38
'<1$0,& 326,7,21,1* &21)(5(1&( 2FWREHU &<%(56(&85,7< :KR 6DLG WKDW '3 'RHV 1RW 5K\PH ZLWK &\EHUVHFXULW\ 2OLYHU &DGHW $UQH 5LQQDQ .RQJVEHUJ 0DULWLPH

1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time
Page 2: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

WHO SAID THAT DP DOES NOT RHYME WITH CYBERSECURITY?Olivier Cadet, Arne Rinnan

Page 3: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

AGENDA

1. Introduction2. DP System – Getting Smarter and More Interconnected3. Cyber-threats in DP and countermeasures

– Example 1: Real-time Process Control Computer– Example 2: GNSS

4. Conclusion

16.11.2016 Page 2WORLD CLASS - through people, technology and dedication

Page 4: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

DIGITALIZATION DRAWS NEW INDUSTRY BOUNDARIES *Example of DP in the Offshore Market Segment

16.11.2016 Page 3WORLD CLASS - through people, technology and dedication

1. DP Product

2. “Smart” DP Product

+

Pipelaying Function

3. Smart, Connected (Remote Services) DP

+PROPULSION

POWER

4. DP part of vessel operations

++ +

5. DP part of wider operations

ROV

OSV

Weather Data

System

Operations Management

Propulsion

Power

Weather Forecast

Weather App

* Adapted from Harvard Business Review article from Michael E. Porter and James E. Heppelmann “How Smart, Connected Products Are Transforming Competition”, Nov. 2014

Vessel Vessel

Pipelaying Function

PlanningOptimizingReportingLearning

Focus on fulfilling one function

(maintain position)

Page 5: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

INCREASED COMMUNICATION PATHS

• Ever-increasing communications capacity in the maritime segment• Ships are not isolated entities anymore, but «connected» with an increasing

amount of data generated that enable new applications

16.11.2016 Page 4WORLD CLASS - through people, technology and dedication

Source: Ship Connectivity position paper by DNV GL with data from COMSYS

Maritime VSATs in service

p

Page 6: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

CYBERSECURITY

“Protection from theft or damage to the hardware, software and to the information generated, as well as from disruption or misdirection of the services they provide”

16.11.2016 Page 5WORLD CLASS - through people, technology and dedication

People

Technology

Processes

Cybersecurity is a continuous process that needs to be considered as a lifecycle• Planning• Development• Installation & Commissioning• Utilization & Maintenance• Obsolescence

Page 7: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

STATE1 OF THE MARITIME INDUSTRY ON CYBERSECURITY

16.11.2016 Page 7WORLD CLASS - through people, technology and dedication

Overall low awarenessLow level of knowledge sharing and trainingComplexity of Information Communication and Technology landscapeLack of direct economic incentives for cybersecurityFragmented governanceRegulatory framework, standards and recommended practices evolving

1 Source: Analysis of cyber security aspects in the maritime sector, ENISA, Nov 2011

Page 8: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

June 2016IMO Guidelines on Maritime

Cyber Risk Management

ACCELERATION OF GUIDELINES AND CYBER STRATEGIES

16.11.2016 Page 8WORLD CLASS - through people, technology and dedication

January 2016

June 2015February 2014

Sept. 2016

Technical Standards SeriesIEC 62443ISO/IEC 27001

revised in 2013

July 2016

Page 9: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

AGENDA

1. Introduction2. DP System – Getting Smarter and More Interconnected3. Cyber-threats in DP and countermeasures

– Example 1: Real-time Process Control Computer– Example 2: GNSS

4. Conclusion

16.11.2016 Page 9WORLD CLASS - through people, technology and dedication

Page 10: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

DP AS A SMART CONNECTED SYSTEM

Page 10

ADP503 operator desk (1975 – 1989)

Integrated workstation with remote connection to

Customer Support Center

Self-contained system fulfilling one specific function (station-keeping)

Smart connected system contributing to the performance and safety of operations

Page 11: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

DP AS A SYSTEM OF SYSTEMS

Page 11

Page 12: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

16.11.2016 Page 12WORLD CLASS - through people, technology and dedication

CONVERGENCE OF IT AND OT…… introduces new cyberthreats in DP

Page 13: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

AGENDA

1. Introduction2. DP System – Getting Smarter and More Interconnected3. Cyber-threats in DP and countermeasures

– Example 1: Real-time Process Control Computer– Example 2: GNSS

4. Conclusion

16.11.2016 Page 13WORLD CLASS - through people, technology and dedication

Page 14: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

CYBERTHREATS IN DP

16.11.2016 Page 15WORLD CLASS - through people, technology and dedication

Types of potential attacks affecting DP

• Denial of service (DoS)• Direct access• Spoofing• Eavesdropping• Phishing

On our individual components• We could be our own worst enemy… Poor software

designs could lead to DoS. Not uncommon to observe during SW development phase.

Countermeasures include development process quality and extensive testing

On the network infrastructure• Could be more problematic and serious. Has been

observed a dozen of times over the last 10 years on DP systems overall. Network storms of different kinds could lead to DoS. Could also happen on serial interfaces.

Countermeasures include SW quality checks, load protection on controllers, extensive testing and resilience testing by use of Achilles Level 1 test

Page 15: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

16.11.2016 WORLD CLASS - through people, technology and dedication Page 16

EXAMPLE 1 – RCU cybersecurity

Page 16: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

EXAMPLE 1 – REALTIME PROCESS CONTROLDevice level test (IEC 62443 4-2)

16.11.2016 Page 17WORLD CLASS - through people, technology and dedication

At the controller level we expect that physical access is limited.

To mitigate a Denial of Service (DoS) attack you need to have an Excessive Load Protection ELP of the controller.

The ELP of the controller has to work independently of the configuration of network switches/firewalls.

Page 17: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

EXAMPLE 1 – REALTIME PROCESS CONTROLDevice level test (IEC 62443 4-2)

16.11.2016 Page 18WORLD CLASS - through people, technology and dedication

Achilles Level 1 Certification tests and monitors:

Ethernet, ARP, IP, ICMP, TCP and UDPimplementations on the tested device to verify that it demonstrates pre-defined levels of reliability and robustness in OSI layers 2–4.

Achilles Level 1 – Device test

Certification Test Types• Resource Exhaustion Tests: Tests that try to exhaust a particular resource of the Device

Under Test. Storms tests that send packets at fast rates in an attempt to overflow the device under test’s CPU and memory resources.

• Invalid Packet Tests: Tests that send malformed, invalid and contextually unexpected packets to the device under test. The Achilles Test Platform uses Wurldtech’s grammar-based robustness testing framework to create these invalid packets.

Page 18: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

16.11.2016 Page 19WORLD CLASS - through people, technology and dedication

At system level KM utilize the Achilles Level 1 test and KM made storm tests to check the vulnerability of the system.

The KM made tests consists of recorded messages from a KM system.

The defense is therefore dependent on out-of-sequence detections, check sums and other structural things to ensure correct and reliable behavior of the KM system.

The KM storms are injected between the switches that segments the technical network.

EXAMPLE 1 – REALTIME PROCESS CONTROLSystem resilience testing (IEC 62443 3-3)

Page 19: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

16.11.2016 WORLD CLASS - through people, technology and dedication Page 20

EXAMPLE 2 – GNSS cybersecurity

Page 20: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

REMINDER ON DP REFERENCE SYSTEMS

• Reference systems are crucial to DP, since they are used to estimate the vessel position which in turns determine the thrust of the propulsion system

• A DP operation should never rely on just one reference system, and preferably use reference systems based on different measurement principles

• Resilience is a fundamental feature of a DP reference system, and can be categorized as:– External resilience – using multiple reference systems based on different

measurement principles and handled by algorithms balancing accuracy, availability and integrity

– Internal resilience – implemented by signal processing and algorithms in each individual reference system

16.11.2016 Page 21WORLD CLASS - through people, technology and dedication

Page 21: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

DP REFERENCE SYSTEMS AND CYBER THREATS

16.11.2016 Page 22WORLD CLASS - through people, technology and dedication

Denial of Service (DoS)• Signal interference• Signal jamming• System intervention

Spoofing• Fake signals• System intervention

No reference system is guaranteed protected against cyber threats

Spoofing usually takes considerably more resources than Denial of Service

A multitude of reference systems makes hostile attacks more difficult and unlikely to succeed

Page 22: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

CYBER THREATS TO GNSS

• Used to be a concern only for military users, but cyber threat awareness is increasing also in the civil sector

• Military users have access to encrypted signals, but a long range of protection barriers is available to civil users:– RAIM (Receiver Autonomous Integrity Monitoring) detecting and removing measurement outliers– Combine data from several systems (GPS, Glonass, Beidou and Galileo)– Use data from different frequencies (every GNSS supports at least dual band signals)– Combine augmentation data from different correction sources (e.g. Orbit&Clock, SBAS, IALA)– Integrate GNSS and inertial data– Use parallel processing of several positions to detect and remove erroneous observations

16.11.2016 Page 23WORLD CLASS - through people, technology and dedication

Page 23: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

GNSS INTERFERENCE (DoS)

• Interference is usually non-intentional

• Interference might be caused by radars or communication equipment

• A usual cause of interference is faulty GNSS antennas starting to transmit (might be a consequence of water intrusion causing the LNA to oscillate)

• It is usually a good protection to use multiple GNSS systems with a reasonable distance between antennas (>30m if possible).

• Monitoring the signal levels (SNR) gives an indication of interference problems

16.11.2016 Page 24WORLD CLASS - through people, technology and dedication

Are any of these antennas an occasional transmitter?

Page 24: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

GNSS JAMMING (DoS)

• Jamming is intentional transmission in the GNSS frequency bands aiming to block the satellite signals at the user antenna

• GNSS jamming over short distances can easily be done by using low-cost jammers available on the Internet for just a few dollars and is hard to detect

• GNSS jamming over larger distances (> line-of-sight) requires more effort and is easier to detect

16.11.2016 Page 25WORLD CLASS - through people, technology and dedication

A GNSS jammer available on the Internet

Page 25: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

GNSS SPOOFING

• GNSS spoofing is done by transmitting a fake GNSS signal to fool the reference system to believe it is in a different position

• Spoofing requires high skills and large resources to be a significant threat to a DP operation

• The spoofer needs to be located vicinity of the GNSS antennas to be effective

• RAIM algorithms can be used to check inconsistencies between GNSS observations

• A GNSS reference system integrated with INS/IMU can be capable of identify a spoofing situation

• A dual antenna GNSS reference system will provide additional protection against spoofing

• Authentication methods can be used to verify the source of GNSS data

• Using CRPA (Controlled Radiated Pattern Antennas) will reduce the risk of both jamming and spoofing

16.11.2016 Page 26WORLD CLASS - through people, technology and dedication

Page 26: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

AGENDA

1. Introduction2. DP System – Getting Smarter and More Interconnected3. Cyber-threats in DP and countermeasures

– Example 1: Real-time Process Control Computer– Example 2: GNSS

4. Conclusion

16.11.2016 Page 27WORLD CLASS - through people, technology and dedication

Page 27: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

NEED FOR INCREAED AWARENESS AND MORE TRANSPARENCY IN THE DP COMMUNITY

16.11.2016 Page 28WORLD CLASS - through people, technology and dedication

Collaboration across our industrySharing of best practicesSharing of lessons learnedReporting of incidents

Training

Page 28: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Thank You!

Page 29: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

16.11.2016 WORLD CLASS - through people, technology and dedication Page 30

END-TO-END APPROACH FOR DP…… including a life-cycle management approach

Layers of Cyber Security protection

Physical securityProcedures and policiesFirewalls and network architectureComputer policiesAccount managementSecurity updatesAntivirus solutionsSoftware implementation

DP System

Page 30: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Physical Security

16.11.2016 WORLD CLASS - through people, technology and dedication Page 31

All remote operations done from dedicated secure Remote Operations RoomsRemote Operations Rooms are electronically locked and access-controlledLimited access to offshore equipmentUnused hardware interfaces are physically blocked

Page 31: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Procedures and policies

16.11.2016 WORLD CLASS - through people, technology and dedication Page 32

All remote operations initiated from vessel operatorRemote Safe Job Analysis done before remote operationAll remote operations journaled in remote software and CRMCritical operations done onsite, not remote

Page 32: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Firewalls and network

16.11.2016 WORLD CLASS - through people, technology and dedication Page 33

Separate networks for each customer – MPLS, VLAN and VRF technologyFirewall functionality in global network nodes and local endpointsCertificates for authentication of participantsPoint to point encryption of data trafficStrong network segregationprotecting control system

Page 33: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Computer policies

16.11.2016 WORLD CLASS - through people, technology and dedication Page 34

Marine approved hardwareStandardized Hardware – globally availableHardening of servers and clientsVersioned computer images on offshore installations

Page 34: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Account management

16.11.2016 WORLD CLASS - through people, technology and dedication Page 35

Access to remote operations system through KM Forefront Identity Manager and ADWindows authenticationIntegration with customer Active Directory

Page 35: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Security updates

Cloud servers updated regularlyOffshore server installations only updated with critical updatesOffshore operator stations not updated, exception is control system upgradesOnline update of malware signature filesMinimize download size of updates

Page 36: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Malware protection

Scanning of all network trafficTransparent for the networkUSB protection on all operator stationsNo scanning done on the operator stations

VLAN tagging/802.1Q

MPS

Net-C / Admin zone

3'de party interface (Drilling)

3'de party interface (Subsea)

Data zone

Web zone

VLAN tagging/802.1Q

Page 37: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time

Cyber Security – Software implementation

User authentication using open standards – OpenID Connect, AD and ADFSFine grained role based authorization against resourcesHTTPS encryption on communicationWindows authentication against services and databasesSecurity focus in development process

Page 38: 1 - Dynamic Positioning · 2016-11-18 · AGENDA 1.Introduction 2.DP System –Getting Smarter and More Interconnected 3.Cyber-threats in DP and countermeasures – Example 1: Real-time