10
1 Eric Luiijf MSc Eric Luiijf, Manou Ali and Annemarie Zielstra Assess and improve SCADA security in the Dutch Drinking Water sector October 2008 SCADA Security NLD 2 Outline Background NICC Dutch drinking water sector SCADA (in)security – an issue? investigative approach results development of SCADA good practices Next steps by NICC Questions

SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

1

Eric Luiijf MSc

Eric Luiijf, Manou Ali and Annemarie Zielstra

Assess and improve SCADA security in the Dutch Drinking Water sector

October 2008SCADA Security NLD2

Outline

• Background • NICC • Dutch drinking water sector

• SCADA (in)security – an issue?• investigative approach • results• development of SCADA good practices

• Next steps by NICC

• Questions

Page 2: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

2

October 2008SCADA Security NLD3

NICC: National Infrastructure against Cyber Crime

• Public-Private Partnership for CIIP

• CPNI ‘flower’ model with ‘sector petals’• financial, drinking water, energy• mainports, (petro)chemical industry • multi-nationals / manufacturing• …

• NICC kernel• round-table support• info exchange sector - police - justice -

GovCert.nl - intelligence services• initiates projects + thematic meetings

• cross-cutting themes• SCADA information security

October 2008SCADA Security NLD4

Dutch drinking water sector

• 1950• 200+ municipality-oriented companies

• 2008• nine regional-based companies

and one municipal company

Page 3: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

3

October 2008SCADA Security NLD5

Drinking water and SCADA security

• Drinking water sector petal• put SCADA security on top of its meeting agenda• wanted its SCADA security posture investigated

• TNO• developed questionnaire• NICC did interviews• processed answers in an anonymous way

sector-wide analysisorganisation-specific security posture marks

• development of SCADA Good Practices for the sector

October 2008SCADA Security NLD6

SCADA information security questionnaire

• Open and closed questions covering three areas1. SCADA security policies

(in relation to general company security policies)- 15 questions, e.g. ISO 17799, risk analysis, acquisition, ..

2. SCADA network architecture- 14 questions, e.g. office network, external and remote links

3. SCADA system management- 10 questions, e.g. patching, virus, 3rd party access

English questionnaire blueprint obtainable through your Euro-SCSIE contact

Page 4: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

4

October 2008SCADA Security NLD7

Protect company data privacy

• Data entered in spreadsheet in ‘company-x’ column where x is randomly assigned

• All mappings of company-x with real company are stored in a vault• single sheet of paper with 10 names – 10 values x (1..10)• original questionnaire replies

October 2008SCADA Security NLD8

Reporting mechanism

• NICC Confidential / Drinking Water sector - eyes only report• discusses all implications of

• sector-wide answers per question or combination of questions• risky behaviour (with explanation)

Next slides are based on artificial data to protect company / national sensitive information

Page 5: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

5

October 2008SCADA Security NLD9

Reporting mechanisms (2)

• Mixed process control and office automation networks are globally considered a bad design as unwanted loss of the SCADA integrity and control may occur [one company].

• VLANs sharing same physical network resources may have the risk of loss of control due to overloaded VLAN boxes due to e.g. a virus or bad NIC in office environment. Using this option regularly requires stress testing in a controlled environment [5 companies].

• Physically isolation SCADA networks is the best design[4 companies of which one is moving to VLANs]

Mixed PA and OA domainsVLANs; same networkVLANs; split networksPhysically separated

Question 14: LAN architecture

October 2008SCADA Security NLD10

Reporting mechanisms (3) – benchmarking

• Sector level benchmark – school mark approach• SCADA security policies• SCADA network architecture• SCADA system management

• sector average and worst in class performances per key issue• sector-wide “school report” showing all organisation-x results

• For each individual organisations• results compared to sector average • presented in closed envelop to protect the company privacy

Page 6: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

6

October 2008SCADA Security NLD11

Experts established the security posture weights

• Weights for possible state of each key issue(based upon average value by three experts)

• Relative weights of the 5 - 6 key issues within a category (policies, network architecture, system management)to establish a ‘school mark’ 0 .. 10

• Final score = average all three categories

modems

PA – OAlinked

0%N/A50%90%100%

0%10%20%70%100%

October 2008SCADA Security NLD12

SCADA policies (example)

Page 7: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

7

October 2008SCADA Security NLD13

0,00,51,01,52,02,53,03,54,04,55,05,56,06,57,07,58,08,59,09,5

10,0

Sectoravg

Dwater#1

Dwater#2

Dwater#3

Dwater#4

Dwater#6

Dwater#7

Dwater#8

Dwater#9

PolicyCommunicationSystem managementOverall

‘School report’ – diverse security postures

October 2008SCADA Security NLD14

Main security issues - policies

• SCADA is not part of • business risk analysis• EDP audit process

• No specific SCADA security policies extending ISO/IEC 17799

• Security awareness is lacking in SCADA environment

• No security requirements in acquisition

• No priority delivery arrangements with SCADA vendors

Page 8: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

8

October 2008SCADA Security NLD15

Main security issues - networking

• SCADA security reference architectures and reality • room for improvement ..

• Office and SCADA data streams share low bandwidth links

• Control over Internet and GPRS (GSM data channel)

October 2008SCADA Security NLD16

Main security issues – system management

• Worries about 3rd party to introduce a virus• but 3rd party engineer connects laptop just straight on• three-monthly signature updates if any …

• Patching• vendors sometimes have to press to apply patches• vice-versa: do not install patches if you want support

• Passwords • unchanged factory defaults• group passwords• change frequency = infinity

unchanged passwords after people leave

1234

Page 9: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

9

October 2008SCADA Security NLD17

SCADA Security Good Practices

• 39 good practices were developed• based on findings from questionnaires• 11 address CIO/CSO level; 28 technical management level

• Dutch classified version explains each GP and current sector state• downloadable English version

www.samentegencybercrime.nlwww.tno.nl

October 2008SCADA Security NLD18

Next steps by NICC

• Same questionnaire and analysis used for Dutch Energy sector

• Comparison Drinking Water – Energy SCADA is on-going• scary SCADA risk taken on a day-to-day basis by utilities!

• Second Process Control Event 4.12.2008 • get CIOs involved

• towards agenda setting• sharing SCADA incidents• …

Page 10: SCADA security drinking watercritis08.dia.uniroma3.it/pdf/CRITIS_08_25.pdf4,0 4,5 5,0 5,5 6,0 6,5 7,0 7,5 8,0 8,5 9,0 9,5 10,0 Sector avg Dwater #1 Dwater #2 Dwater #3 Dwater #4 Dwater

10

October 2008SCADA Security NLD19

To conclude

• Sector self-assessment works ! Truthful responses if trust exists

• Individual company data privacy of utmost importance

• Benchmarking and ‘school reports’ allow sector-wide communication

• Major steps taken in securing the Dutch drinking water sector

• NICC goes forward with securing all critical SCADA sectors

October 2008SCADA Security NLD20

Questions?Questions?

[email protected]