Network Security Considerations for the IIoT Challenge

Report 5 Downloads 58 Views
Network Security Considerations for the IIoT Challenge

Glenn Longley Regional Manager – Energy FreeWave Technologies

Agenda • How network security expectations have evolved, including the role of SCADA in today’s IIoT networks • The convergence of Operations Technology (OT) and Information Technology (IT) • How both OT and IT experience trade-offs in building a secure network • IIoT network security threats and how to address them • Considerations for selecting secure technology for IoT purposes

SCADA -> IIoT • Network security expectations have evolved, including the role of SCADA in today’s IIoT networks – – – – – –

Evolution over time More Data, More Sensors IP Everywhere Multiple Consumers Beyond physical perimeters Multiple electronic perimeters

Internet of Things (IoT)

Industrial IoT (IIoT) Machine to Machine (M2M)

SCADA

IIoT Network Hierarchy Enterprise Layer – IT / Enterprise Systems – Business Processes

Distribution Layer – Transport from Enterprise to Aggregation Points

Aggregation Layer – End Device Network Ingress – Data Backhaul

Access Layer – Sensors / End Devices – Smart Devices

IIoT - Diverse Networks Enterprise Layer

Distribution Layer

Long Haul

Aggregation Layer

Short Haul

Access Layer

Close Haul

Sensor Sensor Sensor SensorSensor

5 to 30 Miles 8 to 48 km

1 to 8 Miles 1.5 to 12 km

0 to 2 Miles 0 to 3 km

IT – New Threats • Information Technology (IT) • Focused on protecting from “The Internet”

IT

OT

OT – New Threats • Operations Technology (OT) • Local decisions, focused on Operation Needs

IT

OT

IT – OT Convergence • Convergence of Operations Technology (OT) and Information Technology (IT)

IT

OT

IIoT Network Security Threats • • • •

Lack of Security in Initial Planning Lack of Security in SCADA Protocols Security through obscurity Physical Security

IIoT Network Security Threats • • • • •

Air Gapped / Lack of Internet Connection Egg Shell Security Easy to Use vs. Security Consumer Tech moving into Industrial Long Equipment Life

Real World Example • 2005? - Stuxnet • Most Widely known SCADA Attack • Discovered in 2010 • Targeted Siemens PLCs • Iran Nuclear Capabilities • Physical Damage to Equipment • Wide Spread & Improved Everyone’s capabilities – Code is now public :: ex. Duqu –

https://en.wikipedia.org/wiki/Stuxnet

Country

Share of infected computers

Iran

58.85%

Indonesia

18.22%

India

8.31%

Azerbaijan

2.57%

United States

1.56%

Pakistan

1.28%

Other countries

9.2%

Real World Example • 2011 Night Dragon – Based out of China • November 2009, coordinated covert and targeted cyberattacks conducted against global oil, energy, and petrochemical companies. • Social engineering, spearphishing, operating systems vulnerabilities & more • Competitive proprietary operations and project-financing information with regard to oil and gas field bids and operations • False Data Threat –

http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf

Real World Example • 2015 – Ukrainian Electric Utility • Multipronged attack – TDoS to prevent service techs – Malware wiped control systems servers to prevent recovery – Malicious Firmware on Terminal Servers

• Presumably State Sponsored • 230,000 people without power for days – Full Details are not yet released – –

http://phys.org/news/2016-01-cyberattack-ukraine-power-grid.html http://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

Threat Example • Easy to find in the public IP Space • Vendor Neutral Search for “Oil” • Top Service – Automated Tank Gauge • Telnet open on 81 devices

Threat Example • Let’s Refine and search for “Tank” • 1595 devices in the US alone • Location information with In-Tank Inventory • False Data Threat

Threat Example

16

Considerations – Selecting Secure Technology • • • •

Understand your Requirements & Regulatory Environment Experience in Secure Environments Ability to describe Security Mechanisms Understand your Threat vectors • Physical vs. Cyber vs. Over the Air

Don’t Reinvent, Consider Standards • IEEE 1686, Intelligent Electronic Devices Cyber Security Capabilities • NERC CIP 002-009, Cyber Security Standards • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations • NIST SP 800-82, Guide to Industrial Control Systems (ICS) Security • NIST NISTIR 7268, Guidelines for Smart Grid Cybersecurity • FIPS 140-2, Security Requirements for Cryptographic Modules

Considerations - Secure Technology • Ease of Use vs. Secure vs. Functionality Tradeoffs • External Factors

• Past Vulnerabilities Security

• Implement Best Practices • Testing / Evaluation Plan • On going Improvements

Functionality © 2016 FreeWave Technologies, Inc. Company Confidential

Ease of Use 5/5/2016

19

Selecting Secure Technology • • • • • •

Consider How to Break In & Preparations for Each Consider 3rd Party Pen Testing Consider Deep Packet Inspection Techniques Consider How to Isolate SCADA networks Consider Security Audits and Assessments (Not just once) Consider Ways to Improve Security Culture