evaluate this proposal. Any other use or disclosure, in whole or in part, of this information without the express written permission of PricewaterhouseCoopers LLP is prohibited.