Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical...

20
www.bcwwa.org CONNECTING AND EMPOWERING Operations: Cybersecurity – What To Know BCWWA SCADA & IT Conference 2019-11-20

Transcript of Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical...

Page 1: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

1www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.www.bcwwa.org

CONNECTING AND EMPOWERING

Operations: Cybersecurity – What To KnowBCWWA SCADA & IT Conference2019-11-20

Page 2: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

2www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

INDUSTRIAL CYBERSECURITY

Priorities:» Safe physical operations» Reliable operations

• Continuous• Correct• Efficient• No equipment

damage

At many sites, security programs are part of safety programs

Page 3: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

3www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

HUMAN MACHINE INTERFACE (HMI)

Page 4: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

4www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

CONTROLLERS & SENSORS

Page 5: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

5www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

ISA SP99 (PURDUE) MODEL

Page 6: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

6www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

DATA VS MONITORING VS CONTROL

IT history: leger books / accounting data / transactions Industrial network history

• Gauges = monitoring = IT data• Switches & dials = control =

safety/reliability critical IT experts say “it’s all data,” but this

blinds us to crucial difference between monitoring and control Correct control is vital to physical safety

and physical reliabilityControl is not AIC, CIA or “IT data” –control is really important

VS

Page 7: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

7www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

FIRST THREE LAWS OF SCADA SECURITY

» Nothing is secure» All software can be hacked» All cyber attacks are information,

and every bit of information can be an attack

In the worst case a compromised CPU will issue every unsafe instruction to the physical process that the CPU is physically able to issue

Page 8: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

8www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

ATTACKERS PREFER PERMISSIONS

Remote access attacks piggy-back on legitimate sessions / permissions, such as remote access sessions Phishing attacks steal credentials Pass-the-hash attacks re-use existing

credentials Databases & other servers permit

remote execution Remote Access Trojans (RATs) provide

remote control to understand target,steal credentials & make next move

Why write code to exploit vulnerabilitieswhen attackers can log in and executewhat they want?

Page 9: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

9www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

WHO’S COMING AFTER US

Threat Resources Attacks Examples

Nation-State Military Nearly unlimited Autonomous Targeted Malware

Stuxnet, Shamoon(?)

Intelligence Agencies Professional Remote Control –

Exploit VulnsBlack Energy,

TRITON

Hacktivists Skilled Amateur Remote Control –Exploit Permissions

Ukraine(?), Anonymous

SCADA Insiders Amateur Exploit Permissions Maroochy

Organized Crime Professional Indiscriminate Malware, Exploit Known Vulns

Zeus,Ransomware

Corporate Insiders Amateur Exploit Permissions Fake VendorFraud

Page 10: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

10www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

FAILED DEFENSE IN DEPTH

Start with HFLI attacks –firewalls, AV, patch programs Insiders: background checks,

detailed auditing - deterrence IDS cost: false alarms IDS takes average 2-3 months

while attacker has remote control Data exfiltration prevention

does not detect sabotage

Can’t restore equipment & human lives “from backups”

Threat Defense Cost Eff

Nation-State Military

Escalate to national agencies n/a Not

Intelligence Agencies

IDS / Exfiltration prevention $$$$ Poor

Hacktivists Intrusion detection systems $$$$ Fair

ICS Insiders Physical security, detailed auditing $$ Good

Organized Crime

Encryption, AV, security updates $$$ Good

Corporate Insiders

Firewalls, role-based

permissions$ Good

DBT

Page 11: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

11www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

INTERNET / FIREWALLS

» Internet = hosts + routers + connections between them – all talking using the Internet Protocol (IP)

» Hosts – sources & destinations of IP messages» Routers – figure out which connection to send each

message down, to get message to its destination» Firewalls – routers with filters

• Filter (software) looks at eachmessage

• Decides if it is allowed• If so, hands to router to send

For details – see my ISA InTechpaper “13 Ways To Break A Firewall” The Internet

Page 12: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

12www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

SECURE OPERATIONS TECHNOLOGY

IT-SEC:protect the information

SEC-OT :protect physical operations from the information

Page 13: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

13www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

OFFLINE CONTROLS

Offline SurveyTest BedsRemovable MediaRemovable DevicesNew Cyber AssetsInsider AttacksDeceived InsidersNonessential Equipment

Page 14: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

14www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

REMOVABLE MEDIA

» Media = information storage without an embedded CPU – CDs, DVDs, floppies

» Software policies preventing media from mounting» Multi-AV-scanning kiosks at physical perimeters» Physically blocking or removing devices

on all equipment except kiosks» Publish scanned files to test bed or

control-critical network

Removable media is the most frequentsource of common malware onindustrial networks

Page 15: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

15www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

REMOVABLE DEVICES

» Vendor laptop program» Network Access Control» Alerts» Contracts forbidding devices» Labelling control-critical devices» USB charger program – reduces

temptation

SEC-OT sites report that theseprograms essentially eliminatethe use of IT-exposed removabledevices

Page 16: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

16www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

DECEIVED INSIDERS

» Well-meaning insiders can be deceived into acting on false information with physical consequences

» Insiders must be trained to be suspicious of and seek verification of externally-sourced information and information that has traversed a non-critical network

Emailed information andinstructions should beverified verbally beforetaking action FAKE NEWS

Page 17: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

17www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

UNIDIRECTIONAL GATEWAY

C O R P O R A T E N E T W O R K

UNIDIRECTIONAL SECURITY GATEWAY

I N D U S T R I A L N E T W O R K

PLCs & RTUs

Industrial System

TX Host TX HW Module Replica ServerRX HostRX HW Module

User Stations

Unidirectional Security Gateways are a combination of hardware and software

• The hardware is physically able to send information in only one direction• The software replicates servers & emulates devices from the OT network to

the IT network• IT replicas are normal participants in IT networks• All cyber attacks are information – no attack, no matter how sophisticated,

can propagate back to the industrial network through the gateway

Page 18: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

18www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

WATERFALL SECURITY SOLUTIONS

Waterfall enables secure operations, preventing remote cyber attacks on industrial, OT and mission-critical environments.

Customers worldwide use Waterfall's array of OT security products to integrate OT networks with external environments.

We provide the strongest security solutions that fit the need: access to operations data, OT security monitoring,

and disciplined remote access and remote control.

Redefining OT security with Waterfall’s innovative Unidirectional Gateway technologies

Waterfall is the OT security company

Page 19: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

19www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

INDUSTRIAL SECURITY PODCAST

Guests from across the industrial security space

https://waterfall-security.com/podcasts

Vendors: issues, technology & approachesGovernment agencies: programs & resourcesOwners & operators: priorities & approachesOther: recruiters, educators & more

Page 20: Operations: Cybersecurity –What To Know...INDUSTRIAL CYBERSECURITY Priorities: » Safe physical operations » Reliable operations • Continuous • Correct • Efficient • No

20www.bcwwa.org Copyright © 2019 Waterfall Security Solutions Ltd. All rights reserved.

SECURE OPERATIONS TECHNOLOGY

Weaker

• Thorough – address all attack vectors –offline and online

• Robust – physical & hardware protections, not just software

• Disciplined – not waiting on “edge of seat” for actionable intel

• Futureproof – cyber attacks will always be information

Stronger

SEC-OT

Security posturesadapting to increasedattack sophistication