i need 400 to 500 words
*
*
Copyr
i
<
/
p>
g
h
t
© 2005
,
S
a
n
d
ia Corporation
.
The submitted manuscrip
t
has been authored by a contr
ac
tor of the U.S. Government
un
der contract No. DE
–
AC04-94AL85000. Acco
rd
ing
l
y, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes.
Unlimited release – approved for public release.
Sandia National Laboratories report SAND2005-1001C.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security
Admin
istration
under contract DE-AC04-94AL85000.
TUTORIAL C:
AUTOMATION SECURITY TUTORIAL
Jason Stamp
Network
ed
System
s Surviva
bility
and Assurance Department
Sandia National Laboratories
March 11, 2005
Clemson University – 2004
Power
Systems Conference
Copyright © 2005 Sandia Corporation
*
*
Outline
Part I: Introduction
Part II: Threat Environment
Part III: Security Administration
Part IV: Technical Best Practices
Part V: Discussion
Copyright © 2005 Sandia Corporation
*
*
Part I: Introduction
Definitions
Current Security
Vulnera
bilities
Components of Sustainable Security
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Automation
Systems
Any subsystem that electronically measures state, alters pro
cess
control parameters, presents / stores / communicates data, or the
management
thereof
Part I: Introduction
Master
Station
Sub-Master Station
RTU
1
RTU n
RTU 1
RTU m
Sensor
Relay
Copyright © 2005 Sandia Corporation
*
*
Automation
Systems
Critical to the safe, reliable, and efficient operation of many physical
processes
Used extensively in infrastructure
Electric power
Water
Petroleum
Natural gas
Also used in manufacturing
operations
Automation enables quicker and more coordinated system control compared to human operation (in many cases there is no effective alternative)
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Automation Systems in
Electric Power
SCADA
Supervisory
Control
and
Data
Acquisition
(All-encompassing government term for automation)
EMS
Energy
Management
System
Protection
Relaying
AGC
Automatic
Generation Control
WAP
Wide Area
Protection
Etc.
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Categories For
Automation Components
System
data
Fundamental element of any information system
System
security
is applied to preserve data attributes (AAI&C)
Security administration
Encompasses non-automation functions as documentation and procedure
Components include
security
plans, implementation guidance, configuration management and security enforcement & auditing
Architecture & design
Platforms
Networks and communications
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities Exist
SCADA
equipmen
t,
IT equipment upon which SCADA depends, software, processes, policies, communications, etc…
Comm
on Vulnerabilities in Critical
Infrastructure
Control
Systems, SAND2003-1772C
More vulnerabilities exist than have been found
http://www.sandia.gov/scada
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities are Proliferating
Dependence on
Internet
and related technology
Increasing adoption of new technologies
Reliance upon automation over human control
Connectivity between SCADA & IT enterprise
Unique issues related to real time control
Slow adoption of security solutions
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Relevant Trends
Design is moving towards open standards
Most hardware vendors are foreign companies
Numerous integrators and system providers
Present state of security is
not
commensurate with the threat or potential consequences
Security is 5-10 years behind typical IT systems because of isolated stovepipe organization
Arbitrary applications of technology, informal security, and the fluid vulnerability environment lead to unacceptable risk
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Changing SCADA Systems
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities:
Data
Sensitivity levels for PCS data are usually not established
Absence of data sensitivity distinctions makes it impractical and fruitless to identify where security precautions are appropriate
Lack of data classifications is a direct byproduct of deficient administration in automation security
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities:
Security Administration
Part I: Introduction
Category
Vulnerability
Po
l
icy
The PCS has no specific documented security
policy
or security
plan. This key vulnerability
generate
s the proliferation of
procedural and technical vulnerabilities.
The PCS often has no specific
or
documented security plan.
Implementation g
uides for equipment and systems are usually
absent
or deficient
.
There are no administrative mechanisms for security
enforcement in the system lifecycle.
Procedures
Security audits are rarely performed, if at all.
Training
There is neither formal security traini
ng nor official documented
security procedures.
Configuration
Management
Usually, t
here
is
no formal configuration management and no
official
ly
documented procedures. Hence, there are neither
formal requirements, nor a consistent approach
for
configurati
on management.
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities:
Architecture and Design
Many systems include centralized data storage and control (often single-points-of-failure)
Some lack effective control hierarchies which may result in physical damage to infrastructure assets
Many companies are leveraging their automation links and networks for emergency services and signals
In some cases, security, fire, and other systems are integrated into the automation system as points of measurement and control
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities:
Platforms
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Vulnerabilities:
Networks and
Communica
tions
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Future Automation Security
Security administration
Better security technology
Third-
party
assessments
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Security Administration
Security administration is paramount to manage security risks
Exploited vulnerabilities are directly related to implementation and operation of a particular SCADA system
SCADA use and operations are managed by people whose actions are defined and
controlled by
the system’s security administration
Unrealistic to expect any SCADA operation to be free of vulnerability and immune to threat
In the fluid IT environment, changing conditions demand constant vigilance
Only
through constant evaluation and maintenance can security be sustained
Effective and sustainable security for SCADA depends on effective security management
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Security Administration
Modern SCADA must be addressed and managed in a style appropriate for a critical IT system
SCADA no longer enjoys freedom from concern for security
Information Age has introduced malevolent human threat
Need for dedicated security personnel
Ineffective for SCADA system administrators and managers to also bear the responsibility for security
Cutbacks in staff and increasing system complexity in most cases deny adequate attention to security from SCADA operations personnel
SCADA security staff has a heavy training burden to keep abreast of threat and vulnerability developments
SCADA security administrator must have clear authority to alter running configurations to mitigate vulnerabilities
That power must derive from clear and direct policy
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Improved Technology
Critical to embrace the role of technology to achieve overall security for future SCADA
Development of secure technology, protocols, and standards will equip SCADA security personnel with necessary tools for secure implementation
Some advancements may include:
Secure protocols
Low-cost
encrypt
ion for serial SCADA
Application-layer stateful inspection for SCADA firewalls
Accounts and logging for RTUs
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Third Party Assessments
Internal auditing and assessment of security administration and system implementation are essential
Regular external evaluations are also critical to catch residual problems caused by organizations being too close to issues or unaware of new tactics and tools
Contemporary security assessments may not be helpful to organizations with emerging security programs
For now, an assessment process that focuses primarily on security management and organizational culture while addressing only glaring vulnerabilities in implementation is the best balance for most
Part I: Introduction
Copyright © 2005 Sandia Corporation
*
*
Part II: Threat Environment
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Threats are Increasing
Increasing awareness by adversaries of cyber as an attack mechanism
Adoption of Internet technology adds a practiced class of adversaries
Reducing sophistication needed to be a cyber adversary is allowed by proliferating attack tools
Increasing threat of worms and viruses
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Malevolent Threat Assessment
Class – Criminal,
Terrorist
, Extremist, Political/military
Motivation
Capability – skills, resources, technology
Tactics – stealth, deceit, social engineering
Action – sabotage (denial of service, misinformation) or theft
Type – insider, outsider, collusion
Constraints – risk aversion, monetary, tactics
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Outsider Cyber Threat
Hacker
s – cause trouble (vandalism), potential for extensive damage
Hacker
coalition – promote a cause or position
Organized
crime – profit motivated
Foreign
intelligence – promote a cause or position at an international level
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Outsider
Adversary Levels
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Insider Cyber Threat
Physical
access
only
Maintenance / custodial staff, contractors
Power user, no special privilege
Use
SCADA information
/ control systems
Domain knowledge with privileges
Manages and maintains SCADA information and control systems
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Insider Levels
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Cyber Terrorism
Terrorist:
Someone using force or violence to intimidate or coerce a government or civilian population in furtherance of political or social objectives
Cyber Terrorist:
Someone who uses cyber mechanisms to intimidate or coerce a government or civilian population in furtherance of political or social objectives
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Cyber Terrorist
Goals and Methods
Remotely affect systems resulting in:
Injury / loss of life
Loss of availability
Loss of public confidence
Disruption of ability to meet mission goals:
Damage to equipment or facilities
Corrupt databases
Denial of service
Inject false information
Create false trust or mistrust
Part II: Threat Environment
Copyright © 2005 Sandia Corporation
*
*
Cyber Concerns
No “Cyber Pearl Harbor” event yet
Perhaps because:
The current generation of terrorists may not trust this medium
As technology savvy terrorists increase in rank and influence, these mechanisms may be considered as more valuable
As it is proven to be an effective means for terrorism, its use may increase
Assessments Introduction
Part II: Threat Environment
*
*
Copyright © 2005, Sandia Corporat
ion.
The submitted manuscript has been authored by a contractor of the U.S. Government under contract No. DE-AC04-94AL85000. Accordingly, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes.
Unlimited release – approved for public release.
Sandia National Laboratories report SAND2005-1001C.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.
Part III:
Security Administration
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Administration For
Sustainable Security
Control framework
A starting point for the business administration of the enterprise employing SCADA
Security is addressed as part of the company’s comprehensive risk management program
Coupling the need for security to the organization’s business model is the most direct way of evaluating security investment
Enforcement
Security policy
Security plans
Implementation guidance
Configuration management
Auditing/assessment
Technical security
controls
Security policy
is key: it bridges the control framework to enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Administration Hierarchy
Control framework
Security policy
Security plan
Implementation
guidance
Business
management
SCADA management
SCADA personnel
Translate business objectives into actionable policy
Instantiate policy objectives for specific SCADA systems
Apply plan requirements to specific technology and subsystems
SCADA Business
SCADA Organization
SCADA System
SCADA
Equipment
Increasing specificity
Increasing authority
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Security Policy
Security policy for SCADA administration translates the desired security and reliability control objectives for the overall business into enforceable direction and behavior for the staff to ensure secure SCADA design, implementation, and operation
An organization should have one security policy with authority over all SCADA systems, connected elements, and personnel
Unique characteristics of SCADA necessitate a complete policy separate from the normal company information policy
Formulated by the SCADA management staff, with input from the business leadership
Fosters a strong link between the control framework and the policy
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
What is Policy?
A formal statement of what will (and will not) be done
Mandatory rules that will be followed… not suggestions or guidelines
Product and vendor independent
It does not include system security settings, configuration rules, or computer setup rules
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Justification for Separate
Automation Policy
Acceptable use
of automation system should be narrower than IT systems due to:
Different mission
Different sensitivity of data
Different criticality of function
Automation systems have more immediate physical consequences therefore:
Interconnections must be better controlled
Access and CM more strictly enforced and monitored
Administration and enforcement is simpler with a separate policy
Don’t embellish IT… this just gets messy when trying to include all of the caveats for automation
Tension between automation systems and IT security
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Justification for Separate
Automation Policy
Smaller, different audience
SCADA engineers
SCADA operators
Not business administrators, HR, regular employees
Legislative requirements on automation systems are different
Currently, security plans, policy, etc are not required, but…
With current concerns fueled by incidents like the blackout in the northeast, regulation is coming
It’s better to have the administrative controls in place before they are required by legislation
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Policy Elements
Definitions for critical organizational elements
Positions in the automation systems security administration
Data
categorization and
ownership
Description of important elements of the automation
architecture
Creation and enforcement of the risk management program for automation security
Evaluating vulnerabilities and their security controls
Security investments
Residual risk
Review cycle (which
contributes to
ongoing security through risk reevaluation)
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Policy Sections
Data security
Platforms
Networks and communications
Manual
operation (including exercises)
Personnel
Security training
Essential for understanding policy and requirements, and staff compliance is predicated upon adequate awareness
Enforcement
Security plans for specific systems or subsystems
Implementation guidance for specific technologies
Configuration management
Auditing/assessment
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Policy Framework
Why a framework?
Allows for a systematic approach
Convenient
Hierarchical
Easy to sort
Created for automation systems
History of assessments
Multiple industries
Multiple iterations
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Policy Framework
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Policy Section Headings
Purpose
Scope
Policy
Responsibilities
References
Revision History
Enforcement
Exceptions
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Security Plans
The SCADA security plan enumerates specific security guidelines for systems or groups of systems based on fundamental concepts from the security policy
Relates policy to reality
The plan is the core security document for implementation, operation, and maintenance
Very similar in concept to the NIST definition
Details the collection of controls and control practices necessary to meet the control objectives of the security policy and control framework
Considerably more technical than policy
Elements of the security plan can be garnered from statements of industry practice or best practice
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
System Identification
System Name/Title
Unique identifying information
Responsible organization
Ex: federal organization responsible for the system
Contact information
Sufficient information so that a responsible party can be located.
System owner will be designated here
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
System Identification
Security Personnel
The contact information for the person ultimately responsible for the security of the system
Operational
Status
The system (or parts) may be in development or maintenance phases
Description
General description and purpose of the system
Software, hardware, and vendor information
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
System Identification
Environment
Any details about the operating environment that raise security concerns (i.e. connected to the Internet)
What hardware or software is used to secure these connections
Interconnections
Include up-to-date network diagrams
Laws, regulations, and policies
This ties back to the Organization and Relationships portion of the security policy
Sensitivity
For both information and system
Use the data categories defined within the policy
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Management Controls
Assessment and auditing management
List known/identified threats and vulnerabilities
Include dates, results, planned dates, etc for auditing and assessment
Assessment and audit results
Both internal and external
Include dates if changes are necessary
Rules of Behavior
Employees should sign a copy of this and review often
Accreditation details
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Management Controls
Planning for system lifecycle
Describe how security has been implemented for all phases of the system
Initiation
Development/Acquisition
Implementation
Operation/Maintenance
Disposal
Configuration management issues need to be considered for all phases
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Operational Controls
Personnel
security
Background checks
Least privilege/need-to-know
Computer room access
Termination procedures
Physical & environmental controls
Physical access
Emergency preparedness
Data
protection
Audit
trails, marking, transportation, etc.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Operational Controls
Contingency
Plans
Backup & recovery
Disaster recovery
Manual Operations Plan
Maintenance Controls
Configuration management
Access controls
Parts of this will be covered in rules of behavior and technical controls sections
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Operational Controls
Data integrity and validation controls
Documentation inventory
Vendor documents
Administrative documents (policy, procedures, etc)
Security training
Incident response capability and handling procedures
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Technical Controls
Identification/authentication
Passwords, smartcards, etc.
Logical access controls
Who or what can have access to specific system resources
Remote
access
controls
Screen saver locks and banner requirements will also be included here
Audit trails / logs
What must be logged by what devices
Who has access to the logs
Review and retention cycle
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Implementation Guidance
Implementation guidance enforces the security plan and policy for the implementation of specific technologies
A compilation of directives for the configuration, installation, and maintenance of equipment or software
Almost entirely technical
Example: an implementation guide for the application of password checking software on some particular computing platform
The need for the software and its configuration are necessary to meet the requirements of the security plan, which in turn satisfy the demands of the SCADA security policy, derived from the control framework based on the business objectives of the company
Other implementation guides
Network cabling
Ethernet switches
SCADA applications
Operating systems
Computing platforms, etc.
Adherence to implementation guidance and the security plan is tabulated in the system’s configuration management
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Definition
“Configuration Management is the process of identifying and defining the items in the system, controlling the change of these items throughout their lifecycle, recording and reporting the status of items and change requests, and verifying the completeness and correctness of items.”
[IEEE Std 729-1983 updated as IEEE Std 610.12-1990]
Configuration Management
Configuration
Identification
Configuration
Control
Configuration
Status
Accounting
Configuration
Audit &
Review
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Benefits of
Configuration Management
Configuration management trades a one-time upfront cost and a little operational overhead for…
Money saved by avoiding unnecessary improvements and upgrades
Time and money saved by avoiding complications during necessary improvements
Time and money saved in maintenance
Without configuration management:
A simple disk failure turns into a system-
wide
upgrade
A one hour job turns into a week-long effort
A short control system downtime becomes loss of service
Configuration management is a tool
Enables change and operational crisis management
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Configuration Identification
Select configuration items for a system and recording their functional and physical characteristics
Uniquely identify configuration items
Establish standard, reproducible characteristics for configuration items
Collect into baseline systems
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Asset Inventory
Any configuration management program must start with a complete inventory of the equipment, software, hardware, etc in the system
All relevant information must be recorded: software versions/patch level, hardware model number, OS level, firewall rules, router ACLs, etc.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Item Identifiers
All configuration items must be recorded and assigned a unique identifier to assist in tracking
Unique identifiers can be
A unique inventory number
A combination of identifying information
Serial number + date of purchase + ?
This will assist all member of the team when it comes time to patch. Unique identifiers will allow the team to track which machines have been patched/upgraded.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Access Control
You need to keep track of the access control environment – both networks and platforms
Router
ACLs, firewall rules, and user password files are important configuration items
Remember to protect this information – it is invaluable to an adversary
Configuration management will help you keep track of who made changes, when, and why
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Baselines
Baselines will be a secure configuration that has been rigorously tested by the SCADA engineers
Baselines can be used in disaster recovery or for new equipment added to the system
Develop the baseline configuration once configuration identification is complete
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Common Operating Environment
Developing a COE for all equipment is a necessary evil
This will establish a stable starting point for all new machines introduced into the system
SCADA Security Administrators can remove any unnecessary services, applications, etc at this time
The COE is the software environment built using the implementation guide
Ideally, the COE can be installed with a simple process on new or old systems
Disk imaging programs such as Ghost
Install scripts such as Kickstart
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
System Changes
Changes to operational systems come in two flavors
Functional improvement
Maintenance
Functional improvement is usually incremental and limited in scope
Examples: adding new PLCs, changing network rules, changing device safety settings
Configuration management can help understand the consequences and improve the process
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Maintenance
Maintenance – The recurrent, periodic, or scheduled work necessary to repair, prevent damage, or sustain existing components of an information or automation system
This is the most likely use of configuration management in an operational system
The next few slides will go into more detail about the maintenance process
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Requesting Change
Who can request change?
Operator
s, SCADA engineers, business managers, security managers
Tracking requested changes
Record and assign identification to each change request
Avoid losing track of changes which makes configuration control impossible
Prevent losing important changes that could drop through the cracks
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Evaluating Change
Changes aren’t always feasible
Even when changes can be made, often they can’t all be made at the same time
Prioritizing, planning, and organizing work is easier if changes are evaluated
One method – the person responsible for the affected component performs a change request analysis
Estimate feasibility
Estimate cost of making the change
Estimate effects on other parts of the system
Configuration Control Board (CCB) approves and prioritizes based on the analysis
The CCB doesn’t have to be formal
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Developing and
Testing Change
Once a change is approved, engineers can develop the change
Using configuration management, they can start with the current status of the system
As they develop the change, they can determine what must be released to the operational system
Testing, either by the developers or (better yet) by a separate testing group ensures the proposed release will work
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Releasing the Change
The CCB looks at the results of development and testing and decides whether or not to release the change
Some type of reporting is necessary – at least verbal reports
All involved have to remember that changes have pros and cons – make sure the pros beat the cons
Developers then release the change into the operational system and notify the requester
This is important to close the cycle
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Configuration Status
Accounting
If you have done configuration identification, recorded that information, and have a change control process then you have everything necessary for Configuration Status Accounting (CSA)
This part of configuration management is what saves money and time
Being able to find out original configurations
Knowing your system state as you analyze changes
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Patching Cycle
Patching software is a major cause of change requests
Software patches are a frequent headache for SCADA system engineers
SCADA applications’ release cycle is often much longer than platform patch cycles
SCADA applications tend to be sensitive to underlying platform changes
In a perfect world, patches would be unnecessary; in our world, it is an important part of system maintenance
Anyone familiar with modern operating systems knows that patches occur with regular frequency
These patches are released to solve a number of bugs, security holes, or other software problems
SCADA applications are becoming multipurpose and the code-base is larger. As a result, patching will become even more critical in the future.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Patching Cycle
How do you know when you need to patch your software?
Mailing lists are a great resource for keeping up to date
Vendor mailing lists have the highest value
Security mailing lists are less effective, requiring more time to sift through the irrelevancies
These lists will often be the first to issue information on patches or
updates
in software or hardware
Maintenance contracts with vendors can also help
Some vendors will give early warning to those with active maintenance contracts
Also, some vendors will only release patches to clients who have maintenance contracts
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Applying Patches
What if this breaks my system?
It is possible that a patch will have a bug
Will break your existing system
Will turn on features or services you don’t want
Possibly, just not work
Installing the latest greatest patch without testing is a recipe for disaster…
You need to make an informed decision – What is the impact of a bad patch on your system versus not patching?
If the patch brings down every computer you own, it is probably much more costly to install the patch!
Which all brings us to…
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Test Labs
So how can you be sure that the patch issued 5 minutes ago will work for YOUR stuff…
You need to test… and test with your environment, not an ideal network that does not adequately represent your system
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
What Goes in the Test Lab
Ideally – an exact replica of your entire system is best
But in reality:
Workstations and servers for every OS that you use
A sample of your network equipment (1 router, 1 switch, 1 firewall, …)
One of each type PLC, RTU, sensor, etc.
Some system data
An old capture of sensor data works well
Data must be similar to what you collect/use/process on a day to day basis
All of these should be configured to be an accurate representation of your system
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Definitions
Audit
The function of measuring something against a standard
Auditing enforces configuration management, security plans, and implementation guidance
Assessment
More arbitrary and subjective: how well do the policies/implementations secure the system
Overall, assessment (internal and external) enforces the entire chain of security administration
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Auditing vs. Assessment
Audit
Works with standards and best practices
Checklists to determine if you do what you say you do
Done to you
Assessment
Works with experts in the field and the implementation staff to find vulnerabilities
Tries to break the security on the system
Done with you
In traditional IT, either of the two may include penetration testing and vulnerability scans. This is strongly discouraged on SCADA systems.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Internal
Lower cost
Staff time is the greatest cost here
No privacy concerns
Staff has already been certified to see the data on the system
If there are different levels of data classification, ensure that staff performing the audit are permitted to see all levels
Day-to-day experience with the system can reveal problems that should be addressed
Other staff may be more willing to talk with internal auditors
Less educational down time since staff is already familiar with the system
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
External
Can be more comprehensive since the audit/assessment team must learn the system from scratch
This can lead to a more complete picture of the system
External parties may be aware of new tools and techniques
Not hampered by internal politics
Fewer blind spots
They have no special interest in any part of the system
Trust**
This may work for or against the auditors/assessors
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Types of Audits
Conformance
How well system conforms to policies/procedures
Policy
Configuration
Best practice (other than security)
Security
Measure policy/procedures against security best practices
Physical
Cyber
Code
Generally only in software development environments
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Types of Assessments
Threat Assessment
Identify the threats (internal and external)
Vulnerability Assessment
Identify vulnerabilities for a specific system in a normal operating environment
Risk Assessment
Risk = threat * vulnerability * consequence
Red Team Assessment
Identify high consequence vulnerabilities in a malicious threat environment
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Protect
The information in an audit/assessment report would be highly valuable to any attacker
It identifies the weaknesses and existing controls protecting your system
These results should be protected at a high level
Before beginning an external audit/assessment, determine what the external company will do with the results
Is this an acceptable risk for your system
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Read
There have been instances where an assessment/audit is performed and the interested parties do not have the time or inclination to read the results… Why bother?
There are other cases where a 200 page penetration/vulnerability test has been delivered… again why bother?
A good assessment/audit will produce a concise report that must be read and acted upon
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Using the Assessment Results
An assessment is a waste of time, resources, and money if the findings are not used
A detailed report of what the assessment team found will assist the organization
Problems should be addressed in order of criticality
Fixes or mitigation strategies must be determined and implementation teams and deadlines assigned
After the fixes have (presumably) been completed, a follow-up assessment should be performed
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Logging
Ideally, logs should be recorded for any device/application that has the potential to be misused
Reality
Not all devices/applications have logging capability
Logging DOES impact system performance
Logging must be tailored to ensure that operational jobs are still performed adequately
This may require some tweaking and time to get the right balance between logging and operations
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Using Logs
Once you have all these log files sitting around, what do you do?
Logs can generate massive amounts of data to sort through
Logs need to be reviewed for evidence of malicious or incorrect behavior – this can be a full time job!
There are tools that can assist in this process
If you don’t look at the logs, you are wasting resources by collecting them
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Concerns
Where to store the logs
How long to store the data
Who will review the data
How often will this be done
What is the classification for log data
This affects storage, review, and destruction procedures
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Incidents
You’ve collected the log data, reviewed it, and you see evidence of a break-in. What now?
Wait
Preserve & backup
Notify
Lock down
Investigate
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Wait
Do not immediately run to fix the problem
You might make it worse (cut off users)
You will destroy evidence
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Preserve/Backup
Both the logs and an image of any affected machines should be copied for analysis
This will give you time to investigate later plus more stuff for prosecution
Try to get the copies on write-once media so there is no doubt about their integrity
This can assist in prosecution
There are several tools available to assist in this process*:
Ghost
dd
* Independent Review of Common Forensic Imaging Tools, Mark Scott, August 2003.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Notify
Do not head out on your own vigilante style
Have procedures of who to contact and when
System admins
Security people
Law enforcement
Users (maybe)
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Lock Down
Secure the affected system
This may require severing network connections
This may require wiping the system and reinstalling from the baseline (see configuration management)
Use the backup system in the interim
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Investigate
Now, take the time to fully investigate the logs and images of the systems
This process will ensure that users suffer a minimal downtime and evidence is retained for possible prosecution. It will also give investigators sufficient time to properly investigate the incident.
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
Part III: Security Administration
Security Policy
Security Plans
Implementation Guidance
Configuration Management
Auditing and Assessment
Security Enforcement
Part III: Security Administration
Copyright © 2005 Sandia Corporation
*
*
The Enforcement Cycle
For SCADA Administration
The IT control framework enforces the business direction of the company
The SCADA security policy enforces the IT control framework
Security plans and implementation guidance enforce the security policy
Configuration management enforces the security plan and implementation guidance
Auditing enforces configuration management, security plans, and implementation guidance
Overall, assessment (internal and external) enforces the entire chain of security administration
Part III: Security Administration
*
*
Copyright © 2005, Sandia Corporation.
The submitted manuscript has been authored by a contractor of the U.S. Government under contract No. DE-AC04-94AL85000. Accordingly, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes.
Unlimited release – approved for public release.
Sandia National Laboratories report SAND2005-1001C.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.
Part IV:
Technical Best Practices
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Technical Best Practices
Four categories:
Data Security
Architecture and Design
Platforms
Networks and Communication
Each section covers:
Introduction
Trends and Observations
Suggestions
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Automation Reference Model
Describe data and functions
Map these to locations and equipment
Develop general best practices for security
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Technical Best Practices
Data Security
Architecture and Design
Platforms
Networks and Communications
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Data Security: Introduction
Rationale for data classification
Is payroll information more important than a FYI memo?
Is an archived gate signal more important than a valve control signal?
Determination of data sensitivity is based upon mission
Evaluation of CIA (Confidentiality, Integrity, Availability) requirements for data
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Trends and Observations
Sites with no data categorized
All information is available to anyone
Security controls are usually commensurate to the levels determined
Often there are none
SCADA system are more “important” than other systems, but the data is still not categorized
Non
-SCADA has categorization, while SCADA does not
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Data Security Categories
Live/Real-time
Safety/mission critical
Other operational status and control
Administrative
ACLs
Authentication information
Other configuration settings
Input/output database (points)
Archived
Trending data
Warranty and maintenance data
Accounting information
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Data Security Sensitivity
Proposals refer to confidentiality
Integrity is necessary for all classes
Includes need-to-know/use
Highest level of protection listed first
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Data Security Sensitivity
Shared with a small group within the work area
Specific to a function or task
Examples
Security controls information
Safety critical
commands
or measurements
Operator control directives
Administrative passwords on control systems
Points database
Shared within a group (perhaps including customers or suppliers)
Specific to certain functions or areas
Examples
Contaminate levels
Equipment status
Performance information
Accounting usage information
Shared with anyone
General in nature
Examples
Reservoir level
Gross plant output
Regulatory compliance
Part IV: Technical Best Practices
Private
Restricted
Public
Copyright © 2005 Sandia Corporation
*
*
Exceptions and Caveats
Regulated industries may have specific classifications
There may also be legal requirements for data protection
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Technical Best Practices
Data Security
Architecture and Design
Platforms
Networks and Communications
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Architecture and Design: Introduction
Architectures are specific to mission
Secure and reliable storage, processing, and transmission of system data
Designed to implement some consistent security policy
The system security plan is related to its architecture
Implements enclaves consistent with data sensitivity
An enclave is the “container” for data elements of like security characteristics
Enclaves can be implemented as perimeters
An enclave can be implemented as access controls on storage media or platforms
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Trends and Observations
Not based on any security policy
Bolt-on security doesn’t work well (if at all)
Usually could be secured to a reasonable level, with good governance
Evolution of systems introduce vulnerabilities
Point solutions fix some perceived problem
Interactions not anticipated
Data enclaves not considered
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Legacy Architecture
Radial serial links
Little or no distinction between users and administrators
Functions
/privileges associated with accounts, not individuals
No security maintenance (or ongoing risk management)
Do not integrate well in the security environment of newer components
No data protection (and no categorization of data)
Usually designed for a standalone environment, but are often used otherwise
Part IV: Technical Best Practices
Plant
Remote Station
Control
Center
Remote Station
Remote Station
Plant
Comm
interface
RTU
Copyright © 2005 Sandia Corporation
*
*
Modern Architecture
Commodity hardware and software has vulnerabilities built-in
They are not addressed by SCADA vendors
Have a larger set of attackers
Modern networking allows “better” access to all nodes
Vulnerabilities are unaddressed by the user’s organization
No security policy
No understanding of underlying IT systems
Out-of-the-box configurations are seldom safe or secure
Unreliability of patches necessitates development systems
Part IV: Technical Best Practices
Plant
Remote
site
Control Center
Remote site
Remote site
Plant
SCADA
Network
RTU
Copyright © 2005 Sandia Corporation
*
*
Hybrid Architectures
All types of vulnerabilities
Most common
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Architecture and Design:
Suggestions
Mature policy and governance essential
Control and data hierarchy
Eliminate global access/privilege requirements
Use principle of least privilege
Access level commensurate to level of data sensitivity
Interconnections
Control direct connections behind the perimeter
Never violate security enclaves
Evolution
Risk assessment when adding new functions
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Architecture and Design:
Suggestions
Heterogeneity
Diverse implementations improve survivability
Situational and operational security awareness
Operators/personnel aware of security issues
Training
Redundancy
Continuity of operations
Backups for critical data
Backups for critical communications
Backup platforms for critical nodes
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Technical Best Practices
Data Security
Architecture and Design
Platforms
Networks and Communications
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Platforms: Introduction
What is a platform?
A platform is a collection of hardware and software that can run a program
Platform
software includes its OS and applications
Examples of platforms:
Routers
IEDs / PLCs / RTUs
Server
s and clients
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
RTUs / PLCs / IEDs
Collect data from sensors and forwards commands to devices such as relays and valves
Can also aggregate data from other RTUs at remote sites and plants
More intelligent RTUs are becoming more prevalent
Pressures for RTU advancement:
Reduce duplication of functionality (points may be sampled many times over in a substation)
Network and processing power ample for distributed control
Simplified operation and management
Trends for RTUs
Similarity to other IT devices
Increasingly Ethernet or wireless
SCADA peer connections used for data transfer to/from other devices and for distributed control
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
SCADA Servers
Functionality
Send signals to acquire data
Receive data from the system
Calculate and disseminate signals for system-wide control
Current system values stored in a memory database
Drive operator displays
Populate data archives
Implementation
May be custom hardware for legacy systems, or an older OS (VMS, etc.)
Often, modern systems run on Windows or Unix
Platform for SCADA servers may be the same as those for display or archives
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Types of SCADA
Servers and
Client
s
Human-Machine
Interface
(
HMI
)
Automated
control
EMS
WAP
AGC
Alarm and events reporting
Front-end processor (FEP)
Data archives
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
How Exploits Work
Attack opportunities
Buffer overflows
Input validation errors
Social engineering
Leverage existing bugs
Types of malware
Trojans
Viruses
Spyware
Worms
Results:
Additional access
Corruption or compromise
Privilege escalation
System failure / denial of service
Command injection
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Trends and Observations
No configuration guidance
Administrator accounts
Shared accounts
Logging not enabled
Unnecessary services
Inadequate patching
Default OS installations
Etc.
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Platforms: Suggestions
Authorization
Restrict execution privileges for programs
Access controls
Acceptable passwords
Cryptographically secure password storage
Secure remote authorization (radius server)
Necessary/unnecessary services
DHCP, SSH, Telnet, FTP, TFTP, BOOTP, SMTP, SNMP, HTTP, etc.
Disallow remote management
Carefully consider file sharing
Security of networked operating systems (NOS) is complex
Logging
Remote or local
Review logs for anomalies or attacks
Appropriate retention periods
Meets standards and requirements
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Platforms: Suggestions
Physical security
USB ports, pen drives, guns/guards/gates
Physical access by an adversary means a compromise was possibly (if not likely)
Patch management
Backups
Incident response
Disaster recovery
Attack recovery/law enforcement imaging
Resources
SANS guides
NSA guides
NIST guides
GOVCERT
Etc.
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Platforms: Suggestions
Limitations of security for
RTU/PLC/IED
/legacy equipment:
Not developed with security in mind
No user accounts
No logging
Typically, no encryption services
Usually a single privilege level (maybe two)
Passwords from small set of characters
Workarounds
Wrappers for applications
Terminal
servers for access
Change passwords often
Increase physical security (cameras, doors, locks, guards, guns, etc…)
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Technical Best Practices
Data Security
Architecture and Design
Platforms
Networks and Communications
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
SCADA Reliance on Networks
System operations
Logical interconnection of SCADA elements for status/control telemetry
Transmission of performance data
Remote operations
Limited offsite operations and maintenance
Extend monitoring and control to corporate offices
System administration and maintenance
Configuration management
Patches, updates, and upgrades
Remote contractor maintenance access
Business integration
Provide network applications (e.g., email) to operational environment
Integrate business activities with operations (e.g., forecasting and automated billing)
Networks must maintain data attributes (confidentiality, integrity, availability, authentication, non-repudiation)
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Protocols
Legacy SCADA Protocols
ASCII or even bit based
Runs over serial links
Oldest “protocols” are tones or current loops
No security services (hashes, encryption, etc.)
Hundreds of varieties because of legacy, manufacturer-specific stovepipe SCADA installations
Modern SCADA Protocols
May run over serial, but increasingly support IP stacks
Often are object-oriented
Based on open or de facto standards
Still largely absent of intrinsic data security services
Greater functionality than legacy protocols
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Trends and Observations
(You’ve seen this before…)
SCADA networks are increasing in scope and function
Increasing automation (remote locations)
Adoption of TCP/IP networking
Transition to public and virtual-private networks
Use of SCADA networks for other purposes (alarm)
Near real-time control
Outsourcing network (and system) administration
Shrinking boundary between business and operational networks
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
SCADA Dependence
On the Internet
Significant and growing
System operations
Connectivity among SCADA elements
Connectivity between SCADA systems
Remote operation through VPN access
System administration and maintenance
Example: contract network management
Business integration
Example: publishing data directly from SCADA to the Internet
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Wireless
Connectivity
Licensed band wireless
Microwave
Satellite
ISM unlicensed band wireless
802.11(a, b, g, etc…)
WEP, WPA, 802.1x (EAP, LEAP)
Packet radios
Other wireless techniques
Frequency hopping
Spread spectrum
None of these are secure by themselves
Use the best security available to you
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Perimeter
s
Security enclaves
Based upon trust and data sensitivity
Defines perimeters and boundary points of systems/subsystems
Enforcement by router, firewall, application proxies, other filters
Address, service, content
Stateful, stateless
Need-to-know data flows may cross boundaries
Serial communications
Bulk encryptor plus physical security at endpoint
Wrap communication into a packet
Application proxy testing
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Internet/
Intranet
Connection
Evaluate the business case first
Strict access controls determined by required data flows
Example router/firewall
DMZ
configuration:
Need to archive data for administrative usage
SCADA pushes data to archive machine
Users pull data from archive machine
Connections
allowed from SCADA to DMZ
Connections allowed from admin to DMZ
All other connections denied
Only necessary and valid services, messages, content, and addresses allowed to the DMZ
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Remote Access
Evaluate the business case first
Options
VPN
Dial
-up
Activities
Remote data
Platform management
Application usage
Protection mechanisms
Positive ID for authorization
Authenticate user/device
Token cards/one-time passwords
Encrypt traffic
Log all usage
Use access timeouts & lockouts, activity timeouts, time periods
Minimum privilege
Deactivate when unnecessary
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
External/3rd Party Access
Evaluate the business case first
External vendors
Through protected mechanisms only
Authentication
Access controls
Application proxies
Etc…
Minimum privilege
Deactivate when unnecessary
External sources of data
Application proxies and validity checking
Procedures for operation when receiving invalid data
Receive as analog
Providing data to external systems
Use archived data
Send as analog
View-only terminals
Part IV: Technical Best Practices
Copyright © 2005 Sandia Corporation
*
*
Other Security Suggestions
Implementation guidance should mandate secure default configurations on all network devices
Force “good” passwords and eliminate default passwords
Disable in-band management (SNMP, Telnet, FTP/TFTP, web, etc.)
Disable finger
Disable routing of private network addresses
Control switch and hub connections
Use PPN/VPN
Adequate physical security
PPN can’t be shared
VPN can be shared
IDS
Technologies
Signatures
Anomaly detection
Advantages
Can catch known attacks
Good research tool
Disadvantages
False positives and negatives
Can compromise the architecture
Manpower intensive
Part IV: Technical Best Practices
*
*
Copyright © 2005, Sandia Corporation.
The submitted manuscript has been authored by a contractor of the U.S. Government under contract No. DE-AC04-94AL85000. Accordingly, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes.
Unlimited release – approved for public release.
Sandia National Laboratories report SAND2005-1001C.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.
DISCUSSION
Clemson University – 2004 Power Systems Conference
Part V: Discussion
SCADA System Security Program
SCADA Security Policy Framework
TM
SCADA organization
and relationships
SCADA information
architecture
SCADA data
categorization and
ownership
Data
security
Data backup policy
Malicious software
protection policy
Data storage and
destruction policy
Platform
security
Communica
–
tion security
Manual
operations
Perimeter policy
Wired
connectivity
Wireless
connectivity
Remote access
External / 3
rd
party
access
Personnel
security
Acceptable use
policy
Account and
password policy
Configuration
management
Security plan and
guidance policy
Security policy
maintenance policy
Configuration
accounting policy
Audit
Accreditation policy
Internal/External
Audit policy
Incident reporting
policy
Log policy
Intrusion detection
policy
Applications
Support application
policy
SCADA application
policy
Physical
security
Asset Disposal
Training policy
Security risk
management
Client
RTU/PLC/IED
Server
SCADA Asset
Protection
Assessment Policy
l
a
t
i
g
i
d
l
a
t
i
g
i
d
RTU
Substation
Automation
Terminal
Power Metering Device
Power Protection Device
Power Control Device
Data
Aquisition
–
SCADA
Data Base Server
Comm
Interface
Comm
Interface
Meter Reader
(RF)
Internet
SCADA Control Center
SCADA Remote Site
•
SCADA Topology Model
•
Telemetry Database
•
History Logging
•
Alarm System
•
Load Shedding List
Data Acquisition User
Terminal
–
MMI/HMI
GIS
Management System
Billing System
Meter Reader
Other Admin Functions
l
a
t
i
g
i
d
RTU 2
RTU 3
RTU 4
RTU n
RTU 1
RTU 2
RTU 1
Category
Vulnerability
Minimal data flow control is employed (e.g. minimal use of
ac
cess
control lists
,
virtual private networks, or virtual
LAN
s
).
Configurations are not stored or backed up for network devices.
Passwords are
not encrypted in transit.
Passwords exist indefinitely on network devices.
Passwords on devices are shared
.
Administration
Minimal administrative access controls are applied.
There is inadequate physical protection of network equipment.
Hardware
Non
–
critical personn
el have physical access to equipment.
No security perimeter has been defined for the system tha
t
defines access points which must be secured.
Firewall
s are nonexistent or poorly configured at interfaces to
external (non
–
PCS) networks.
Perimeter
PCS networks are used for non
–
PCS traffic.
Firewall and router logs are neither collected
nor examined.
Monitoring &
Logging
There is no security monitoring on the PCS network.
Critical monitoring and control paths are unidentified,
complicating redundancy or contingency plans.
Link Security
PCS connections over vulnerable links are not protected with
encrypt
ion.
Authentication for remote access is substandard or nonexistent.
Remote Access
Remote access into the PCS network utilizes shared passwords
and shared accounts.
Wireless
Connections
Wireless LAN technology used in the PCS network without
strong a
uthentication and/or data protection between clients and
access points.
Category
Vulnera
bility
OS security patches are not maintained.
Configurations are not stored or backed up for important
platforms, including IEDs.
Default OS configurations are utilized, which enables insecure
and unnecessary services.
Passwords are
often stored in plain sight near critical systems.
Power
–
on and screen saver passwords are not utilized.
Passwords are not encrypted in transit.
Passwords exist indefinitely on platforms.
Passwords on devices are shared.
There are no time limi
t,
character length, or character type
requirements for the passwords
.
Minimal administrative access controls are applied.
Administration
Users have administrator privileges.
There is inadequate physical protection of critical platforms.
Non
–
critical personn
el have physical access to equipment.
Hardware
Dial
–
up access exists on individual workstations within the
SCADA network.
Monitoring &
Logging
System logs are neither collected nor examined.
Malware
protection
Virus checking software is
un
installed,
un
used, or
not
updated.
Plant
Remote
site
Control
Center
Remote
site
Remote
site
Plant
Comm
collector
Plant
Remote
site
Remote
site
Remote
site
Plant
SCADA
Network
SCADA
Network
Admin
Network
Data
Server
Router
/
Firewall
DMZ
Intranet
Extranet
Adversary Levels
Organized
Crime / Cyber
Terrorist
Foreign
Intelligence
Hacker
Coalition
Hacker
Novice
Sophistication
Adversary Levels
Organized
Crime / Cyber
Organized
Crime / Cyber
Terrorist
Foreign
Intelligence
Foreign
Intelligence
Hacker
Coalition
Hacker
Novice
Sophistication
Adversary Levels
Sophistication
Physical Access
Only
Some Knowledge No
Authorized Access
Basic User
Power User, No Special
Privileges
Operator Knowledge
with Privileges
Domain Knowledge
with Privileges
Full Design
Knowledge, Full
Privileges
Sensor
Infrastructure
System
monitored by
monitors
monitored by
monitors
monitored by
monitors
monitored by
monitors
controls
controlled by
controls
controlled by
Actuator
Field
I/O
produced by
produces
produced by
produces
triggered by
triggers
triggered by
triggers
Operator
Visual & Auditory
Representation of
Status
sampled by
samples
sampled by
samples
generated by
generates
generated by
generates
Status Data
Field Points
Local Automated
Control
Command Data
Field Points
produces
produced by
produces
produced by
sent to
processes
sent to
processes
analyzes
analyzed by
analyzes
analyzed by
generated by
generates
generated by
generates
System
Management
Functions
aggregates
aggregated
aggregates
aggregated
generated by
generates
generated by
generates
monitors
monitored by
monitors
monitored by
commands
commanded by
commands
commanded by
generates
generated by
generates
generated by
Operational
System Model
Oversight
Entity or
Other SCADA System
monitors
monitored by
monitors
monitored by
initiates
initiated by
initiates
initiated by
Field
Technician
calls
calls
calls
calls
analyzes
analyzed by
analyzes
analyzed by
System Status
Data
Historical
Status Data
updates
updated by
updates
updated by
HMI
Contingency
Planer
Business
Objectives
influenced by
influences
influenced by
influences
I/O Controller
Historian
State
Estimator
analyzes
analyzed by
analyzes
analyzed by
System
–
wide
Automated
Control
generated by
generates
generated by
generates
Protective Relaying
(safety)
analyzes
analyzed by
analyzes
analyzed by
monitors
monitored by
monitors
monitored by
Exported
Data
Imported
Data
contributes to
contains subset of
contributes to
contains subset of
contributes to
contains subset of
contributes to
contains subset of
received from
provides
received from
provides
analyzes
analyzed by
analyzes
analyzed by
Stability Systems
(reliability)
Wide Area
Protection
Automatic
Generation Control
Regional Control
Signal
acts upon
influences
acts upon
influences
generates
generated by
generates
generated by
calls
calls
calls
calls
SCADA Field Equipment
System and Plant Control Centers
Automation
Oversight
Infrastructure
Equipment
Alarm System
Local Process
Control
Plant Process
Control
Sensors/Relays
RTU 2
RTU 3
RTU 4
RTU n
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
RTU 1
Internet
Sensors/Relays
RTU 2
RTU 3
RTU 4
RTU n
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
RTU 1
Internet
Sensors/Relays
Master
Station
(Mainframe)
LAN
Microwave
Fiber
Radio
PSTN
l
a
t
i
g
i
d
RTU 2
RTU 3
RTU 4
RTU n
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
User Terminal
User Terminal
User Terminal
Control Center
Remote Sites
Modem
RTU 1
Sensors/Relays
Master
Station
(Mainframe)
LAN
Microwave
Fiber
Radio
PSTN
l
a
t
i
g
i
d
RTU 2
RTU 3
RTU 4
RTU n
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
Sensors/Relays
User Terminal
User Terminal
User Terminal
Control Center
Remote Sites
Modem
RTU 1