47
UNIK 4750 UNIK 4750 Guest Lecture: Securing Industrial Automation and Control Systems Mohammad M R Chowdhury, PhD 15 MARCH 2018

UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

UNIK 4750

UNIK 4750Guest Lecture: Securing Industrial Automation and Control SystemsMohammad M R Chowdhury, PhD

15 MARCH 2018

Page 2: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

© ABB GroupSlide 2 Mohammad M. R. Chowdhury, 19.08.2013

- Senior Engineer (2013-), Cyber Security &Infrastructure, ABB Oil, Gas & Chemicals

- Associate Professor (10%), University ofOslo, UNIK 4740: Information Security inIndustrial Sensor and Mobile Systems

- Scientist (2011-2013), ABB CorporateResearch Center

- Research Fellow (2006-2011) at UNIK (nowInstitute for Technology Systems)

- PhD (2009) Department of Informatics,University of Oslo

- RF Engineer (2005-2006),Telenor/GrameenPhone

Page 3: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

© ABB GroupSlide 3

2013-2017

2017-

Lead Engineer, Arvand HMI Upgrade (Middle East)Lead Engineer, Parsian C2+ (Middle East)ULA Upgrade, AkerBP

Page 4: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

—Cyber Security in Power and Automation

March 14, 2018 Slide 4

Why is Cyber Security an Issue?

Attacks are real and have an actual safety, health, environmental, and financial impact

PUBLIC

Advanced persistent threat (APT) andTargeted Malware Alerts in the Nordicsby FireEye products [Source: CyberThreats to the Nordic Region, May2015, FireEye]

Page 5: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

—Cyber Security in Power and Automation

March 14, 2018 Slide 5

Why is Cyber Security an Issue?

Attacks are real and have an actual safety, health, environmental, and financial impact

PUBLIC

• From Stuxnet to Shamoon 2

• Duqu, Flame, Gauss, Shamoon

• Shamoon 2 (Nov. 2016): reconnaisance, steal credentials, spread, wipe disks

• StoneDrill: more advanced wiper malware with anti-detection and espionage tool

• CHRASHOVERRIDE (aka Industroyer):

• Sophisticated, disrupt ICS, similarities with BlackEnergy

• Deep knowledge of ICS, specially electrical substation

• DoS tool to attack a particular protection relays

Page 6: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

StuxnetReport prepared with Stuxnet

Good referencing style

© ABB GroupSlide 4

Found in 2010 in Iran

Targets PLC and specifically the ones made by Siemens

Interesting, some also believe Stuxnet was responsible forkilling India’s INSAT-4B satellite!!

According to Symantec since 2010 more than 100 000PCs infected, ~60% located in iran

Believed that the malware was launched in 2009 and no.Of centrifuges dropped significantly in Natanz by the endof 2009!!

Page 7: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

DuquReport prepared with Latex

Very good detailes, e.g. include explanations ofprerequisite knowledge such as on DLL;Drivers, signing, windows registry, RPC etc.

Very structured

© ABB GroupSlide 5

A collection of malware discovered by security experts(team named CrySyS) in the Budapest Univ. Of Tec. andEconomics in Hungary, in Oct. 2011

Precursor to the next stuxnet (by Symantec, Nov 2011),W32.Duqu

Similarities with Stuxnet, its modular design and how themoduels are combined to use them to target controlsystems in nuclear facilities

It contains code that implements command & control,making it possible to control and pdate it as well asdownload and execute new payload using dummy .jpgfiles

Duqu does not self-replicate

Generic mitigation steps:

Page 8: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

GaussGood analytical report

But can be more structured

© ABB GroupSlide 6

Gauss, a malware of type Cyber Cyberespionage, namecame from the mathematician Johann Carl FriedrichGauss, first discovered in 2012

It a collection of packages, with modular design, hassignature of several other malicious software, e.g.Stuxnet, Duqu, Flame etc.

Since Gauss is modular, the operator (s) choose whichmodules to be loaded with the victims. he does not needinformation about which OS (operating system) the victimhas

Evidence indicates that Gauss comes from the samesupplier as "Flame", "Stuxnet" and "Duque". In the pictureabove you can see that Gauss and Flame have the samesubroutine for decrypting stringer and module for USBinfection is the same. Gauss and Flame its USB infectionmodule is also the same as Stuxnet uses. Gauss probablycomes from the same manufacturer as Flame, on thebasis of:- The code- Communication with the control server (C & C)- Module structure

Page 9: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

DNP3 VulnerabilityReport well structured and well written

© ABB GroupSlide 7

DNP3 (Distributed Network Protocol) is a set ofcommunications protocols used between components inprocess automation systems.

Three subcategories of atatcks: attack against protocolspecification, attack against vendor implementation andatatcks on the underlying infrastructure

Attack against underlying infrastructure may affect anySCADA system

Vulnerabilities, e.g. user authentication is optional, noecryption to enforce confidentiality or integrity protection

Why no security features?: extra overhead required,processing power of the devices limited

Mitigation: latest DNP3 standard specifies DNP3 secureauthentication, not enough!!

Page 10: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Cyber security attacks on Norwegian Oil and Gas Industry -Past and Present

A good one

© ABB GroupSlide 8

Norway’s national Security Authority (NSM) issuedwarnings to the companies including Statoil that they maybe targeted

Consequence of attacks

Vulnerabilities

Page 11: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Overview of Cyber Attacks on Smart Grid Infrasrtucture/Smart Metering

Report, a good one

Well studied

© ABB GroupSlide 9

Introduction of Smart grid / Smart Metering

Smart meter can be described as a sensor connected inthe endpoint at the consumers which records consumption(water, gas or electricity), and transmits the information tothe utility provider.

The smart grid infrastructure consist of many assets, thatincludes; field devices, power generations, consumers,communicating and network devices, remote terminalunits, smart meters and much more. All of these assetsare somehow connected together, making it possiblemonitor, operate and control the infrastructure over largegeographical areas.

Page 12: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

BlackEnergyReport, is a well structured one

A good one for basic knowledge aboutBlackEnergy

© ABB GroupSlide 10

BlackEnergy is a sophisticated malware which is designedto exploit different units of industrial control and computersystems.

First indentified in 2007, initially developed for DDoSattacks

In 2010, redesigned, Can steal important systeminformation through custom plugins

It has the capability to attack ARM and MIPS platform

attach scripts for Cisco network devices, inject main dllinto user processes, harmful plugins, certificates hackingand much more which is responsible for vulnerabilities

Two version: BlackEnergy Big, BlackEnegery Lite

Page 13: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

ShamoonReport, is a well studied one

© ABB GroupSlide 11

Shamoon, also called W32.Disttrack, is a modularcomputer virus that has been used for cyber espionage.

It targeted energy companies in middle east

Page 14: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Security Incidents

http://www.risidata.com/

© ABB| Slide 12Month DD, YYYY

Page 15: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Industrial Automation and Control Systems

© ABB Group, Judith Rossebø/Corporate ResearchMarch 31, 2016 | Slide 13

IACS

SCADA

DCS

PLC

IndustrialAutomation andControl System

SupervisoryControl And DataAquisition System

Distributed ControlSystem

ProgrammableLogic Controller

Controls a process

Single Location

Wide geographicalareas

Includes: SCADA,DCS and PLCs

Page 16: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

C-I-A vs. AIC

© ABB| Slide 14Month DD, YYYY

Page 17: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Assets to protect

© ABB| Slide 15Month DD, YYYY

Page 18: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Threats

© ABB| Slide 16Month DD, YYYY

Page 19: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Threats

© ABB| Slide 17Month DD, YYYY

Page 20: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Defense-in-Depth

© ABB| Slide 18Month DD, YYYY

Page 21: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Defense-in-Depth

© ABB| Slide 19Month DD, YYYY

Physical access control

Perimeter defence (e.g. Firewall); NetworkSegmentation; De-Militarized Zone

Computer hardening, e.g.patching, access control, host levelfirewall

Control of USB usage; Only openports necessary; disabled unusedports on Network Devices etc.

Access control in applications,only install necessary applicationsand services

Page 22: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Defense-in-Depth

© ABB| Slide 20Month DD, YYYY

Security monitoring, alerting,reporting, logging, and auditing

Accounts and Access

Devices

Applications & Services

Protocols

Page 23: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Defense-in-Depth

© ABB| Slide 21Month DD, YYYY

Incident response:

Policies

Restore & recovery

Backup of critical data

Backup strategies

Page 24: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Defence-in-Depth: People

© ABB| Slide 22Month DD, YYYY

The Defense-in-depth strategyencompasses the following four criticalcategories:

People

Network

Host

Application

Page 25: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Network SegmentationISA 99 (utilized by IEC62443) reference architecture

© ABB| Slide 23Month DD, YYYY

Page 26: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

DMZ

© ABB| Slide 24Month DD, YYYY

FWDMZ

Technical Network

Enterprise/ Corporate Network

Plant Client/Server Network

Public

Network

Demilitarized zone is a physical or logicalsubnetwork that contains and exposes anorganization's external-facing services to alarger and untrusted network, usually theInternet

Page 27: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Availability

© ABB| Slide 25Month DD, YYYY

Through redundancy, e.g. Device, Network, Resources such as storage disks,RAID configuration

Mitigations against DoS

FWDMZ

Technical Network

Enterprise/ Corporate Network

Plant Client/Server Network

Public

Network

Page 28: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Hardening

© ABB| Slide 26Month DD, YYYY

User level hardening

For computers

Computer level hardening

RBAC principle, users assigned to roles,roles have permissions

Only one role at a time

minimum permissions necessary,Administrator has more permissions thanEngineer or Operator

Restrict access to resource, applications,folders, drives, USB ports, OS items, e.g.operator cannot shut down the computer

Disabled USB

Allow RDP

Allow logging

Dont allow copy/paste’

Define windows firewall settings

Patching the system with updates, e.g.patching windows

No internet connectivity

etc

Page 29: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Hardening

Remove/disable default account

Create new Administrator credentials

Update firmware

Always use secure interface (e.g. SSH, HTTPS) toadministrative console

Disable HTTP, Telnet

Disable unused ports

© ABB| Slide 27Month DD, YYYY

For network devices

Page 30: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Hardening – patch management

© ABB| Slide 28Month DD, YYYY

FWDMZ

Technical Network

Enterprise/ Corporate Network

Plant Client/Server Network

Public

Network

WSUS

Page 31: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Protecting of Host with Antimalware

Use of antimalware SW

Update virus definition file regularly

Distribute virus definition file to all computers in the system

Add policies

Exclusion list

Daily scan

Weekly scan

Policy when malware detected

Reporting

© ABB| Slide 29Month DD, YYYY

FWDMZ

Technical Network

Enterprise/ Corporate Network

Plant Client/Server Network

Public

Network

SEPM/ePO

Page 32: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Backup

© ABB| Slide 30Month DD, YYYY

FWDMZ

Technical Network

Enterprise/ Corporate Network

Plant Client/Server Network

Public

Network

BackupServer

Page 33: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Time Synchronization

Why?: timely and accurate identification of incidents

Important for troubleshoot

Important to audit

Analyse attacks

Real—time response, ~ ms of delay acceptable

A GPS time source distributes times internally

Windows time

NTP/SNTP

© ABB| Slide 31Month DD, YYYY

Page 34: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Advanced feature – Application Whitelisting

© ABB| Slide 32Month DD, YYYY

Page 35: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Advanced feature – Intrusion Detection and ProtectionSystem

Intrusion Detection System (IDS) : Software/Hardware that automatesthe intrusion detection process. An IDS is a passive system; the systemdetects a potential security breach, logs the information and signals an alert

Passive system

Intrusion prevention system (IPS): Software/Hardware that has all thecapabilities of an intrusion detection system and can also attempt to stoppossible incidents. is a reactive system; responds to suspicious activitytypically by reprogramming a firewall to block network traffic or droppingtraffic on the network

Reactive system

Intrusion Detection and Prevention System (IDPS): refers to both IDSand IPS. The process of monitoring the events occurring in a computersystem or network, analyzing them for signs of possible incidents, andattempting to stop detected possible incidents.

© ABB Group, Judith Rossebø/Corporate ResearchMarch 31, 2016 | Slide 33

Page 36: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Anomaly DetectionExamples

© ABB Group, Judith Rossebø/Corporate ResearchMarch 31, 2016 | Slide 34

Page 37: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Advanced feature -Intrusion detection & protection system

© ABB GroupSlide 35

HIDS: Host Intrusion DetectionSystems

Detects any unusual activity onthe host

Alarm only raised on abnormalbehaviorReport/

update

SEM

SEM: Security Evenet Management

Source of fig: Chris Martin, Industrial Defender

Page 38: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Advanced feature -Intrusion detection & protection system

© ABB GroupSlide 36

NIDS: Network Intrusion DetectionSystems

Placed in network

Monitors network

Internally launched attacks

Unauthorized traffic etc.

Anomaly detection examplesExample: network attacks suchas IP spoofing, packet floods,DoS better detected throughexamining packets

Report/update

SEM

SEM: Security Evenet Management

Source of fig: Chris Martin, Industrial Defender

Protocol andnetwork devicemonitoring

Report/update

Today’s Controllers/PLCs contain CPUs,memory, communication modules.There are threats/attacks targeting themWhat about monitoring them?

Page 39: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

Why Is Intrustion Detection/Protection Needed?Important part of a Defense in Depth Stragegy

© ABB Group, Judith Rossebø/Corporate ResearchMarch 31, 2016 | Slide 37

The Defense-in-depth strategyencompasses the following four criticalcategories:

People

Network

Host

Application

Network intrusion detectionsystem (NIDS) acts likeburglar alarm.

NIDS can be integrated to afirewall

NIDS can provide real-timefeedback to firewall e.g. toblock packets from amalicious sender (onceNIDS detects the malicioussender e.g. its IP address)

Performing recurring audit isimportant

Host intrusion detectionsystem (HIDS) detectsintrusion signatures andunusual events in thelogs and provide timelyinto suspected intrusionattempts

Performing recurring hostaudit is important

Page 40: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

September 9, 2014

The Biggest ChallengesAddressing a unique set of requirements

”Traditional” information technology Power and automation technology

Object under protection Information Physical process

Risk impact Information disclosure, financial loss Safety, health, environmental, financial

Main security objective Confidentiality, Privacy Availability, Integrity

Security focus Central Servers(fast CPU, lots of memory, …)

Distributed System(possibly limited resources)

Availability requirements 95 – 99%(accept. downtime/year: 18.25 - 3.65 days)

99.9 – 99.999%(accept. downtime/year: 8.76 hrs – 5.25 minutes)

System lifetime 3 – 10 Years 5 – 25 Years

Page 41: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

March 14, 2018 © ABB Group| Slide 7

Changing Threat Landscape

Source: Kaspersky Lab ICSCERT report 2017

Page 42: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

March 14, 2018

System liftime vs Product end of life

Products Life cycle stard date Support end date

Windows 7 SP 1 Feb. 22, 2011 Jan. 14, 2020 (ext. Support)

Windows Server 2003 SP2 Mar. 13, 2007 Jul. 14, 2015 (ext. Support)

Windows Server 2008 R2 SP1 Feb. 22, 2011 Jan. 14, 2020 (ext. Support)

Windows Server 2012 R2 Nov. 25, 2013 Oct. 10, 20123 (ext. Support)

Page 43: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

— Cyber SecurityTraditional IT System vs DCS/SCADA Systems

March 14,2018

| Slide9

3 badpassword tries;locks account

Operator losescontrol!

Deploymentguidelines

Install new patchesASAP

May not work!May need reboot!

Vendor validatePatches

Use firewalls andIntrusion Detection

Systems

Do they know theindustrial protocols

used?

Vendor validatesolutions

Differentapproach

Frequency ofpatching

Every month! Timeconsuming, tedious

Once or couple oftimes a year

Normal IT use Industrial use

Differingpriority

Availability Confidentiality

Integrity

Confidentiality

Integrity

Availability

Page 44: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

—Cyber security best practicesImplement a Security Management System

Balance Security Measures:Value for meó Value for XóMitigation cost

Combine measures:Defense in Depth

Work with system vendors.Request selected measures.

Incident responseDisaster recovery

Auditpolicy

compliance

Standards:Guidelines

ManagementBuy-in

RiskAssessment1.

2.

3. 4.

SecurityPolicy

© ABB GroupMarch 14, 2018 |Slide 10

Page 45: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

—Security Management

March 14, 2018 Slide 11

Threat intelligence - Evidence-basedknowledge

– Targeted Threat Intelligence

– Threat, vulnerability & advisory feeds

– Weekly intelligence summary

– Intelligence briefings

Security Monitoring

– Log collection and secure log retentionfor any source

– Advanced data correlation

– Reporting

Incident response – Act on security events Cyber Assets Management

– Awareness of the cyber assets in yoursystem

– Accurate metadata about your assets

– Reduced effort for compliance

Page 46: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

—ABB Ability – Cloud Services

March 14, 2018 Slide 12

Page 47: UNIK 4750 - its-wiki.no · Plant Client/Server Network Public Network Demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing

© ABB GroupMarch 14, 2018 | Slide 13