10
\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 1 of 10 Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection Tobias WALK ILF Consulting Engineers GmbH Germany Abstract Pipeline Supervisory Control And Data Acquisition (SCADA) systems in general form a critical IT-Infrastructure which gets nowadays more and more exposed to well- directed cyber attacks. A very popular example would be the Stuxnet-Worm which has been specifically developed and distributed to attack modern control systems. In order to protect a critical IT-Infrastructure against modern cyber-attacks various aspects have to be considered during the design as well as during operation and maintenance of these systems. This exercise is not a simple process or one time event as it needs a consequent and continues follow up during the entire life-time of the system. The article will provide examples of IT threats within process control systems. It will briefly explain the developments of the control system components and its system architecture during the last decade in order to identify and flag their vulnerability. Based on it the required IT-Security within a process control environment will be explained and the classification of problem areas will be identified. The presentation will provide examples for a security guideline of a critical IT- Infrastructure – like a pipeline SCADA system – to mitigate modern cyber attacks. These guidelines need to be reflected already during the design and commissioning phase of a new SCADA system in order to “design in” security as an element of the new system which needs also a strict follow up for operation and maintenance during the life cycle of the plant. ILF Consulting Engineers is involved as a designer within many international Oil & Gas projects for more than 40 years. A reliable and highly available control system IT-Infrastructure forms an important part of these projects. 1 OIL & GAS PLANTS DEEPLY DEPENDS ON CONTROL & COMMUNICATION TECHNOLOGY SCADA systems are used to control and monitor physical processes, commonly used within the pipeline industry especially for the oil & gas transportation but also for transmission of electricity or distribution of water and many other systems used as the basis of modern society. SCADA systems do provide via their Human Machine Interface to operators a transparent real time view on a complex process environment which is required from

Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

  • Upload
    leminh

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 1 of 10

Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection

Tobias WALK

ILF Consulting Engineers GmbH

Germany

Abstract

Pipeline Supervisory Control And Data Acquisition (SCADA) systems in general form

a critical IT-Infrastructure which gets nowadays more and more exposed to well-

directed cyber attacks. A very popular example would be the Stuxnet-Worm which

has been specifically developed and distributed to attack modern control systems.

In order to protect a critical IT-Infrastructure against modern cyber-attacks various

aspects have to be considered during the design as well as during operation and

maintenance of these systems. This exercise is not a simple process or one time

event as it needs a consequent and continues follow up during the entire life-time of

the system. The article will provide examples of IT threats within process control

systems. It will briefly explain the developments of the control system components

and its system architecture during the last decade in order to identify and flag their

vulnerability. Based on it the required IT-Security within a process control

environment will be explained and the classification of problem areas will be

identified.

The presentation will provide examples for a security guideline of a critical IT-

Infrastructure – like a pipeline SCADA system – to mitigate modern cyber attacks.

These guidelines need to be reflected already during the design and commissioning

phase of a new SCADA system in order to “design in” security as an element of the

new system which needs also a strict follow up for operation and maintenance during

the life cycle of the plant.

ILF Consulting Engineers is involved as a designer within many international Oil &

Gas projects for more than 40 years. A reliable and highly available control system

IT-Infrastructure forms an important part of these projects.

1 OIL & GAS PLANTS DEEPLY DEPENDS ON CONTROL & COMMUNICATION

TECHNOLOGY

SCADA systems are used to control and monitor physical processes, commonly used

within the pipeline industry especially for the oil & gas transportation but also for

transmission of electricity or distribution of water and many other systems used as

the basis of modern society.

SCADA systems do provide via their Human Machine Interface to operators a

transparent real time view on a complex process environment which is required from

PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
6th Pipeline Technology Conference 2011
PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
PC
Typewritten Text
Page 2: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 2 of 10

process control, operational and integrity point of view. The operator can start, stop

and select from remote various operation regimes of the plant and prevent critical

process conditions on information gathered and provided by the SCADA system.

Customized dynamic process information displays and alarm handling managers are

supporting these tasks and form an integral part of the SCADA system.

SCADA systems are based on communication networks as they interconnect and

integrate field equipment (e.g. actuators, process sensors or pumps) via Remote

Terminal Units (RTUs) and local station / unit control systems based on

Programmable Logic Controllers (PLCs) with the control center computer system.

SCADA systems are required for an efficient management of a remote and widely

distributed process and they are supporting the pipeline integrity.

A general SCADA system layout is shown within figure 1. Nowadays the Process

Control Networks are also interconnected with Office Networks to provide process

data to Enterprise Resource Planning (ERP) applications and other Management

Software as well as to other 3rd party networks for data exchange or maintenance

purposes.

The use of SCADA systems has become popular since the 1960’s as a need arose

to more efficiently monitor and control the status of remote equipment. The first

SCADA system generation had ‘monolithic’ system architecture and was based on

redundant mainframe computers. These mainframe computers did collect all process

data from the field and hosted a real time process database. At that time computer

networks did not exist and communication protocols with Remote Terminal Units

Page 3: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 3 of 10

were often of proprietary type. SCADA systems were independent stand-alone

systems with no connectivity to other systems.

The processing of the second SCADA system generation was ‘distributed’ across

multiple stations which communicated via a Local Area Network (LAN) in real time

with each other. Each station was responsible for its dedicated tasks which reduced

significantly the performance, capacity and costs of the required computer hardware

compared with the mainframes of the first generation. However, the utilized network

protocols were still mostly proprietary and optimized for real time applications, quick

response times and redundancy. As these networks have been still used exclusively

by the SCADA system, data security or data encryption was not an issue at that time.

Only very few people beyond the developers and hackers knew enough to determine

how secure a SCADA installation really was and they had no interest to flag or

discuss the status-quo of its security.

The actual third SCADA system generation is based on open system architecture

rather than a vendor-controlled proprietary environment. The SCADA system utilizes

open standards and protocols, thus distributing functionality across a Wide Area

Network (WAN) rather than a LAN. It is easier to connect third party peripheral

devices (like printers or hard disks) to the use of open architecture. WAN protocols

such as Internet Protocol (IP) are used for communication between the operator

master station and communications equipment. Due to the usage of standard

protocols and the fact that many networked SCADA systems are nowadays also

accessible from the Internet, the actual systems are potentially vulnerable to remote

cyber-attacks. On the other hand, the usage of standard protocols and security

techniques means that standard security improvements are applicable to the SCADA

systems, assuming they receive timely maintenance and updates.

Page 4: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 4 of 10

SCADA systems are reality since decades, but market developments do migrate its

infrastructure from proprietary, obscure and isolated systems towards standardized,

documented and connected ones. (refer to figure 2: development of system

components).

2 CONFLICTING CULTURES OF IT-SECURITY

While technologies such as Ethernet and TCP/IP allow for significant cost savings

and improved interfacing for industry, it is important to understand that their origins

are derived from a culture very different from the process control provided by SCADA

systems. Even an Internet user newcomer can spot these differences in terms of

reliability – occasional failures are common and tolerated on the Internet while most

control systems are expected to operate for months, if not for years, without

interruption. Similarly, the tradition of beta testing many new Internet products in the

field and recovering from problems by simply rebooting servers or switches contrasts

sharply with standard SCADA practices. This is not surprising since the risk impact of

outages on the Internet are typically loss of data, while outages in the process

environment will certainly result in loss of production and may even cause loss of

equipment or life.

The Internet culture and its created technologies are based on the idea that

performance is paramount and outages, while undesirable, are acceptable. This is

clearly not true for industrial process control systems. These differences in

• proprietary systems

• individual customized solutions

• small quantities / number of installations

• vendor specific communication protocols

• high development costs

time

1980 1990 2000

• standardized kits & systems

• out of the box solutions

• large quantities / number of installations

• standardized communication protocols

• interoperability between different vendors

2010

Page 5: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 5 of 10

expectations are briefly summarized within table 1 and need to be kept in mind by

implementing solutions of the Internet world within an industrial control environment.

Internet Environment Process Control Environment

Reliability Occasional failures tolerated

Beta test in the field acceptable

Outages intolerable

Thorough QA testing expected

Risk Impact Loss of data Loss of production, equipment, life

Performance High throughput demanded

High delay and jitter accepted

Modest throughput acceptable

High delay is a serious concern

Risk

Management

Recover by reboot

Safety is a non-issue

Fault tolerance essential

Explicit hazard analysis expected

Security Most sites insecure

Little separation between

intranets on same site

Focus is central server security

Tight physical security

Isolated Office network from plant

network

Focus is edge control device stability

3 SECURITY ISSUES WITHIN SCADA SYSTEMS

Most companies are reluctant to report cyber attacks or even internal accidents as it

is not supporting their reputation or they are embarrassed about it. Incidents involving

health, safety or environmental degradation may even jeopardize their company’s

license to operate. The British Columbia Institute of Technology (BCIT) maintains an

industrial cyber security incident database that tracks incidents involving process

control systems in all sectors of manufacturing. The affected parties reported for 50%

of these registered incidents that their losses exceeded $ 1 million. The Carnegie

Mellon Software Engineering Institute reports at least 2 cases with financial losses in

the range of “tens of millions of dollars”.

According to a report written by IBM’s Global Security Intelligence team, ‘the global IT

threat landscape is going through a fundamental shift, or evolution, in cyber crime

from pervasive global outbreaks to smaller, stealthier attacks targeted at specific

organizations'. This statement can be easily supported by the sophistication of

hacker tools (refer to figure 3).

Page 6: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 6 of 10

The following showcases shall flag the risk potential which are real examples of a

non exhaustive list.

� In July 2010 the computer worm Stuxnet was discovered which is the first

identified malware subverting PLCs of industrial control systems. The worm

initially spreads indiscriminately, but includes a highly specialized malware

payload that is designed to target only Siemens SCADA systems that are

configured to control and monitor specific industrial processes.

� In 2004, a disgruntled former SCADA supervisor caused raw sewages of

nearly 264.000 gallons to the sewer system of an Australian city

� Ohio Davis-Besse Nuclear power plant safety monitoring system was offline

for 5 hours due to Slammer Worm in January 2003

� In 2000, the Russian government announced that hackers succeeded in

gaining control of the Gazprom pipeline network

� In 1995, at TransCanada PipeLines Ltd compressor station #30, two pipeline

ruptured and caught fire (because of disabled low pressure and temp alarms)

From these examples the following general cyber attack scenarios can be derived:

1. Issuing unauthorized commands to control equipment

2. Sending false information to a control system operator that initiates their

inappropriate actions

for hacking

Technical knowledge required for defending

Page 7: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 7 of 10

3. Disrupting control system operation by delaying or blocking the flow of

information through the control network

4. Making unauthorized changes to control system software to modify alarm

thresholds or other configuration settings

5. Resource unavailability that is the consequence of malicious software (e.g.,

virus, worm, Trojan horse) propagated through the control network

These scenarios can be justified as realistic risk potentials as common SCADA

communication protocols provide no authentication and therefore no confidentiality.

Furthermore SCADA systems are based on common hardware and operating

software and are vulnerable to viruses. However SCADA systems do need real-time

performance and at the same time not properly selected and configured antivirus

application software could degrade their performances enough to make the system

useless or dangerous. These concerns are reflected by SCADA system end-users

which is one of the reasons that antivirus software has not been more widely adopted

within these systems. Patch Management is another known problem within the IT

world, changing anything in the continuous operating SCADA world is another

challenging task which is often significantly delayed or never performed during the

lifetime of these systems.

4 SPECIFIC SECURITY GUIDELINES

A single security product or technology cannot adequately protect an industrial

control system, so a multiple layer strategy involving two (or more) different

overlapping security mechanisms is desired to avoid a vulnerability in one technique

from allowing a compromise. Securing a SCADA system is based on a combination

of effective security policies and a properly configured set of technical security

controls. An initial list of topics, which needs to be considered within that respect are:

� Security plan with security policies needs to be in place to ensure safe and

reliable operations.

� Security issues needs to be addressed throughout the lifecycle of the SCADA

system, starting from the architecture to procurement to installation and

followed up during maintenance and decommissioning.

� The network topology for the process control network shall be based on

separate dedicated communication layers protected by firewalls. The most

critical communication links shall be hosted within the most secure and reliable

layer.

Page 8: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 8 of 10

� Apply security techniques such as encryption to SCADA communications and

data storage.

� Wireless networks have an elevated level of security concerns within a

process control network which needs to be carefully evaluated and assessed

for risks prior installation. Wireless network technology changes frequently

and it’s security depends on the ability to stay current and protected.

� Logical separation between the process control networks and the corporate

office networks by utilizing a DMZ network architecture which prevents any

direct traffic between these networks.

� All critical components needs to be redundant and based on redundant

networks.

� The process control system design needs to be fault tolerant to prevent

catastrophic cascading events. System failures shall shut-down the plant in a

secure manner.

� Restrict physical access to the process control network and devices. Disable

unused ports and services on system devices and verify that this will not

impact the operation.

� Restrict SCADA system user privileges to only those that are required to

perform each person’s job (i.e., establishing role-based access control and

configuring each role based on the principle of least privilege).

� Consider the use of strong authentication mechanisms for users of the

process control network as well as for the corporate office network and keep

these separate (i.e. process control network accounts do not use corporate

network user accounts). Disable any default user accounts and replace simple

vendor passwords.

� Remove access rights given to the system vendor once the work has been

completed.

� Implement security controls such as antivirus software and file integrity

checking software, where technically feasible, in order to prevent, deter,

detect, and mitigate the introduction, exposure and propagation of malicious

software to, within, and from the process control network.

� Deploy security patches after testing all patches under field condition on a test

bed environment in a timely manner.

Page 9: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 9 of 10

Reference is made to the following norms and standards and other articles derived

from the Internet:

API 1164 (2nd edition, June 2009): Pipeline SCADA Security

API Security Guidelines for the Petroleum Industry (3rd edition, April 2005)

Germany’s Federal Office for Information Security: IT-Grundschutz

ISO/IEC 27001:2005 (issued October 2005): Information technology -- Security

techniques -- Information security management systems -- Requirements

ISO/IEC 27002:2005 (issued July 2007): Information technology - Security

techniques - Code of practice for information security management

Journal of Computers, Vol. 5, No. 3, March 2010: “A Risk-Assessment Model for

Cyber Attacks on Information Systems”

NIST Special Publication 1058 (Version 1.0, Sept. 2006): Using Host-based Anti-

virus Software on Industrial Control Systems: Integration Guidance and a Test

Methodology for Assessing Performance Impacts

VDE 2004 Congress, Berlin, October 2004 “The Myths and Facts behind Cyber

Security Risks for Industrial Control Systems”

www.wikipedia.org

Page 10: Critical IT-Infrastructure like Pipeline SCADA systems ... · ILF paper for the 6. th. Pipeline Technology Conference 4. - 5. April 2011, Hannover, Germany (Session 5: Integrity Management

ILF paper for the 6th Pipeline Technology Conference

4. - 5. April 2011, Hannover, Germany

(Session 5: Integrity Management – Technologies, critical IT-Infrastructure protection)

\\demucsfs002\projects\xx01\xx0102\sv&doc\ILFM_AD\XX0102-ILFM-AD-0109-rev-0.doc Page 10 of 10

CV of the author

As a native German, Tobias Walk studied Electrical Engineering and Information

Technology at the Technical University in Munich with special focus on Automation

and Control Systems. In 1996 he received his Diploma and he started 1997 to work

as project engineer for ILF Consulting Engineers within the Oil & Gas market. Over

the past 13 years, he has held a number of positions of increasing responsibility

within ILF. Since 2008 he is the ILF Director for Electrical Engineering, Automation

and IT-Systems. Furthermore, end of 2009 he was nominated as Corporate Director

for the ILF Russia Oil & Gas activities.

He has been deeply involved as owners engineer within the design and

commissioning of various international pipeline projects (amongst others: BTC Crude

Oil Pipeline, ADCOP Habshan - Fujairah Pipeline, Bourgas-Alexandroupolis Crude

Oil Pipeline, ESPO Pipeline, Revamp of Janaf Crude Oil Pipeline) during the last

decade. Within these projects he was also responsible for the design of various

process control and safety systems. Furthermore he was involved as an external

expert or chairman within various SIL review workshops to identify and validate the

required integrity level.

Contact

Tobias Walk ILF Consulting Engineers GmbH Werner-Eckert-Street 7 D-81829 Munich phone: +49 (0)89 – 25 55 94 – 244 fax: +49 (0)89 – 25 55 94 – 44 244 eMail: [email protected]