Cyber Shield AnD for SCADA

Transcription

Cyber Shield AnD for SCADA
Cyber Shield
Presented by: Dennis Murphy Director, SCADA Cybersecurity Elbit Systems Email: dennis.murphy@elbitsystems-­‐us.com Phone: 603-­‐886-­‐2154 TwiJer: @CyberMurphy
Fides SCADA Anomaly Detection System Has Your Six
February 2015
Elbit Systems Corporate Snapshot Elbit Systems of America is a wholly owned subsidiary of Elbit Systems Ltd. (ESL): A leading global source of innovaQve, technology-­‐based systems for diverse defense and commercial applicaQons. q 
Israeli-based, multi-domestic
defense electronics company
q 
Publicly traded on NASDAQ and
Tel Aviv stock exchange (ESLT)
q 
Annual revenues: $2.9B
q 
13,000 employees across 13
countries
Europe 25% USA 30%
Rest Of World 24% Israel 21% History repeats itself… World War II A new dimension on the baJlefield The evoluQon of protecQng against air warfare Comprehensive Defense Maturity THREAT IS RUNNING WILD German Army – Lu[waffe -­‐ launches high level bombers INADEQUATE PREVENTION Barrage balloons of li7le use against high-­‐level bombers OUT OF CONTEXT, SILOED DETECTION Radar is able to warn but not defeat the threat INTEGRATED DETECTION, MITIGATION & CONTROL Integrated War rooms with detec?on and mi?ga?on The evoluQon of protecQng against advanced cyber threats Comprehensive Defense Maturity THREAT IS RUNNING WILD APTs are well-­‐targeted , with mul?-­‐surface a7acks INADEQUATE PREVENTION An?-­‐virus, firewalls and tradi?onal preven?on techniques are inadequate OUT OF CONTEXT, SILOED DETECTION Siloed detec?on capabili?es cannot effec?vely stop the threat in ?me INTEGRATED DETECTION, MITIGATION & CONTROL Centralized cyber opera?on that facilitate integrated early detec?on, effec?ve response, people and policies Market Trends and Challenges “
“
There is no such thing as 100% preven?on and there never will be Gartner 2014 Companies worldwide spend an es5mated $12 billion on basic cyber-­‐crime preven5on Associa'on of Cer'fied Fraud Examiners Stand alone prevenQon is inadequate Too many high priority alerts 10,000 alerts per hour ExisQng blocking and prevenQon capabiliQes are insufficient to protect against moQvated, advanced aJackers Source: Gartner; Bloomberg Business – 13 March 2014 with no ac5onable insight 20 days
alert went unchecked before breach announcement “Those alarms [should] have been impossible to miss, they went off early enough that the hackers hadn’t begun transmiFng the stolen card data out of Target’s network” Why tradiQonal prevenQon doesn’t work THE GREY ZONE Green Light
Red Light
APT – they play in the grey Injec5ons Dropper Crea5ng new process Screen shots Close process Driver load Why tradiQonal prevenQon doesn’t work Hacker
THE GREY ZONE Green Light
Red Light
APT – they play in the grey Injec5ons Dropper Crea5ng new process Screen shots Close process Driver load Blacklist
There is a seismic shi[ to detecQon Enterprise informa5on security budgets allocated to rapid detecQon and response Enterprises with a security data warehouse 60% 40% 10% 2014 5% 2020 2015 Over the next 5 years there will be a significant shi[ to rapid detecQon and response approaches Source: Gartner 2014
1
2020 Elbit Cyber Security Porkolio Context-­‐aware detecQon & miQgaQon for acQonable insight Technologies & tools Advanced technology for full range of cyber threats Policies, prac5ces, procedures Holis5c approach to protec5ng your organiza5on Trained personnel Coopera5on, collabora5on, intelligence Trained professionals equipped for dynamic threat Leverage wider “community” for enhanced protec5on Cyber Shield Porkolio Cyber Shield Training & SimulaQon Cyber Shield Analysis & DetecQon Cyber
Shield AnD
for SCADA
Cyber
Shield
AnD for IT
Cyber Shield MiQgaQon & Response Cyber Shield Context-­‐aware cyber threat detecQon & miQgaQon for acQonable insight Intelligent holis5c view of advanced cyber threats across mul5ple types of infrastructure for early detec5on and effec5ve response to protect isolated and semi-­‐isolated networks Cyber Shield Conceptual Architecture Cyber Shield TnS Cyber Shield MnR (Training and SimulaQon) (Mi5ga5on and Response) • 
• 
• 
• 
Cyber Shield AnD Event management Situa5onal awareness Contextual Impact Engine SOC Manager (Analysis Detec5on) •  Anomalies detec5on of behavioral paXerns •  Cross domain correla5on Cyber Shield Sensors
•  Detect local anomalies •  Smart data collec5on CS-­‐ICS (SCADA) External
Info
PrevenQon CS-­‐IT
CS -­‐ Weapon Systems Mapping & Assessment IT infrastructure
CS-­‐Mobiles SIEM
Active
Directory
Firewall
IT infrastructure enrichment
CyberShield AnD SCADA
(Analysis & Detection)
Protecting Critical Infrastructure
SCADA Networks • 
Most critical networks are geographically dispersed.
• 
The applications and protocols used in the SCADA network were designed without security.
• 
All security measures are aimed to isolate the control network from the enterprise – but in reality, interconnectivity is increasing.
• 
Good news – SCADA networks tend to be more deterministic and predictable, especially at the protocol level.
SoluQon Goal Monitoring and APT detec5on system of Independent SCADA/DCS network Reliability Visibility Control Safety Security Cyber Shield AnD Cyber Shield AnD for SCADA Compliance Cyber Shield AnD for SCADA -­‐ Module Overview BlackBox Appliance A small-­‐form “blackbox” that logs SCADA protocol traffic by passively monitoring the data communica5on between the field devices and the control center Insight Forensic & Analysis This module stores the blackbox collected data in a rela5onal database and allows to query, view, filter and run intelligent analysis in an ad-­‐hoc fashion AlerQng Applica5on-­‐aware profiler that alerts of network anomalies, mainly to detect malicious ac5vi5es NetMap Inventory and load monitoring of the control network and its nodes, with visualiza5on and trending features Cyber Shield AnD -­‐ SCADA sensors Cyber Shield SCADA sensors are small
modular computing nodes
Distributed architecture scalable up to
hundreds of monitoring appliances per
server installation
Passively monitors the SCADA network
traffic without reconfiguring or
redesigning the existing network
architecture
The sensors are capable of monitoring
RS-232 and RS-485 network protocols
such as Profibus and IEC-101
Cyber Shield AnD for SCADA – Typical Deployment Control Center
Enterprise Management
HMI
HMI
Corporate LAN
Syslog \ SNMP
FEP
SCADA Server
AnD Server
Syslog \ SNMP
Historian
CommunicaQon Backbone
Vlan\Inline\Separate Physical Network
SCADA Network
Remote SCADA Network
Switch
SOC
Mirror\Tapping port Ethernet\Serial
AnD Blackbox
RTU
IED
PLC
SIEM / Incident Management
AnD Components
ExisQng System
Cyber Shield AnD for SCADA – OperaQon Network Forensics
SCADA Alerts
Built-in client application for network
forensics
Summary list of all alerts
All SCADA network traffic is logged in a
central relational database for historical
analysis and correlation
Columns can be selected and advanced
filters set in place to perform advanced
network forensics
Export capability to rebuild the pcap files
for a defined event or time period
List can be filtered to find relevant
alerts
Allows for advanced analysis of
suspicious traffic anomalies
White List Rule Definition
Enables the user to manually or automatically
define rules on what transmissions are allowed
in the network, a relatively simple definition in
SCADA networks.
Monitors on all layers from physical (MAC) to
application-specific data (process data values)
Supported Protocols DF1
C37.118
UDH
Cyber Shield
TCP/RTU/+
leads the market with the
most comprehensive
support for SCADA
protocols
IEC60870-5-101/104
DNP3 / DNPi
Profinet/Profibus , Teleperm XP, TIM MDLC / MDLC over IP
Cyber Shield AnD for SCADA – Unique Offering AnD for SCADA – a full
suite of features
§ 
§ 
§ 
§ 
Complete Packet logging
for forensics
Context aware alerts
Passive Connectivity
Core Inspection
The only solution
providing legacy serial
inspection integrated
with TCP/IP inspection
Connectivity to
CyberShield provides
context aware
intelligence driven
response to enterprise
cyber security
CyberShield TnS
(Training & Simulation)
Cyber Shield Training and SimulaQon
An Enterprise level trainer - enabling the organization to train the Cyber Defenders and simulate
complex scenarios on the specific IT and SCADA networks
Simulating multistage, highly
advanced APT
attacks
Maximizing the
awareness and
improving the skills
of the cyber
workforce
Automatic attack machine - generating real-life scenarios training all the various Cyber
Defenders roles. Focused on accurately simulating multi-stages, multi-vectors, Cyber
attacks on the enterprise. Reflecting the real - operational network environment,
including IP and SCADA networks
Thank You!
February 2015
Presented by: Dennis Murphy Director, SCADA Cybersecurity Elbit Systems Email: dennis.murphy@elbitsystems-­‐us.com Phone: 603-­‐886-­‐2154 TwiJer: @CyberMurphy