detect & defend 2018 it-cube & check point pdfs/dd 18...environments protect it with...

47
1 ©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd. Christine Schoenig Technical Manager, Germany Check Point Infinity for IoT Security – Die Cyber Security Architektur der Zukunft DETECT & DEFEND 2018 IT-CUBE & CHECK POINT [Internal Use] for Check Point employees

Upload: others

Post on 04-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

1 ©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

Christine Schoenig

Technical Manager, Germany

Check Point Infinity for IoT Security –

Die Cyber Security Architektur der Zukunft

DETECT & DEFEND 2018 IT-CUBE & CHECK POINT

[Internal Use] for Check Point employees

Page 2: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

2 ©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees

• Das Internet der Dinge (Internet of things, IoT) ist ein Netzwerk aus

physischen Geräten wie z.B. Fahrzeugen, Haushaltsgeräten und

anderen Gegenständen, die mit Elektronik, Software, Sensoren,

Aktoren und Konnektivität versehen sind. Ziel des Internets der Dinge

ist es automatisch relevante Informationen aus der realen Welt zu

erfassen, miteinander zu verknüpfen und im Netzwerk verfügbar zu

machen.

• Die Zahl der online fähigen Geräte stieg in 2017 in nur einem Jahr um

31% auf 8,4 Milliarden im Vergleich zu 2016. Experten schätzen, dass

das IoT bis 2020 aus rund 30 Milliarden Objekten bestehen wird. Es

wird auch geschätzt, dass der globale Marktwert des Internet der

Dinge bis 2020 7,1 Billionen Dollar erreichen wird.

Internet of things

Page 3: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

3 ©2018 Check Point Software Technologies Ltd.

Page 4: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

4 ©2018 Check Point Software Technologies Ltd.

Smart Cities

IoT & ICS

Offices

Smart Buildings

Sensors

Devices

Retail

Automotive

Smart Homes

Utilities Telco's

Fleet Management

[Restricted] for designated teams

Manufacturing

Healthcare

Page 5: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

5 ©2018 Check Point Software Technologies Ltd.

IoT is Already All Around Us

And will be a substantial part of our lives in the coming Future…

Connected Cars Connected Home

Smart Cities

Healthcare

[Protected] Non-confidential content

Smart Buildings

Industrial IoT

Quelle: MIPS

Page 6: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

6 ©2018 Check Point Software Technologies Ltd.

Motivation

[Protected] Distribution or modification is subject to approval

Quelle: Deloitte

Page 7: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

7 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

ATM

POS

Vending Machines

Manufacturing

Machines

Surveillance Cameras

Printers

What do they all have in Common?

Routers Sensors

Page 8: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2016 Check Point Software Technologies Ltd.

8

More than 25% of cyber attacks will involve the internet of things (IoT) by 2020

Gartner

90% of IoT devices are unsecured (Gartner)

Page 9: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

9 ©2018 Check Point Software Technologies Ltd.

Page 10: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

10 ©2018 Check Point Software Technologies Ltd.

Page 11: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

11 ©2018 Check Point Software Technologies Ltd.

Page 12: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

12 ©2018 Check Point Software Technologies Ltd.

Default Passwords

Software Vulnerabilities

Mirai Botnet Attack

Remote Admin

C&C

Page 13: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 13

How could one build a network of IoT bots?

• Search for the latest CVE for IoT device.

• Locate the devices model and brand

• Search www.shodan.io for online devices of that model.

• Execute the attack.

[Protected] Non-confidential content

Page 14: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

14 ©2018 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals

Let‘s have a look

Page 15: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

15 ©2018 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval

Page 16: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2016 Check Point Software Technologies Ltd. 16

The Internet of

Ransomware Things

Page 17: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 17

Why Attacks on IoT Are Possible?

Vulnerable Software & Hardware

Default Configuration Less/No Updates Less/No Encryption

Hard Coded Credentials

Unattended Devices Less/No

Segmentation No Standards/

Too Many Standards

[Protected] Non-confidential content

[Restricted] for designated teams

Page 18: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

18 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

The Enterprise Environment

While Some See Things… We See a Trojan Horse

Building Office

Page 19: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

19 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

Page 20: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2015 Check Point Software Technologies Ltd. 20

A German steel mill – thousands of employees

Page 21: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

21 ©2018 Check Point Software Technologies Ltd.

BSI Assessment Of The Attack

„ The technical capabilities of the attackers are considered to be very advanced. The compromise reached from a multitude of different internal systems to industrial components. The know-how of the attackers was not only very pronounced in the area of classic IT security, but also extended to detailed expertise on the industrial controls and production processes used."

Page 22: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

The challenge to protect borderless networks

[Confidential] ONLY for designated groups and individuals

Page 23: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

23 ©2018 Check Point Software Technologies Ltd.

How would you…

Keep attackers

from hitting OT

Prevent exploits of vulnerable

systems

Build and monitor

rules that cover

everything

Page 24: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

24 ©2018 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval

CHECK POINT SOFTWARE DEFINED PROTECTION (SDP) CONVERTING INTELLIGENCE INTO PROTECTION

ENFORCEMENT LAYER

THREAT PREVENTION CONTROL LAYER

MANAGEMENT LAYER SINGLE MANAGEMENT

ENDPOINT SECURITY

NETWORK SECURITY GATEWAY

MOBILE SECURITY

VIRTUAL SYSTEMS

CLOUD SECURITY OT

Networks

Page 25: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2015 Check Point Software Technologies Ltd. 25

CLOUD MOBILE THREAT PREVENTION

CONSOLIDATED SYSTEM

OT Networks

Page 26: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

26 ©2018 Check Point Software Technologies Ltd. 26 ©2018 Check Point Software Technologies Ltd.

CHECK POINT INFINITY

Page 27: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

27 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

Best Practices for Securing OT

Secure Both OT and IT

Environments

Protect IT with Advanced Threat Prevention Technologies

Clear Segmentation between

OT and IT/Internet

Deploy Specialized ICS/SCADA Security Technologies

Page 28: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

28 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

ICS Solution Building Blocks

Unified IT/OT Management

• Customized Visibility

• Unified Policy

• Anomaly detection

• Integration with SIEM systems

Environment

• Ruggedized Appliances for Harsh Environments

• Visibility and Granular Control of ICS/SCADA Traffic

• Stops exploits of known vulnerabilities

• Using IDS/IPS Signatures

Control & Virtual

Patching

Page 29: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

29 ©2018 Check Point Software Technologies Ltd.

ICS Solution Building Blocks

• Visibility and Granular Control of ICS/SCADA Traffic

• Stops exploits of known vulnerabilities

• Using IDS/IPS Signatures

Control & Virtual

Patching

Page 30: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 30

Most Extensive Support of SCADA/ICS-Specific Protocols

[Restricted] ONLY for designated groups and individuals

Over 900 SCADA and IoT commands

in Check Point Application Control

MMS

DNP3

Siemens

Step7

IEC 60870-5-104

IEC 61850

ICCP

OPC

DA & UA

Profinet

CIP IoT

Page 31: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 31

Detailed forensics for incident investigations

Setting the Baseline Granular level logging of SCADA traffic –

DETAILED

GROUPED

ANALYZED

by

Check Point SMARTLOG &

SMARTEVENT

Page 32: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 32

Setting Policy/Rules based on Functions and Values

[Restricted] ONLY for designated groups and individuals

Allowed values and

ranges

Protocol

Command

(Function)

Active or Passive Policy

Page 33: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 33

Legacy Systems Are Often Unpatched

[Restricted] ONLY for designated groups and individuals

Page 34: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 34 [Restricted] ONLY for designated groups and individuals

PROTECTED

by

Check Point

IPS

Virtual patching with over 300 dedicated IDS/IPS signatures

NSS Labs

Highest Rating

Stops exploits of known

vulnerabilities and detects

anomalous traffic

Page 35: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

35 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

Environment

ICS Solution Building Blocks

• Ruggedized Appliances for Harsh Environments

Page 36: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 36

• Fully featured Check Point security gateway

[Restricted] ONLY for designated groups and individuals

• Compliant to the most rigid regulations:

IEC 61850-3 and IEEE 1613

• 6x1GbE ports and firewall throughput of 2Gbps

• Compact fan-less design with no moving parts; temperature

range from -40°C to 75°C

• Can be used in In-line or Tap (Mirror) modes

• Routing and networking (e.g: BGP, OSPF, IPsec, etc.)

Check Point 1200R New Purpose-Built Ruggedized Security Gateway Appliance

Page 37: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

37 ©2018 Check Point Software Technologies Ltd. [Restricted] for designated teams

Unified IT/OT Management

ICS Solution Building Blocks

• Customized Visibility

• Unified Policy

• Anomaly detection

• Integration with SIEM systems

Page 38: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 38

UNIFIED IT and OT MANAGEMENT FOR BEST ROI AND OPTIMAL PROTECTION

Unified Policy

Customized Visibility

Everywhere Monitoring

[Restricted] ONLY for designated groups and individuals

Management integration

With Leading SIEM systems:

Q-Radar, ARCSight, Splunk

And more like Predix and

others

Page 39: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 39

REPORTED

by

Check Point COMPLIANCE BLADE

Real-time assessment of

compliance with major regulations

Dedicated Compliance and Regulation Monitoring

SCADA SPECIFIC COMPLIANCE CHECKS

[Restricted] ONLY for designated groups and individuals

Page 40: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

©2018 Check Point Software Technologies Ltd. 40

IoT Security Best Practices Segmentation

Access Policy

Patching/Virtual Patching

Pre-Infection/Post-Infection Threat Prevention

Data Leakage Prevention

Encryption

Standardization

[Restricted] ONLY for designated groups and individuals

Page 41: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

41 ©2018 Check Point Software Technologies Ltd.

Visibility

[Restricted] for designated teams

Enterprise IoT Security

Control Network

PLC PLC

Security Gateway

SCADA Server

NAC - Discovery

Building

Office

MQTT Over Ethernet

WLAN / LAN

MQTT

BACNET

R80

Hospital

HL7, Dicom

Page 42: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

42 ©2018 Check Point Software Technologies Ltd.

ICS/SCADA Environments with Multi-site Sectors: Electricity, Wind, O&G, Water

SCADA Server

Data Center

Smart Event

Communication cloud

Ethernet/IP/MPLS

Cellular

MODBUS High

Availability

1200R

RTU

Electric Sub-station

PLC

MODBUS

IT Zone

1200R

Wind Farms

MODBUS VPN 1200R

PLC

Waste Water

Clean

Water

Control Center

Natural Gas Production

PLC

1200R

Page 43: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

43 ©2018 Check Point Software Technologies Ltd.

Page 44: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

44 ©2018 Check Point Software Technologies Ltd.

Transportation

Manufacturing

Smart cities

Smart buildings

Banking

Utilities

Healthcare

Telecom

Automotive

Energy

Smart homes

cloud

Security in the age of

THINGS

Page 45: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

45 ©2017 Check Point Software Technologies Ltd.

IoT, ICS/SCADA Verticals

Security Solution Examples

1. Check Point ICS Security: https://www.youtube.com/watch?v=crZrh1kQOew

2. Check Point Blog:

http://blog.checkpoint.com/tag/iot

3. Check Point Infinity:

https://youtu.be/FqOTbTRjsu4

Smart Cities Connected Cars Healthcare Smart Homes Smart Buildings Industrial IoT

Page 46: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

ENFORCEMENT

MANAGEMENT

THREAT INTELLIGENCE CLOUD & INFRASTRUCTURE

APPLIANCES CASB 160+ TECHNOLOGY

PARTNERS

MOBILE

COMMUNICATIONS ICS

CHECK POINT PROVIDES ITS CUSTOMERS THE BEST SECURITY EVERYWHERE WITH THE INDUSTRY’S LARGEST SECURITY ECOSYSTEM

Source: https://www.checkpoint.com/partners/opsec

Page 47: DETECT & DEFEND 2018 IT-CUBE & CHECK POINT PDFs/DD 18...Environments Protect IT with Advanced Threat Prevention Technologies Clear Segmentation between OT and IT/Internet Deploy Specialized

47 ©2018 Check Point Software Technologies Ltd.

THANK YOU