scada/ics securityother things to verify is hardening applied? how are applications started? as...

39
Scada/ICS Security some experiences from the field Dieter Sarrazyn [email protected] @dietersar https://be.linkedin.com/in/dietersarrazyn

Upload: others

Post on 28-May-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Scada/ICS Security some experiences from the field

Dieter Sarrazyn

[email protected]

@dietersar

https://be.linkedin.com/in/dietersarrazyn

Page 2: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Introduction

2016 Scada security 2

Page 3: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

IntroductionWhy?

Business impact

Human safety

Environmental

Economical

Page 4: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

IntroductionBusiness Trends

• Increased Industrial Control Systems connectivity (corporate networks, internet...)

• Increasing need for real-time business information

• Increasing need for faster operational response

• Further consolidation of small systems

• Security as a feature

• Further IT & OT integration

Page 5: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

IntroductionVulnerability Trends

Source: http://blog.ptsecurity.com/2016/10/industrial-control-system-security-in.html

• Aging infrastructure

• Transformation from proprietary, isolated systems to open architectures and standard technologies

• Decreasing end user knowledge and awareness due to the use of standard embedded systems platforms

• Increased research on ICS weaknesses and vulnerabilities

• Patch management is more difficult (lack of test environments, lacking support of vendors)

Page 6: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Introduction

2016 Scada security 6

Cyber Threats/Attack trends

http://www.risidata.com/Database/event_date/desc

Page 7: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Introduction

“Is this really an issue?”

“We can change this in the next product upgrade.”

“Is this really worth the investment ?”

“What are the chances…. this has never happened before…”

“We aren’t connected to the internet”

2016 Scada security 7

Questions that you may receive

Page 8: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

SCADA Top 10A top 10 of things heard/noticed/encountered in scada environments

June 2016 SCADA security 8

Page 9: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“Of course we can harden your systems… just buy a new system”

2016 Scada security 9

Nr. 10 – hardening fun

“We tested the hardening in our test environment”(but forgot to deploy it in production …)

Page 10: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10Nr. 9 – viri & malware

Suppliers don’t always deliver DCS systems virus free

(even base images contain malware sometimes …)

USB sticks of supplier/vendor engineers are not always malware free …

(and they use these with different customers...)

Page 11: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“We don’t need security, there is no connection with the internet”

(but vendor xyz is performing

remote maintenance)

2016 Scada security 11

Nr. 8 – no internet ...

Page 12: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“Why aren’t we allowed to use the admin account to start that software/service?

It’s a restricted desktop”

2016 Scada security 12

Nr. 7 – desktop restrictions … really?

Page 13: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“I know the security isn’t in order,

but nobody told me you guys where coming”

(you referring to the ones testing security)

2016 Scada security 13

Nr. 6 – security through obscurity

Page 14: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

Automated scanners versus ICS/SCADA

(“fun” as attacker but certainly not a good combination...)

2016 Scada security 14

Nr. 5 – port/vulnerability scanners ...

Page 15: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

2016 Scada security 15

Nr. 4 – network bridges ...

“we would like this system to have multiple interfaces connected to these different networks”

(question coming after firewalls came along ...

Zoning concept hasn’t sipped through yet …)

Page 16: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“Yes, we do password management”

2016 Scada security 16

Nr. 3 – passwords ...

Page 17: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“An air gap will solve all our problems”

Ok … but how do you transfer files/info to/from those systems? …

“uhm… by USB stick”

2016 Scada security 17

Nr. 2 – air gap ...

Page 18: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Top 10

“Security is not in my objectives ...”

2016 Scada security 18

Nr. 1 – not in objectives

Page 19: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Standards (overview)

2016 Scada security 19

Page 20: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Industrial Security Standards

• NERC CIP – Electric

• CIDX / ACC – Chemicals

• ISA 99 (IEC-62443)

• NIST 800-82 Rev2

• AGA 12 – Natural Gas

• API – Oil & liquids

• IAEA NSS17 – Nuclear

• Cybersecurity framework for critical infrastructure systems

2016 Scada security 20

Page 21: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Industrial Security Standards

Compliancy to a standard <> security

it’s just a start ...

2016 Scada security 21

Page 22: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

(possible) ApproachHow the security level can be increased & maintained.

How to create awareness.

2016 Scada security 22

Page 23: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 23

Build a team

Scada Security

Team

Maintenance

Operations Security

IT

Page 24: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

Build a comprehensive inventory of the SCADA/ICS environment

2016 Scada security 24

Inventory

• Identify used Operating Systems• Include patch level• Include installed software

• Find all network connections• Modem• Wif• 3rd party partner connections

• Perform a physical walkthrough• Check for unprotected devices• Check for unlocked systems• Check for password indications

Page 25: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 25

Source: http://program-plc.blogspot.be/2016/09/easy-methods-to-remote-hmiscada-users.html

Inventory – access paths

Page 26: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

● Penetration testing

● Perform Wif walks/drives/…

● Perform physical walkthroughs

● FAT/SAT testing

● Other things to verify● Is hardening applied?● How are applications started? As Admin?● Communication between applications? Cleartext?● Can you “break out” of the “operator jail”?

2016 Scada security 26

Verify security levels - how

Page 27: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

When to test?• Initial baseline security test

• Every X months (to show improvements)

• Before implementation/deployment new product (FAT/SAT testing)

Unannounced “spot checks” (wif, external links, physical walkthroughs…)

2016 Scada security 27

Verify security levels - when

Page 28: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 28

Verify Security levels - where

“Forbidden zone”

Take Care !!

All testing ok

Where to test? … safely ...

Sources: http://www.iebmedia.com/index.php?id=8460&parentid=74&themeid=255&showdetail=truehttps://www.sans.org/industrial-control-systems/resources

Page 29: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

Most important rule => Talk to people

• Vendors need to know what you are expecting• Takes time & effort

• Personnel (Management staff, I&C people …)• Raise awareness• Help them (also with non-scada related things)

2016 Scada security 29

Create awareness, get trust & buy-in

Page 30: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

Security requirements for (SCADA) suppliers• Should be mandatory for every new project being ordered• Can be introduced gradually within existing environments• (former) WIB document, now part of IEC 62443

Create necessary Security policies– Incident Handling/Response

– Wif & network usage

– Password management

– USB usage (stick/drive)● How to perform data transfer?● Antivirus checking before using/connecting it to systems

2016 Scada security 30

SCADA/ICS Security governance

Page 31: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 31

Network architecture changes

Get rid of all those (unprotected) DSL lines …

Implement a centralized remote maintenance system• For internal personnel• For external personnel

Have your process networks frewalled ...

Page 32: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 32

Network architecture changes

But frst…

create a Zone concept

● Zone concept policy● Defne security levels● Defne an access matrix

Page 33: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

ApproachNetwork architecture changes – access matrix

Page 34: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 34

System changes – patching & hardening

Operating systemsNetwork systemsApplications (e.g. OPC)

Operating systems3rd party applications

Every x months

Page 35: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

IDS / IPS functionality (make sure you don’t create a DOS)

Central Event monitoring & alerting => SIEM

System monitoring (HIDS/HIPS)

2016 Scada security 35

Monitoring

Page 36: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 36

Authentication (logical & physical)

Combine several methods for more secure zones

Page 37: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

But most important:

Put security in the objectives/KPI’s of people2016 Scada security 37

Responsibilities – RACI matrix

Page 38: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Approach

2016 Scada security 38

Set realistic goals

Page 39: Scada/ICS SecurityOther things to verify Is hardening applied? How are applications started? As Admin? Communication between applications? Cleartext? Can you “break out” of the

Questions?Dieter Sarrazyn ([email protected])

@dietersar

https://be.linkedin.com/in/dietersarrazyn

2016 Scada security 39