24
Enabling Digital Oilfields through effective cyber security IDOC 2011 Justin Lowe

Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

Embed Size (px)

Citation preview

Page 1: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

Enabling Digital Oilfields through effective cyber security

IDOC 2011

Justin Lowe

Page 2: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 2

PPT presentation template V1-11.ppt

What are DOFs trying to achieve?

Text comes here

Text comes here

Improved recovery

from reservoirs

Improved health and

safety

Asset life extension

Reduced downtime

Improved decision making

Improved operational

effectiveness

DOF Objectives

Page 3: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 3

PPT presentation template V1-11.ppt

What are the DOF enablers?

Digital Oilfields

Processes, Workflow

Organisation, Technology

Connectivity Information

(real time and static)

Page 4: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 4

PPT presentation template V1-11.ppt

Connectivity – a key enabler for digital oilfield

Page 5: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 5

PPT presentation template V1-11.ppt

Traditional drilling information exchange

Drilling Control

Management System (DCMS)

Mud Logging

Monitoring While Drilling/ Logging While Drilling

Service Company

Rig Site Company Offices

Manual Data Transfer

Page 6: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 6

PPT presentation template V1-11.ppt

There is an significant increase in demand for remote connectivity and real time information

Drilling Control

Management System (DCMS)

Mud Logging

Monitoring While Drilling/ Logging While Drilling

Service Company

Service Co. Offices

Exploration & Production Company Offices

Service Co. Offices

Service Co. Offices

Real Time Data

Networked Drilling Ops

Remote Access & Support

Blow Out Preventer

Dynamic Positioning

Page 7: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 7

PPT presentation template V1-11.ppt

Cyber security can be a barrier to digital oilfields

• Systems are often difficult to integrate or link up

– Insecure industrial systems which were designed to operate stand alone

– Silos of information

– Difficult to integrate between organisations

• IT and security not aligned to DOF

– IT and security policies not designed for the industrial operating environment

– IT and security personnel that don’t understand the operating environment

– Standard IT solutions don’t fit – different technologies

• Some DOF systems are sensitive and need careful handling

– Confidentiality – e.g. tight hole data

– Integrity – e.g. fiscal metering

– Availability – e.g. process and drilling control systems

Page 8: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 8

PPT presentation template V1-11.ppt

Cyber security incidents can have a real impact in the digital oilfield

• Virus disrupts drilling rig dynamic positioning system

• Worm disables mission and safety critical drilling control system

• Poor security causes confidential drilling information to be released to wrong client

• Worm disables fiscal metering system

• Disgruntled employee disables pipeline safety monitoring system

• Virus impacts drilling system through USB stick

• Malware infection causes denial of service on VSAT communications

• Poor configuration management causes oil spill

• Worm causes loss of view and loss of control of major oil and gas plant control system

Targeted

Untargeted

Accidental

Page 9: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 9

PPT presentation template V1-11.ppt

The Night Dragon attack was sustained attack to designed to obtain sensitive information from organisations using commonly available tools Attack initiation used multiple attack vectors to gain access to systems: • SQL injection of extranet web servers • Spear-phishing attacks of users • Compromising corporate VPN accounts

A highly sophisticated attack • Disabling Internet Explorer proxy settings to allow direct communications from infected machines to the

Internet • Malware used to obtain local and AD account information • Network servers accessed and Remote Administration Tools (RATs) installed on the servers • Surveillance carried out using RATs • Data stolen from the servers.

Impacts. • Loss of sensitive proprietary operations information • Loss of project financing information • Loss of information relating to field bids and operations

Night Dragon – targeted cyber attacks against global oil and gas and companies

Page 10: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 10

PPT presentation template V1-11.ppt

The Stuxnet worm is designed to reprogramme and disrupt specific industrial systems Stuxnet is one of the most highly engineered and technically complex worms yet seen. • Exploits multiple Windows vulnerabilities (including zero day), as well as sophisticated exploits within

Siemens systems • Spreads via multiple replication mechanisms: USB sticks, LANs, infected PLC project files • Inserts malicious code in PLCs - infected machine will automatically search for and compromise Simatic

WinCC, PCS7 and STEP7 stations • Detection is difficult - Stuxnet replaces the STEP7 DLL • Modifies its behaviour to avoid detection by AV software • Establishes P2P connections for instructions and updates • Uses stolen certificates from major hardware manufacturers • Hides the unauthorised code

Stuxnet – a worm specifically targeting an industrial control systems

The potential consequences to industrial control systems are severe:

− Non-targeted impacts such as slowing of system communications could be catastrophic in safety and control systems

− Targeted take-over of specific PLCs could allow malicious control of a process

− It should be noted that multiple payloads appear to be propagated, the purpose of some of these is unknown. Recent research has shown at least two payloads is specific to particular Uranium enrichment centrifuges.

It could have been much worse though.

Page 11: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 11

PPT presentation template V1-11.ppt

The game has changed…

The old days • Viruses from CDs floppy disks

• Worm infections from corporate network

• ‘Accidental’ incidents

The future challenges • Its no longer about protecting against standard IT attacks

• There are people out there targeting oil and gas companies

• There are people out there attacking industrial control systems

• These attacks are using highly sophisticated attacks

• Zero day attacks

• Increased insider threat

Simply separating the control and business network domains is not enough – an integrated security framework is needed.

Page 12: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 12

PPT presentation template V1-11.ppt

Industrial control systems are still vulnerable

• Much work has been done by ICS vendors to improve security

• However ICS still have some fundamental security vulnerabilities

– e.g. key stuxnet vulnerabilities still not fixed – a year on

• More and more vulnerabilities are being found

– There is now much more interest in finding security vulnerabilities in control systems

– The good guys are looking for vulnerabilities

– But so are the bad guys….

Cyber Threats and Vulnerabilities Against SCADA Systems

Vulnerabilities: ***************** 1. Solar Magnetic Storm Impact on Control Systems 2. Advantech/Broadwin Webaccess RPC Vulnerability 3. Multiple Vulnerabilities in Siemens Tecnomatix FactoryLink 4. Gleg Agora SCADA + Exploit Pack 5. Wonderware InBatch Client Activex Buffer Overflow 6. Honeywell Scanserver Activex Control 7. ICONICS GENESIS Multiple Vulnerabilities 8. RealFlex RealWin Multiple Vulnerabilities 9. 7-Technologies IGSS ODBC Remote Stack Overflow 10. 7-Technologies IGSS Multiple Vulnerabilities 11. Samsung Data Management Server 12. Samsung Data Management Server Root Access 13. Advantech Studio ISSymbol Activex Control Buffer Overflow Vulnerabilities 14. ICONICS GENESIS32 and BizViz Activex Stack Overflow

Page 13: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 13

PPT presentation template V1-11.ppt

What is the impact of digital oilfields?

• DOFs are reducing operational risks in many ways

– Reduced travel

– Remote operations

– Better decisions

– Integrity monitoring

• But in some ways they are increasing operational security risks

– Connectivity

• IT to plant

• Interconnectivity between vendors and suppliers

– Increased field technology

• Smarter devices closer to plant

Page 14: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 14

PPT presentation template V1-11.ppt

So how can DOF security issues be addressed?

• Need an end to end approach to DOF security

• Need aligned teams:

– Engineering / Operations / IT / Telecoms / Security

• Comprehensive end to security framework and management regime

– Understand DOF objectives

– Understand risks

– Systems involved and architecture

– Data and information architecture

– Integration architecture

– Technical security measures

– Ongoing support and management

Page 15: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 15

PPT presentation template V1-11.ppt

There are many different parts of the DOF that need to be addressed

MWD Mud Logging

Cement-ing DCMS Vessel

Mgmt DCS SCADA Power Marine Condition Monito-

ring

Drilling Operations

Asset Collaborative Work Environment

Central Collaborative Work Environment Service

Co.

Vendor

Service Co.

Partner

Corporate users & systems

Business Network

Remote Users

Vendor

Page 16: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 16

PPT presentation template V1-11.ppt

3. Establish Monitoring & Response Capability

1. Understand the Business Risk

4. Improve Awareness and Skills

5. Manage Third Party Risks

6. Engage Projects

2. Implement Security Improvements

Update Policy & Standards based on current threats and

risks

Ongoing Assurance of compliance with

Policy and Standards

7. Establish Ongoing Governance

Quick Wins Longer Term

Developing a security framework for DOFs

Page 17: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 17

PPT presentation template V1-11.ppt

WWWIT Network

Process Control Network

Process ControlWorkstation

PLC or Control I/O

Router/SwitchProcess Control

Server

Controller

Modem

Wireless Ethernet Emergency Shutdown System

Instrumentation / Control Devices

Firewall

!

!

! !

! !

! No AV protection

! Unpatched Systems

! No Monitoring or Response

!

DOF control system vulnerabilities

Page 18: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 18

PPT presentation template V1-11.ppt

Emergency Shutdown System

WWW

Firewall

Instrumentation / Control Devices

DMZ

IT Network

Process Control Network

Process ControlWorkstation

PCL or Control I/O

Process ControlServer

Controller

ModemWireless Ethernet

Firewall

Historian Access Server

Staging Server

All Nodes are Patched and AV protected 24/7 System monitoring & response capability

Security improved control system

Page 19: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 19

PPT presentation template V1-11.ppt

Enabling digital oilfields through effective cyber security - Examples

A properly designed DOF security framework can be a significant enabler for DOFs

• Access to stranded data

• Remote access

• Protection of sensitive systems

• Protection of sensitive data

• Enabling collaboration

• Enabling secure remote support

Examples

• Real time production information

• Real time drilling information

• Secure remote support

• Real time remote condition monitoring

Page 20: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 20

PPT presentation template V1-11.ppt

Improving asset management and operations through process and sub-sea real-time information

Objectives

• Provide real time process information to corporate users

• Provide real time information to expert process systems

Benefits

• Real time information widely available throughout the corporate environment

• Information can be shared with other systems (e.g. advanced historians, reporting tools)

• Benchmarking between assets easier

• Increased collaboration possible

• Scalable

Challenges

• Information flows to the corporate environment not the priority of the process environment

• Information ownership unclear

• Different business drivers can lead to different solutions

• Vendor systems need to meet/exceed company IT security requirements

• Connection of the corporate environment to the plant environment

• Support boundaries become blurred

Central Data

Aggregator

Expert Process Systems

UsersUsers

viewing data

WWW

Regulatory Bodies

Regulatory reports sent to regulatory

bodies

Data export to specialist drilling

systems

Data from local to central

aggregator

Data from local to central

aggregator

Data from local to central

aggregator

Onshore

Local Data Aggregator

Control System

Metering System

Subsea System

Platform 1

Data to local aggregator

Local Data Aggregator

Control System

Metering System

Subsea System

Platform 3

Data to local aggregator

Local Data Aggregator

Control System

Metering System

Subsea System

Platform 2

Data to local aggregator

Reporting Systems

ERP Systems

Page 21: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 21

PPT presentation template V1-11.ppt

Improving drilling operations through using real-time information

Objectives

• Provide real time data from drilling related systems to company systems at the rigsite

Benefits

• Real time drilling information is widely available across the corporate environment

• Real time information can be provided to other drilling applications

• Ownership of the data is with company not the service company

• Scalable

Challenges

• Systems need to be resilient

• Connection of service company systems to company networks

• Standard communications (e.g. WITSML) are relatively new to the industry

• New ways of working for both company and the vendor

• Often need to work in parallel with data feeds to the service company systems

• Rigs may not be company owned

Page 22: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 22

PPT presentation template V1-11.ppt

Improving production operations – remote condition monitoring for rotating equipment on offshore platform

Objectives

• Real time condition monitoring information for rotating equipment

Benefits

• Decisions based on real time information not monthly reports

• Information can be shared with other systems

• Alerts can be sent to appropriate personnel using standard corporate systems (e.g. automated emails)

Challenges

• Not all vendor solutions capable of supporting this type of solution

• Vendor systems need to meet/exceed company IT security requirements

• Connection of the corporate environment to the plant environment

• Support boundaries become blurred

Rotating

Equipment

Users

WWW

Condition Monitoring

System

Control System

Data feed for system analysis

Status feeds to control

systems

Other Historians

ERP Systems

Condition Monitoring Historian

Data to other

systems

Users viewing

data

EngineeringAnd Operational

Staff

Email Alerts

Vendor

Data export to vendors

Vendor recommendations

Offshore

Onshore

Page 23: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 23

PPT presentation template V1-11.ppt

Smarter asset management for deep water drilling rigs through remote monitoring, support and reporting

Objectives

• Allow third parties and other support staff to:

– Remote support

– Remote expert analysis and advice

• Transfer of regulatory data

• Transfer of process and maintenance data

Benefits

• Increased uptime. Decreased issue resolution time

• Support staff do not have to be based at the asset

• Support staff can be shared by assets

• Removal of staff from hazardous locations (e.g. offshore)

Challenges

• Systems need to be resilient and secure

• Connection of third party networks to company networks

• New way of working for both company and the vendor, high level of trust

• Procedures need to be changed to meet the new ways of working

Page 24: Enabling Digital Oilfields through effective cyber securityc214565.r65.cf1.rackcdn.com/justinlowe.pdf · Enabling Digital Oilfields through effective cyber security ... Blow Out Preventer

© PA Knowledge Limited 2010.

Page 24

PPT presentation template V1-11.ppt

www.paconsulting.com