CASE: Implementation of Cyber Security for Yara Glomfjord
Transcription
CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile – Olav Mo § ABB Norway § Integrated Operations § § Cyber Security Manager Oil, Gas and Chemicals § § © ABB Group September 27, 2015 | Slide 2 Team Lead Cyber Security & Infrastructure Member of the global ABB Cyber Security organization since 2010 Working with Cyber Security for Automation since 2003 § Master's degree in Engineering Cybernetics at NTNU § Thesis on Remote Access to Offshore Oil & Gas Installations Implementation of Cyber Security for Yara Glomfjord Agenda § Cyber security best practices § Yara Glomfjord § © ABB Group September 27, 2015 | Slide 3 § Target and timeline § Installed Base § Deployment Project § Service Agreement Secure in Deployment § Cyber Security Guidelines § Cyber Security Services Cyber security best practices Lots of support available Design Details Industrial Autom. Energy IT IEC 62351 Technical Aspects NIST 800-53 IEEE P 1686 NIST Cyber Security Framework Details of Operations Relevance for Manufacturers NERC CIP Management/ Process Aspects ISA 99* IEC 62443 ISO 27K Operator Manufacturer Completeness © ABB Group September 27, 2015 | Slide 4 Source: ESCoRTS Project (European network for the Security of Control and Real-Time Systems), with ABB additions. * Since the closing of the ESCoRTS project, ISA decided to relabel the ISA 99 standard to ISA 62443 to make the alignment with the IEC 62443 series more explicit and obvious. Cyber security best practices ABB’s view § ISA 99 / IEC 62443 Applicable for operators/users & manufacturers/vendors and has the most significant scope § § NIST Cyber Security Framework § NERC CIP § © ABB Group September 27, 2015 | Slide 5 The most prominent standard and it is international ABB will target compliance for 800xA Limited details, but a good way to get started for control system users. In the US, bulk electric systems has to comply. Industrial Autom. Energy IT PA Cyber security best practices IEC 62443 Published © ABB Group September 27, 2015 | Slide 6 (may be under review) PA Cyber security best practices IEC 62443-2 & IEC 62443-3 2. Policies & procedures 3. System requirements FR 1 Identification and authentication control • User, software, & device authentication • Account management FR 2 Use control • Authorization enforcement • Auditable events FR 3 System integrity • Communication integrity • Malicious code protection FR 4 Data confidentiality • Information confidentiality FR 5 Restricted data flow • Network segmentation FR 6 Timely response to events • Audit log accessibility • Continuous monitoring FR 7 Resource availability • Denial of service protection • Control system backup © ABB Group September 27, 2015 | Slide 7 Cyber security best practices Defense in Depth The coordinated use of multiple security measures, addressing people, technology, and operations. © ABB Group September 27, 2015 | Slide 8 Yara Glomfjord Setting the target § Yara Technical and Operational Standard 1-17: Production IT Security Standard § § © ABB Group September 27, 2015 | Slide 9 Describes the security requirements regarding the procurement, set-up, operation and retirement of Production IT systems... ABB Cyber Security Guidelines § Security Policy § Security Design Specification Yara Glomfjord Timeline © ABB Group September 27, 2015 | Slide 10 § 2011: GAP analysis made by Yara Glomfjord towards internal standard § 2012 Q1: Pre-study by ABB § System upgrade seen as most effective solution to get Cyber Security issues addressed § Estimated time saving: 55% § This would also address system lifetime issues § 2012 Q2: ABB Cyber Security Guidelines used as basis with necessary adjustments required in Yara internal standards § 2012 Q4: Upgrade completed and Cyber Security implemented § 2014: Service Agreement with Cyber Security Services included § 2015: Renewal of Service Agreement Yara Glomfjord Installed base § § § § © ABB Group August 29, 2015 | Slide 11 External Infrastructure § Secure Update Server § Firewall Computers § 12 Operator Workstations § 2 Engineering Workstations § 7 System Servers § Management Server § Backup Server Controllers § 14 800xA AC800M § 4 * Advant AC450 Network Equipment Yara Glomfjord Deployment Project – Security Design Specification § 2. IT Infrastructure § 3. Security Implementation § § § © ABB Group August 29, 2015 | Slide 12 § Secure Update Servers § Backup and Recovery § Patch Management § Anti-Virus § Hardening 4. Computer and User Configuration § Group Policy Management § Organizational Units § Role Based Access Control § Security Configuration (in System 800xA) 5. Network and Interface § Monitoring § Network planning and documentation § Communication Interfaces § Network Setup for the Execute Project Phase 6. Upgrade to System 800xA Rev. A Yara Glomfjord Service Agreement § § § © ABB Group September 27, 2015 | Slide 13 Basic services (required) § Service Desk § Change Management § Configuration Management (Inventory Database) § Field Alert Management (e.g. Security Update and Vulnerabilities) Cyber Security Services § Service Maintenance and Incident Handling § Security Patch Management § Antivirus Management § System Security Monitoring § System Backup and Restore Optional Services Yara Glomfjord Operational Tasks § All Cyber Security Services are based on Operational Tasks § Operational tasks are defined in the Cyber Security Guidelines § © ABB Group September 27, 2015 | Slide 14 § The Engineering team run the Operational Tasks in the Project Deployment phase § The Service organization take over the responsibility for the Operational phase Operational tasks definition § Title: Name of task § Type: Frequency (Ad-hoc, Daily, Weekly, Monthly, Yearly) § Estimated effort: Number of hours § Purpose: Brief description of scope § Description: Detailed step by step list of actions Secure in Deployment Defense in Depth SD3 + C Secure by Design Secure by Default Secure in Deployment Communication © ABB Group September 27, 2015 | Slide 15 The coordinated use of multiple security measures, addressing people, technology, and operations. Secure in Deployment Cyber Security Guidelines Set of documents describing how to engineer and commission projects and maintain and service a system. § 100 - Security Policy § 101 - Security Design Specification SD3 + C § 102 - Antivirus Software Secure by Design § 103 - Patch Management § 104 - Secure Default Settings & Hardening § 105 - Access & Account Management § 106 - Backup & Recovery § 107 - Plant Network Topology § 108 - Secure Remote Access § 109 - System Connectivity § 110 - Security Monitoring & Diagnostics Secure by Default Secure in Deployment Communication © ABB Group September 27, 2015 | Slide 16 Secure in Deployment Cyber Security Services Fingerprint SD3 + C Assessment Secure in Deployment Communication © ABB Group September 27, 2015 | Slide 17 Sustain The Cyber Security Services is established to maintain Information Security for critical process systems. Secure by Design Secure by Default Implementation § Security Patch Management § Antivirus Management § User and Access Management § System Security Monitoring § System Backup and Restore § Network Management § Cyber Security Fingerprint Secure in Deployment Cyber Security Fingerprint Fingerprint SD3 +C Secure by Design Secure by Default Assessment Benefits: § § Consistent – same everywhere High and even quality Secure in Deployment § Repeatable Communication § Based on best practicies Implementation Sustain • Data • Collect • Store • View • Analyze • Interpret • Report © ABB Group September 27, 2015 | Slide 18 Secure in Deployment Cyber Security Assessment Fingerprint Assessment Implementation What to protect and how to protect: SD3 + C Secure by Design Secure by Default Secure in Deployment Communication © ABB Group September 27, 2015 | Slide 19 Sustain Secure in Deployment Cyber Security Implementation Fingerprint SD3 + C Secure by Design Secure by Default Secure in Deployment Assessment Physical Security Procedures and Policies Microsoft Firewall Computer Policies Account Management Security Updates Antivirus Solutions Communication © ABB Group September 27, 2015 | Slide 20 Implementation Sustain Secure in Deployment Cyber Security Sustain Fingerprint SD3 +C Secure by Design Secure by Default Secure in Deployment Communication Assessment Service agreements are tailored to fit customer needs and can represent everything from a fast response service to a longterm partnership including a wide range of services. Implementation Sustain Site service desk Scheduled services Service Environment Integrated roles © ABB Group September 27, 2015 | Slide 21 Shared work processes How ABB works with Cyber Security An integral part of ABB’s products and systems © ABB Group September 27, 2015 | Slide 22 ©©ABB ABBGroup Group September 27, 2015 | Slide 24 September 27, 2015 | Slide 24