9
Introduction ICS Equipment Attacks and Defences Conclusion/Exercise Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Phil Maker EDS: <https://eds.power.on.net/EDS> August 2020 Abstract A chat about Cyber Security for Industrial Control systems focussing on the single device and attacks upon it.

Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

Practical Industrial Control Systems(ICS)Cybersecurity

Lecture 1 - the single device attack

Phil Maker

EDS: <https://eds.power.on.net/EDS>

August 2020Abstract

A chat about Cyber Security for Industrial Control systemsfocussing on the single device and attacks upon it.

Page 2: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

Introduction

I What: Industrial Control Systems(ICS)

I Why: ICS are crucial to ourwater/power/..

I When: next two weeks, this weekattack a single device, next weekdefend many devices.

I How: Protecting a single device, e.g.a Generator Controller.

I Who: Phil Maker: <[email protected]>

I Where: CDU and ABB/.. Test Facilityat Berrimah

Page 3: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction

I What: Industrial Control Systems(ICS)

I Why: ICS are crucial to ourwater/power/..

I When: next two weeks, this weekattack a single device, next weekdefend many devices.

I How: Protecting a single device, e.g.a Generator Controller.

I Who: Phil Maker: <[email protected]>

I Where: CDU and ABB/.. Test Facilityat Berrimah

2020-07-31

Practical Industrial Control Systems(ICS)CybersecurityLecture 1 - the single device attack

Introduction

Introduction

1:50 Model of a power system

Page 4: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

What do I expect from you?

I Listen but please interrupt at any timewith questions (both ways).

I You should know about:I TCP/IP, UDP, nmap, zenmap,

wireshark, nc, MODBUS, IETF,CVE*

I Kali and its basic installation/use.I CVE* for CodesysI Understand what an Advanced

Persistent Threat (APT) is in thissetting.

I Stuxnet, MODBUS, AuroraGenerator Attack and Shammon.

I Little simulated exercise for you taking30-60m.

Page 5: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

The targets

I A mixture of PLC, micros, meters,protection relays, ....

I A variety of protocols includingMODBUS, https, DNP3, ....

I A variety of programming languagesincluding C, IEC61131-3, LadderLogic, Function Blocks, ....

I Controlling a variety of physicalprocesses.

I They have an expected lifetime of10-20 years.

Page 6: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

The vulnerabilities

I Operators need remote access but:I Good passwords :-).I Air gaps don’t work, why?I 2FA doesn’t solve it, why?I VPN helps a bit?

I Locally protocols may beunprotected/open (almost always).

I Workstations may be 12 years oldrunning Windoze??

I The company make does notsupport it any more?

I Software reliability!!

Page 7: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

The attacks

I’m sure your using other words but:

I IT based.

I Industrial Protocol based.

I Network attacks via backdoors.

I Physical process attacks: Stuxnet.

I Physical attacks: Aurora

I Social attacks

I Hardware stack attacks, bymanagement software (e.g. IMP).

Page 8: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

The defences

I Firewalls

I Honeypots

I Network monitoring, e.g. snort,wireshark

I Network security

I Password/access security

I Physical security.

I Social attack preventation.

I The Essential 8 from the AustralianSecurity Manual

Page 9: Practical Industrial Control Systems(ICS) Cybersecurity ...Practical Industrial Control Systems(ICS) Cybersecurity Lecture 1 - the single device attack Author Phil Maker Subject ICS

Introduction ICS Equipment Attacks and Defences Conclusion/Exercise

Conclusion/Exercise

In summary:

I It is not easy securing ICS.

I It is however important.

I A shopping list like the AU SecurityManual “Essential 8” is just thebeginning.

Questions? Break? Next the exercise?Thanks?