21
DNV GL © 2017 Ungraded SAFER, SMARTER, GREENER DNV GL © 2017 Wolf Freudenberg 26 October 2016 Ungraded ENERGY Our holistic view on Cyber Security for wind farm critical infrastructures 1 Digital Data Integration & Management

DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

  • Upload
    others

  • View
    5

  • Download
    1

Embed Size (px)

Citation preview

Page 1: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

SAFER, SMARTER, GREENERDNV GL © 2017

Wolf Freudenberg

26 October 2016

Ungraded

ENERGY

Our holistic view on Cyber Security for wind farm critical infrastructures

1

Digital Data Integration & Management

Page 2: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Contents

� Introduction to Cyber Security for critical infrastructures

� Current challenges

� Our holistic approach

2

Page 3: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Understanding the difference between IT and OTImpact of OT

3

Page 4: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Understanding the difference between IT and OTVital infrastructures

4

Energy & Utilities

Oil & GasChemicals

Automotive

Transport

Page 5: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Understanding the difference between IT and OTImpact of wind farms

5

source: windeurope.org

Current large wind farms

~600MW – Future this will

be larger >1200MW?

What if a wind farm is

totally shutdown by

accident?

Disruption of the power grid

possible when ICS/SCADA

fails of wind farms?

Wind farms will supply

stability to the grid in the

future (reactive and

apparent power)

Page 6: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Understanding the difference between IT and OTReal differences

• Availability, Integrity, Confidentiality

• Real-time process

• Automation Risk

• Component lifetime 15-20 years

• Loss of life

• Fault tolerance essential

• Modest throughput, time critical

• First steps on cyber security, lack of awareness

• Many connections with few messages

• Engineers, Technicians

• Patching difficult, outage planned, vender needed

• Incident: difficult to predict and poss. high costs

• Landscape very diverse

• Confidentiality, Integrity, Availability

• Transactional process

• Information Risk

• Component lifetime 3-5 years

• Loss of data

• Recover by reboot

• High throughput, high delay accepted

• Maturity and knowledge on cyber security

• Many messages per connections

• Computer Scientists

• Patching straightforward, automated often

• Incident: linear cost and easy predicted

• Standard methods and architectures

IT OT

Page 7: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Dealing with automation environmentsISA-95/IEC62264 and ISA-99/IEC62443

7

Le

ve

l 0

Fie

ld

Co

ntr

ol

Primary technology

I/O , Devices, Sensors

Le

ve

l 1

Ba

sic

C

on

tro

l

Le

ve

l 2

Su

pe

rvis

ory

c

on

tro

l

Supervision (SCADA/DMS)

Central OT environmentSystem management

Enterprise

Resource Planning (ERP)

Process Control

(Plant / Unit)

Equipment Control

Intelligent

Electronic Devices

DMS/SCADA Unit Level

Historian Unit Level, DCS (Distributed Control System)

Fleet Control

Enterprise Control

Basic Control

Safety and ProtectionPLC, DCS, black boxes

Le

ve

l 3

Op

era

tio

ns

m

an

ag

em

en

t

Le

ve

l 4

En

terp

ris

e

sys

tem

s

Co

ntr

ol D

om

ain

IT

Lo

ca

l / P

lan

t L

eve

lC

en

tra

lize

d

Page 8: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Reality?Threat Vectors

8

Insider threat

State sponsored actors

Hacking industrial control systems requires expert domain knowledge of the

specific system, physical processes and organization

• State sponsored attacks takes multiple years of preparation

• They only attack when they are sure to succeed!

• They have all the time of the world

• During an attack you are always one step behind!

Insider threat is a big threat because of the fact he/she has already expert

domain knowledge!

Everyone can break a computer!Only experts can break the energy supply

Misuse systems

Non-Targeted Virus / Malware

Page 9: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Reality?Just some incidents

9

10/2014

Black Energy

12/2015

Ukraine Cyber Attack

1982

Siberian Pipeline

07/2010

Stuxnet

11/2010

Doqu based on Stuxnet

05/2012

Flame based on Stuxnet

06/2014

Dragonfly

10/2014

Bad USB

Page 10: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

SAFER, SMARTER, GREENERDNV GL © 2017

Wolf Freudenberg

26 October 2016

Ungraded

ENERGY

Current Challenges

10

Page 11: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Current ChallengesAvailability, Integrity, Confidentiality

11

Real-time integrity checking is important to be able to quickly respond to possible cyber attacks!

Availability is the most important aspect and main focus

We have always relied on our control systems, but can we still do We have always relied on our control systems, but can we still do

that?

False sense of trust? Cyber security was not really part of the False sense of trust? Cyber security was not really part of the

design and implementation! Interconnections do exist!

Do we have time, knowledge and experience to really check the full Do we have time, knowledge and experience to really check the full

system integrity every day or even every hour?

Our first priority should be maintaining system’s integrity in realOur first priority should be maintaining system’s integrity in real-

time before availability!

Monitoring systems to detect changes will support engineers to Monitoring systems to detect changes will support engineers to

maintain and check integrity of the control systems in real-time.

Page 12: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

IT Security Methods

OT/SCADA Landscape

Current ChallengesIT Security projected on OT/SCADA

12

OT/SCADA security is tailor made that starts with risk assessment

OT deals with different kind

of threats

OT/SCADA tailor made for

their designed function

IT Security great inspiration,

we need to re-invent it!

Personnel tailor made for

their job; training

Attacks on OT/SCADA well

prepared and tailored made

OT/SCADA security needs to

be tailor made as well

stop

Page 13: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Current ChallengesIT Security projected on OT/SCADA - Patching

13

Something to think about!

IT Security Methods

Patching and Patch Management

Best practices and seen as the most important method to protect

against cyber attacks

Patching is fixing systems to known vulnerabilities

OT/SCADA systems are mostly hacked with zero-day vulnerabilities

and tailor made malware that both will not be detected

OT/SCADA systems are difficult to patch due to possible risk on

unavailability, overhauls are prepared and planned

It is also possible the vendor does not have the solution or it requires

an total update of several millions of dollars

It shows that patching is not the number one for OT/SCADA. How to

protect these vulnerable systems?

Page 14: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Current ChallengesIT Security projected on OT/SCADA - Encryption

14

Something to think about!

IT Security Methods

Encryption, Cryptography

Seen as the cyber security solution against disclosure of information

Encryption is a good method, however it makes OT/SCADA support

and maintenance more difficult!

Risk on availability and making support more difficult! Do we really

need encryption?

Key management on highly decentralized applications is very

cumbersome, update keys of hundreds of devices

End-to-End encryption makes it for attackers more difficult to learn

from captured traffic, it really need to be a trade off

Just implementing encryption? Use risk assessment to determine the

right actions to solve your problems!

Page 15: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Current ChallengesAppropriate translation to the OT landscape

LegislationOrganizational

Requirements

OT/SCADA

ExpertiseIT Security Policy

IT Security

Methods

Physical Security

AssetsOrganization

Policies and

Processes

Expertise of

standardsExpertise of IT ISMS

Time to change and focus on OT!

OT/SCADA Policy

OT/SCADA

Processes

Incident

Management

Improved Change

ManagementISMS

Architecture

Baseline

Monitoring &

DetectionResponse and Disaster

Recovery Plans

Good OT/SCADA

hygiene

Focus on

Integration

Good collaboration

between IT/OT/SCADA

SCAD

A/I

CS

Page 16: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

SAFER, SMARTER, GREENERDNV GL © 2017

Wolf Freudenberg

26 October 2016

Ungraded

ENERGY

Our holistic approach

16

Page 17: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

How to address the cyber security challenge?Security Management: A Holistic approach

This often includes the view that systems function as wholes and that

their functioning cannot be fully understood solely in terms of their

component parts

Holism is the idea that natural systems (physical, biological,

chemical, social, economic, mental, linguistic, etc.) and their

properties should be viewed as wholes, not as collections of parts

Page 18: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Maturity / Gap Analysis

Risk AssessmentWeighted Risks

(ISMS)Programs /

ProjectsDevice Health

TestEnd to End System Test

Monitoring and Response

Evaluate

Cyber Security portfolio

18

Concept of Operations

Requirements & architecture

Detailed Design

Integration, Test, and

Verification

Implementation

System Verification

and Validation

Operation and Maintenance

Verification

and

Validation

Policies, ISMS and Awareness

Specification & Design Principles

Security by Design

Assessments, Monitoring, Detection,

Response

End to End System Testing

Device Health Testing, Penetration testing, Fuzzing

Coding Principles Code Review

Extend well known V model with cyber security services

Risk based approach

Page 19: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Cyber Security Health Test approach

19

Requirements

test pack

Smart grid

and security

standards

In-situ,

smart grid

equipment

1. Functional testing

2. Negative and

robustness testing

3. Known vulnerability

testing, leveraging

global vulnerability

database

Findings and

recommendations

Common

criteria

methodology

Testing topics

Page 20: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

Cyber Security End-To-End TestComprehensive, cost effective testing for energy IT systems and smart grids

20

20

Device testing

End to end testing

Periodic evaluation� The service will provide cost effective

3rd party technical validation services to

provide bottom up proof that proper

security measures have been taken for a

complete system from an end to end

perspective.

� We assess your system regarding

– Secure network design principles.

– Physical cyber defences and intrusion

prevention.

– Data stream analysis.

– Policy and procedures for prevention,

detection, mitigation and recovery.

� Deliverable:

Report describing the cyber secure state

of your OT / ICS / smart grid system.

Page 21: DNV GL - Our holistic view on Cyber Security for wind farm ... · DNV GL © 2017 Ungraded Dealing with automation environments ISA-95/IEC62264 and ISA-99/IEC62443 7 Level 0 Field

DNV GL © 2017

Ungraded

SAFER, SMARTER, GREENER

www.dnvgl.com

DNV GL Cyber Security

21

[email protected]

+31 26 3 56 3572

Wolf Freudenberg