building automation control system vulnerabilities · • converging all building systems •...

13
09/14/2017 1 Building Automation & Control System Vulnerabilities Is there an open door into your facility? by Dave Brooks, PhD Associate Professor, Security Science School of Science 1 TEST_SAMPLE TITLE OVERVIEW Background of Research Methodology What are BACS? Why consider BACS? Vulnerabilities Practitioner Understanding Mitigation Strategies Outcomes 2 TEST_SAMPLE TITLE

Upload: buithuy

Post on 13-Jun-2019

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

1

1

Building Automation & Control System

Vulnerabilities

Is there an open door into your facility?

by

Dave Brooks, PhDAssociate Professor, Security ScienceSchool of Science

1

T E S T _ S A M P L E T I T L E

2

OVERV IEW

• Background of Research

• Methodology

• What are BACS?

• Why consider BACS?

• Vulnerabilities

• Practitioner Understanding

• Mitigation Strategies

• Outcomes2

T E S T _ S A M P L E T I T L E

Page 2: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

2

3

BACKGROUND  OF  RESEARCH

• 2010 exploratory research

• Funded by ASIS Foundation

• Supported by BOMA & SIA

• Objectives:

• Articulate current BACS vulnerabilities

• Evidence based understanding of security professionals’ BACS awareness & practice

• (Initial) BACS Guideline3

T E S T _ S A M P L E T I T L E

4

PROJECT  METHODOLOGY

4

T E S T _ S A M P L E T I T L E

Page 3: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

3

5

WHAT  ARE  BACS?

5

T E S T _ S A M P L E T I T L E

6

WHAT  ARE  BACS?

6

T E S T _ S A M P L E T I T L E

BACS

HVAC

Lighting

Power

Water

Fire & Life 

SafetyLifts

CCTV

ACS

IDS

Page 4: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

4

7

WHAT  ARE  BACS?

• Automated system that converges at a central point to integrate building technology & process the flow of information  ………..   to create a facility that is safer, more comfortable & productive for its occupants, & more efficient for its owners & operators

• AKA:

• BEMS, BAS, FMS, BMS, BACS, IB, Smart Building, +++

7

T E S T _ S A M P L E T I T L E

8

WHAT  ARE  BACS?ARCH ITECTURE

Field Devices8

T E S T _ S A M P L E T I T L E

Automation

Management

Page 5: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

5

9

BACS :   THE   SECUR ITY  PROBLEM?

• BACS (2016) market valued at $54‐78 billion

• Annual growth 12‐34% annually

• Global market

• Converging all building systems

• Converging functionality at enterprise level

9

T E S T _ S A M P L E T I T L E

Marketsandmarkets. (2017). Building Automation System Market by Communication Technology (Wired, & Wireless), Offering (Facilities Management Systems, Security & Access Control Systems, & Fire Protection Systems), Application, & Region ‐ Global Forecast to 2022 (SE2966).

TMR Analysis. (2017). Commercial Building Automation Market 2016‐2024.

DB1

10

BACS :   THE   SECUR ITY  PROBLEM?

• Converging infrastructure, including Security

• Who owns, who is responsible?

• Enterprise wide connectivity & information flow

• External network connectivity

• Physical & logical breaches

• Legacy issues

• Internet of Things 

10

T E S T _ S A M P L E T I T L E

Page 6: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

Slide 9

DB1 Dave BROOKS, 08/20/2017

Page 7: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

6

11

BACS  VULNERAB I L I T I ES

Field Devices

11

T E S T _ S A M P L E T I T L E

Management

Automation

12

BACS  VULNERAB I L I T I E SManagement Level

• Device access• Workstation• Insert illegal storage device

• Communication network access• Logical connectivity• Wiretapping• Monitor & analyze traffic

Field Level• Device access

• Manipulation (on/off/alter)• Destruction

• Connection access• Manipulation 

(on/off/alter/disconnect)• Destruction• Tamper detection 12

T E S T _ S A M P L E T I T L E

Automation Level

• Controller access• Cover• Manipulate inputs/outputs• Tamper detection• Field programmer• Embedded functionality• Power

• Communication network access• Wiretapping (sniffing)• Monitor & analyze traffic• Open source programs• Data injection (fabrication)• Insert illegal Controller

Page 8: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

7

13

PRACT I T IONERS ’UNDERSTAND ING  OF  BACS?

13

T E S T _ S A M P L E T I T L E

14

PRACT I T IONERS ’UNDERSTAND ING  OF  BACS?

• Majority of security & building operators had neutral understanding of BACS vulnerabilities

• Integrators displayed understanding

• Security: Very limited BACS responsibilities

• 50% of BACS had integrated security systems

• Diverse views on integration & systems

14

T E S T _ S A M P L E T I T L E

Page 9: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

8

15

MIT IGAT ION   STRATEG IES

• Management: Policy, basis of design, security levels & zoning, cross department liaison

• Security risk management: Assessment, threat, criticality

• Personnel security: Procedures, vetting (inc 3rd parties), awareness, training

• Physical security: Access rights, device control & protection

• Cyber security: Logical access control, audit log, time out

• Incident response: Capabilities, exercise

• Continuity planning:  UPS, override, exercise 

• Maintenance: Schedules plan, known maintainers, asset tracking15

T E S T _ S A M P L E T I T L E

16

MIT IGAT ION   STRATEG IES

Risks are contextual:

• What are your Threats?

• What are your Criticalities?

• What are your Vulnerabilities?

Understand these, you begin to address BACS risks

16

T E S T _ S A M P L E T I T L E

Page 10: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

9

17

BACS  GUIDEL INE :  MIT IGAT ION   STRATEG IES

2. Respond to Questions, in:

• Management

• Security risk

• Personnel security

• Physical security

• Cyber security

• Incident response

• Continuity planning

• Maintenance17

T E S T _ S A M P L E T I T L E

1. Identify Criticality:

• Operations

• Board

• Financial

• Reputation

• Safety

• Regulatory

• Information

• Environment

Critical

Extreme

High

Moderate

Low

18

BACS  GU IDE L IN E :  MIT IGAT ION   STRATEG I E S

Do you have a written and endorsed Security Policy?

Is BACS formally assigned to the facility manager's portfolio and if so, who?

Does your facility have a designated criticality rating?

Are your facility's BACS risks captured in your Risk Register?

Do your personnel security practices include pre‐employment screening?

Do you have an auditable procedure to authorize access to the BACS?

Are the facility's BACS Controllers, routers and network switches physically protected?

Do you have a policy and procedure for (mechanical) key control?

Does your BACS have remote and external logical access?

Is your BACS logical program and configuration details held in a secure location to enable recovery and reconstitution?

18

T E S T _ S A M P L E T I T L E

Facility Security Level 1 Low

Page 11: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

10

19

BACS  GU IDE L IN E :  MIT IGAT ION   STRATEG I E S

Do you have a written and endorsed Security Guideline or Basis of Design document, which define security levels and zones?Is physical access to security zones based on role and personnel screening?Are BACS maintainers pre‐employment screened?Do BACS security breaches get reported and investigated by appropriate personnel?When a person exits the organization or changes roles, are physical access rights removed or adjusted?Are security awareness training programs documented?Are the facility's BACS physical vulnerabilities documented?Are BACS tamper alarms annunciated?Do you have a BACS legacy plan?

19

T E S T _ S A M P L E T I T L E

Facility Security Level 2 Medium

20

BACS  GU IDE L IN E :  MIT IGAT ION   STRATEG I E S

Do you undertake a threat assessment?How often are security seals/stickers for BACS audited?Do your BACS enclosures, controllers, routers and network switchers use tamper seals to detect actual or attempted manipulation?Do you carry out technical surveillance counter measure reviews/audits on your BACS on a regular, but random, schedule?Do your scan for unauthorized wireless BACS connectivity to a defined schedule?Are all wireless connectivity devices disabled?Are your BACS maintainers escorted at all times whilst on‐site?

20

T E S T _ S A M P L E T I T L E

Facility Security Level 5 Critical

Page 12: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

11

21

21

22

OUTCOMES

• BACS Guideline

• Project Report

• SecMan magazine article

• Conference presentation/s

• Journal publication/s

22

T E S T _ S A M P L E T I T L E

Page 13: Building Automation Control System Vulnerabilities · • Converging all building systems • Converging functionality at enterprise level 9 TEST_SAMPLE TITLE Marketsandmarkets. (2017)

09/14/2017

12

23

CONCLUD ING  REMARKS• BACS will continue to grow, converging more building plant & business functions

• Responsibilities lie across multiple departments/groups

• BACS have vulnerabilities & is a security risk 

• Generic security strategies mitigation BACS risks

• But, be aware & understand 

23

T E S T _ S A M P L E T I T L E

24

ASIS Foundation, BOMA & SIA are acknowledged for their support in this research project 24

T E S T _ S A M P L E T I T L E

Seeking Volunteers – can you help?

Thank you

& Questions?