Waterfall WECC DEWG-d13
Transcription
Waterfall WECC DEWG-d13
Securing ICCP Connections with Unidirectional Security Gateways Andrew Ginter, VP Industrial Security Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 1 Unidirectional Security Gateways – Eg: Database Replication Hardware-enforced unidirectional server replication Replica server contains all data and functionality of original Corporate workstations communicate only with replica server Industrial network and critical assets are physically inaccessible from corporate network & 100% secure from any online attack Absolute protection from network attacks originating on external networks Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 2 The Problem With Firewalls Attack Type UGW Fwall 1) Phishing / drive-by-download – victim pulls your attack through firewall 2) Social engineering – steal a password / keystroke logger / shoulder surf 3) Compromise domain controller – create ICS host or firewall account 4) Attack exposed servers – SQL injection / DOS / buffer-overflow 5) Attack exposed clients – compromised web svrs/ file svrs / buf-overflows 6) Session hijacking – MIM / steal HTTP cookies / command injection 7) Piggy-back on VPN – split tunneling / malware propagation 8) Firewall vulnerabilities – bugs / zero-days / default passwd/ design vulns 9) Errors and omissions – bad fwall rules/configs / IT reaches through fwalls 10) Forge an IP address – firewall rules are IP-based Attack Difficulty: Impossible Routine Easy Photo: Red Tiger Security Firewalls are routers – they forward messages into protected networks Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 3 Family of Unidirectional Security Technologies Unidirectional Security Gateway – absolute protection FLIP – Unidirectional Gateway reverses on a schedule Inbound / Outbound – two Unidirectional Gateways replicating servers independently Application Data Control – software add-on for fine-grained policy-based inspection and control of application data flows Secure Bypass – for emergency access to unidirectionally-protected networks All stronger than firewalls Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 4 Inbound / Outbound ICCP Replication – Eg: Balancing Auth BA sends ICCP setpoints to partner utilities every 2 seconds + polls utilities for ICCP data every 2 seconds Independent channels – not cmd/response Each channel replicates ICCP servers Unidirectional communications are not ERC no requirement for network intrusion detection NERC CIP is the bare minimum protections that both large and small utilities must deploy The most important networks demand additional protections Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 5 Two Independent ICCP Replications No ICCP packets forwarded – protocol level attacks terminate in Agent Hosts Attacks on outbound channel cannot affect protected network Attacks on inbound channel require three compromised machines, two pivots, last two compromises are “flying blind” Firewalls in contrast – single hop for attacks Stronger than firewalls Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 6 Inbound / Outbound Gateways at Balancing Authority Perimeter Security Attack Tree UGW Firewall 1) Phishing / drive-by-download – victim pulls your attack through firewall 4 2 Attack Success Rate 2) Social engineering – steal a password / keystroke logger / shoulder surf 4 1 Impossible 3) Compromise domain controller – create ICS host or firewall account 4 2 4) Attack exposed servers – SQL injection / DOS / buffer-overflow 3 2 5) Attack exposed clients – compromised web servers / file svrs / buf-overflows 4 2 6) Session hijacking – MIM / steal HTTP cookies / command injection 3 2 7) Piggy-back on VPN – split tunneling / malware propagation 4 2 8) Firewall vulnerabilities – bugs / zero-days / default passwords/ design vulnerabilities 3 2 9) Errors and omissions – bad fwall rules/configs / IT reaches through fwalls 3 2 10) Forge an IP address – firewall rules are IP-based 4 2 11) Bypass network perimeter – cabling/ rogue wireless / dial-up 1 1 12) Physical access to firewall – local admin / no passwd / modify hardware 3 2 13) Sneakernet – removable media / untrusted laptops 1 1 41 23 Total Score: Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. Extremely Difficult Difficult Straightforward 7 Remote Screen View – For High-Risk Vendor Connections Vendors can see control system screens in web browser Remote support is under control of on-site personnel Any changes to software or devices are carried out by on-site personnel, supervised by vendor personnel who can see site screens in real-time Vendors supervise site personnel Site people supervise the vendors Each perspective is legitimate, both needs are met Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 8 NERC CIP V5 & V6 - Unidirectional Gateways “Designed In” CIP V5 encourages the use of Unidirectional Security Gateways External Routable Connectivity: The ability to access a BES Cyber System that is accessible from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection. 37 of 128 medium-impact requirements do not apply if only communication through ESP is unidirectional, not ERC These are legitimate exemptions, reflecting strong, physical protection “When you are considering security for your control networks, keep in mind innovative technologies such as unidirectional gateways” Tim Roxey, NERC CSSO Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 9 NERC CIP Auditors Agree Q: Is External Routable Connectivity possible through Unidirectional Gateways? “No” [if an] entity claimed uni-directional communications (therefore out-of-scope for ERC), … auditors would … seek evidence that supports … that claim” “A Unidirectional Gateway configured to allow outbound traffic from the ESP but not allow inbound traffic to enter the ESP would effectively eliminate External Routable Connectivity” Q: Is Remote Screen View Interactive Remote Access? “No” “[With RSV] … the user-initiated process to push screen snapshots through the ESP is originating from within the ESP. By definition, that does not constitute IRA. Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 10 NERC CIP High-Impact and Medium-Impact Exemptions Standard 002 003 004 005 006 007 008 009 010 011 014 BES Cyber System Categorization Security Management Controls Personnel & Training Electronic Security Perimeters Physical Security Systems Security Management Incident Reporting & Resp. Planning Recovery Plans Change Mgmt & Vuln Assessments Information Protection Substations Totals: Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. Rules Med-Impact Exemptions High-Impact Exemptions 7 4 19 8 14 20 9 10 10 4 23 128 15 6 11 5 37 5 5 11 Protecting Power Generation Continuous monitoring of critical systems Remote control from generating dispatch centers Safe cloud/services supply chain integration Replacing at least one layer of firewalls with unidirectional protections breaks the chain of infection / pivoting attacks from the Internet Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 12 Segmenting Generating Units V5 transition guidance: segmentation makes Medium Impact plants Low Impact Strong security: breaks one large target into many smaller ones Using firewalls for segmentation introduces compliance risk: FERC is considering a request for interpretation The smallest mistake in firewall configuration can breach segmentation Unidirectional gateways reduce compliance costs and compliance risks Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 13 Enabling Turbine Monitoring and Diagnostics Replicate turbine monitoring data sources to vendor’s central site No changes needed at central vendor site When adjustment is needed, vendor schedules RSV appointment Remote Screen View: “can look, but can’t touch” CIP-certified site personnel make adjustments – vendor advises / supervises Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 14 Protecting Substations & Relays Unidirectional Gateways protect the protective relays to prevent equipment damage FLIP option permits scheduled password changes Inbound / outbound protects entire substation – pure monitoring, or monitor and control Protect SCADA system – from substations and WAN Stronger than firewalls – raises bar to the point where active assistance by insider is needed for effective compromise Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 15 Standards - NIST 800-82 Rev 2 Unidirectional Gateways are “… used in guaranteeing information security or protection of critical digital systems, such as industrial control systems, from inbound cyber attacks.” Security priorities: “ICS cybersecurity programs should always be part of broader ICS safety and reliability programs at both industrial sites and enterprise cybersecurity programs, because cybersecurity is essential to the safe and reliable operation of modern industrial processes.” Cyber threats to reliability include equipment damage due to cyber-sabotage Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 16 Standards: ANSSI Cybersecurity for Control Systems Three classes of networks: Class 1 “expendable”: IT-style protection Class 2 “important”: recommends unidirectional communications, strongly discourages remote access Class 3 “very important”: forbids firewalls, forbids remote access, permits only unidirectional communications Which of our ICS networks is important? Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 17 NERC CIP exempts unidirectionally-protected sites from 30% of requirements DHS recommends unidirectional gateways in three of sever steps to secure control systems NIST – gateways are used in guaranteeing protection of critical systems (NIST 800-82 Rev 2) ANSSI Cybersecurity for ICS – many requirements for hardware-enforced unidirectionality ENISA - unidirectional gateways provide better protection than firewalls Unidirectional gateways – limit the propagation of malicious code (ISA SP-99-3-3 / IEC 62443-3-3) Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 18 Waterfall Security Solutions Headquarters in Israel, sales and operations office in the USA Deployed world-wide in all critical infrastructure sectors Waterfall is a remote access thought leader for high-security applications Waterfall delivers an innovative solution for securing OT infrastructures against ever-increasing cyber-threats IT and OT security architects should consider Waterfall for OT networks Strategic partnerships with Schneider Electric, GE, Westinghouse, Siemens, OSIsoft, and many others Market leader for Unidirectional Gateways Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 19 Reduce Costs and Risks With Unidirectional Security Gateways Security risks: absolute protection of safety and reliability of control system assets, from network attacks originating on external networks Operating costs: reduce firewall operating costs Compliance costs: relief from 37 Medium/ERC, 5 High/ERC rules Compliance costs: unidirectionally segmented plants are Low Impact Compliance risk: No fumble-fingered firewall can impair protection – server replication is intrinsic to Unidirectional Gateways Which of our networks deserve stronger protection than firewalls can provide? Copyright © 2016 Waterfall Security Solutions Ltd. All rights reserved. 20