security of scada & energy management systems - · pdf filesecurity of scada & energy...

23
Security of SCADA & Energy Management Systems Jean-Louis COULLON EMS/DMS Operations Director [email protected]

Upload: trinhliem

Post on 30-Jan-2018

239 views

Category:

Documents


7 download

TRANSCRIPT

Security of

SCADA & Energy Management Systems

Jean-Louis COULLONEMS/DMS Operations [email protected]

AREVA proprietary information - Jan, 20082 2

Overview

� What is a SCADA/Energy Management System (EMS/DMS)

� The Security Issues

� The Industry reaction

� AREVA solutions

AREVA proprietary information - Jan, 20083 3

MarketManagementSystems(MMS)

Energy & Distribution Management Systems (EMS / DMS) E

MS

/ D

MS

/ M

MS

Dedicatedtelecommunication network D

ata

Com

s

Energy Management Systems: The Overall Scope

Substation Control

T&D Substation

Measurement

T&D Substation

Protection

T&D Substation

Sub

stat

ion

Aut

omat

ion

AREVA proprietary information - Jan, 20084 4

AREVA proprietary information - Jan, 20085 5

Goals and Main Interfaces (by operation criticality order)

� Goals:

�Operate the Network and Power Plant devices/equipment

�Make Network electrically secure at all times

�Control Generation to meet Demand in the most economical way

�Record history of operations

� Interfaces/External Flows/Access Points:

�1: Core Data Acquisition & Control (serial, IP)

�2: Operators

�3: Data Acquisition & Control with external Control Centers

�4: External Users & Applications (including backup site)

�5: Replicated Servers for External Publication

Security Categorization in Control Systems

SCADA system

= {(Confidentiality, LOW/MED), (Integrity, HIGH), (Availability, HIGH)}

AREVA proprietary information - Jan, 20086 6

EMS Inside and Outside flows

11

2233

4455

AREVA proprietary information - Jan, 20087 7

Organized Perimeters

11

22

33

44 55

1144

AREVA proprietary information - Jan, 20088 8

EMS/DMSTypical HW configuration

PDS/DTS Server

PDS/DTS Server

System ConsolesSystem Consoles

RTU a

Serial RTU Communications:

2 x 2 Terminal servers

Serial RTU Communications:

2 x 2 Terminal servers

RTU b RTU n

HIS ServerHIS Server OAG ServersOAG Servers

Router 1

Router 2

WAN Interface

WAN Interface

WAN

RD/web Server

RD/web Server

LANLAN

SCADA/EMSDMS ServersSCADA/EMSDMS Servers

Option:OMS Server

Option:OMS Server

Front End Servers

(2 x 4 FEP)

Front End Servers

(2 x 4 FEP)

Time & Frequency

Time & Frequency

Integrated Wall Display System

Integrated Wall Display System

Color Printer (5)

Color Printer (5)

Dispatcher Operator Console (22)Dispatcher Operator Console (22)

To external users

Router 1

Router 2

WAN

WAN Interface

WAN Interface

Archive Server

Archive Server

Option: A4 Laser Printer

(22)

Option: A4 Laser Printer

(22)

11

22

33

44

55

AREVA proprietary information - Jan, 20089 9

Yes, there is a risk

� 2003: Slammer worm penetrates a US Utility

�Power plant Safety monitoring system was disabled for 5 hours

� Ingress was through a T1 line from an insecure contractor network

� Multiple ingress point found to bypass the firewall

� Slammer is an MS-SQL exploit

� Microsoft had released a patch 6 months before !

� 2007: Aurora demonstration by Idaho National Lab (INL)

�A video showing a cyber attack in a demonstration power plant

AREVA proprietary information - Jan, 200810 10

� What is a SCADA for Energy Management (EMS/DMS)

� The Security Issues

� The Industry reaction

� AREVA solutions

AREVA proprietary information - Jan, 200811 11

Secure Control Systems in the Energy Sector: initiated in the US

� 2002: NERC Vulnerability and Risk Assessment document

� 2003: NERC “Urgent Action 1200” standard

� JAN 2006: DOE Roadmap� The Vision

In 10 years, control systems for critical applications will be designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function.

� Roadmap Scope

� Electricity, oil, gas, and telecommunication sectors

� Legacy and next-generation systems

� Near-, mid-, and long-term activities

� Research and development (R&D), testing, best practices, training and education, policies, standards and protocols, information sharing, and implementation

� Timeline: 2006 – 2015

� 2006: NERC standards CIP 002 to 009 (Critical Infrastructure Protection)� Replaces UA 1200

� 2007: CIP standards present in most specifications worldwide

� 2007: IEC 62351 standard published

AREVA proprietary information - Jan, 200812 12

UA 1200 and CIP 002-009 standards

AREVA proprietary information - Jan, 200813 13

Critical Cyber Assets

AREVA proprietary information - Jan, 200814 14

CIP 002 to 009:example of next level details

� CIP 002: Critical Cyber Asset Identification� Compliance timetable

� R1. Identification Method

� R2. Critical Asset Identification

� R3. Critical Cyber Asset Identification (uses a routable protocol, is dial-up accessible)

� R4. Annual Report

� CIP 003: Security Management Controls� Compliance timetable

� R1. Cyber Security Policy (incl. emergency situations)

� R2. Leadership (implementation of standards)

� R3. Exceptions

� R4. Information Protection� R4.1 shall include op procedures, network topology, floor plans of computing

centers, equipment layout, disaster recovery plans, incident response plans, security configuration information

� R5. Access Control

� R6. Change Control and Configuration Management

AREVA proprietary information - Jan, 200815 15

IEC/TC57 standardisation work on Security Requirements, Threads, Countermeasures and Management

IEC 62351-1 Data and Communication Security

AREVA proprietary information - Jan, 200816 16

IEC status

2007-06Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850

IEC/TS 62351-6 {Ed.1.0}

2007-06Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS

IEC/TS 62351-4 {Ed.1.0}

2007-06Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security -Profiles including TCP/IP

IEC/TS 62351-3 {Ed.1.0}

2007-05Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security -Introduction to security issues

IEC/TS 62351-1 {Ed.1.0}

DateTitlePublication

Data and communication security - Part 8: Develop recommendations for a comprehensive security process for power industry operations environments

CANDraft cancelled

IEC/TS 62351-8 Ed. 1.0

Data and communication security - Network and system management(NSM) data object models

PNWProposed New Work

IEC/TS 62351-7 Ed. 1.0

Power systems management and associated information exchange -Data and Communication Security - Part 5: Security for IEC 60870-5 and Derivatives

CDTSCirculated DraftTechnicalSpecification

IEC/TS 62351-5 Ed. 1.0

Power systems management and associated information exchange - Data and communication security - Part 2: Glossary of terms

CDTSCirculated DraftTechnicalSpecification

IEC/TS 62351-2 Ed. 1.0

TitleCurrent StageProject

AREVA proprietary information - Jan, 200817 17

� What is a SCADA for Energy Management (EMS/DMS)

� The Security Issues

� The Industry reaction

� AREVA solutions

AREVA proprietary information - Jan, 200818 18

Summary of AREVA Security Initiatives

� Close the doors ! (full “security aware” release = 2003)� Security Guides (network, routers, ports, IDS, ..)

� Hardening Guides for each OS (install, configuration, updates, …)

� Comply to NERC “Urgent Actions” 1200, NERC draft 1300� Periodic Evaluation of the Situation at INL� Train developers to secure programming� Partnerships oriented on security (Symantec, Microsoft, …)� Adopt secure protocols

� SSH, SFTP, …� Secure ICCP� Secure DNP� VPN over ISD

� Regularly Certify and deliver Security Patches� Deliver Security Layered Product (e-terratrust)

� Microsoft AD as the identity store� Client Authentication using Kerberos� Support Linux and Windows on the Server side

� Comply to NERC CIP 002 to CIP 009 standards� Embed security controls by design into new platform core components

AREVA proprietary information - Jan, 200819 19

INL evaluation

� 2 evaluations conducted (2005, 2006)

� Report is available to our Customers (NDA required)

AREVA proprietary information - Jan, 200820 20

Use secure protocols:DNP and ICCP (Inter-Control Center Protocol)

� ICCP �has been the Industry standard for years

�Optional support for security (mutual authentication and encryption)

� At the transport level (TLS)

� At application level (MACE = MMS Application Certificates Exchange)

�TLS and MACE use X.509 certificates

� IEC 870-5.104�Encryption via TLS on top of IP - or VPNs

� DNP 3.0 over IP�Secure versions: Encrypted DNP data stream on IP (via TLS

- SSL – X509)

AREVA proprietary information - Jan, 200821 21

Outline of AREVA Security Plan� Define Security Objectives

�Confidentiality – Integrity - Availability

� Deploy Security Concepts

�Authentication, Authorization, Accounting

�Encryption, Digital Signature

� Evangelize / Implement Security Principles in Products and Projects

� Identify Assets

�Minimize your attack surface

�Use defense in depth

�Use standard protocols

�Use least privilege

�Assume external systems are insecure

�Plan on failure and fail to a secure mode

AREVA proprietary information - Jan, 200822 22

Examples of Specific Measures takenon a concrete project (National Control Center)

� User authentication (Windows) using certificates on smart cards (Active Directory as certificate authority)

� VPN creation on Dial-up communication using RSA secure ID (Radius server)

� At the Main Control Center:

�1 set of IDS/IPS appliance

�Redundant Firewalls to isolate the SCADA LAN from the DMZ, the BCC, the Backup control room, the DTS and the corporate LAN

�1 set of IDS/IPS appliance + redundant Firewalls to protect the RTU LAN from the remote site and ICCP links

� Same arrangement at the Back Up Control center

AREVA proprietary information - Jan, 200823 23

Questions ?Questions ?