Industrial Security Reale Gefahren aus dem virtuellen

Transcription

Industrial Security Reale Gefahren aus dem virtuellen
Helping to increase your resistance to attack
Industrial Security
Reale Gefahren aus dem virtuellen Raum
Unrestricted / © Siemens AG 2015. All Rights Reserved.
siemens.com/industrialsecurity
Industrial Security
• The age of cyberattacks
• The concept of Defense-in-Depth
• The Siemens approach
• Awareness is Key
• Outlook: in future cybersecurity will be regulated
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 2
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Security Trends
Globally we are seeing more network connections than ever before
Trends Impacting Security
• Cloud Computing approaches
• Increased use of Mobile Devices
• Wireless Technology
• Reduced Personnel Requirements
• Smart Grid
• The worldwide and remote access to remote
plants, remote machines and mobile applications
• The “Internet of Things”
Source: World Economic Forum, 50 Global Risks
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 3
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
The corporate security chain is only as strong as its weakest link
Security Can Fail at Any of these Points
• Employee
• Smartphone
• Laptops
• PC workstations
• Network infrastructure
• Mobile storage devices
• Tablet PC
• Computer center
• Policies and guidelines
• Printer
• Production systems
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 4
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Why has industrial security become so important?
Main Trends Impacting the Vulnerability of Automation Plants
• Horizontal and vertical Integration at all network levels
• Connection of automation networks with IT-Networks and Internet for remote
maintenance
• Increased use of open standards and PC-based systems
• Possible Threats increased due to these trends:
• Access violation through unauthorized persons
• Espionage and manipulation of data
• Damages and data loss caused by malware
• Several security incidents reveal the vulnerability of automation plants.
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 5
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Cyber vulnerabilities can affect your plant at many level
The Need to Act Because of Cyber Security
Vulnerabilities
• Loss of intellectual property, recipes,…
• Sabotage of production plant
• Plant downtime e.g. caused by virus and malware
• Manipulation of data or of application software
• Unauthorized use of system functions
• Regulations and standards for industrial security
require conformance
• Regulations:
FDA, NERC CIP, CFATS, CPNI, KRITIS
• Standards:
ISA 99, IEC 62443
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 6
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Threat analysis
Every three years new developments
The Age of
Computerworms
CodeRed Slammer Blaster
Cybercrime and
Financial Interests
Politics and
Critical Infrastructure
Zeus
Aurora
SpyEye
Rustock
“Hacking for Fun”
“Hacking for Money”
Hobbyists
Organized Criminals
Credit Card Fraud
Botnets
Banker Trojans
Worms
Backdoors
Anti-Virus
Phishing
Hackers
Viruses
SPAM
Adware
BlackHat
Nitro
CyberwarfarePreparation
“Hacking for political and
economic gains”
Hacktivists
State sponsored Actors
Anonymous
SCADA
RSA Breach
DigiNotar
APT
Targeted Attacks
WebSite Hacking
???
Stuxnet
Sony Hack
“Development and spreading
of cyberwarface capabilities”
Multiple state- and
non-state actors
Underground exploit market
Systematic remote exploration
and reconnaissance of critical
Infrastructures and vendors
Increasing sophistication, focus
and brutality/impact of cyber methods
Responsible Disclosure
Number of new malware signatures
Introduction of malicious, sleeping
functionality in critical products
Number of published exploits
Number of published vulnerabilities
2001
2002
2003
2004
2005
2006
2007
?
2008
2009
2010
2011
2012
2013
2014
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 7
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Top 10 threats
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 8
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
• The age of cyberattacks
• The concept of Defense-in-Depth
• The Siemens approach
• Awareness is Key
• Outlook: in future cybersecurity will be regulated
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 9
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
IACS, automation solution, control system
Industrial Automation and Control System
(IACS)
Asset Owner
operates
Operational and Maintenance
policies and procedures
+
System
Integrator
Automation solution
designs and deploys
Basic Process Control System
(BPCS)
Safety Instrumented System
(SIS)
IACS environment / project specific
is the base for
Product Supplier
develops
Control System
as a combination of
Embedded
devices
Network
components
Host
devices
Applications
Independent of IACS environment
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 10
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Actual structure of IEC / ISA-62443
Main documents to be published
IEC / ISA-62443
General
Policies and procedures
System
Component
1-1 Terminology, concepts and
models
2-1 Requirements for an IACS
security management system
Ed.2.0
Profile of
ISO 27001 / 27002
3-1 Security technologies for IACS
4-1 Product development
requirements
TR* 2009
ID* 4Q13
3-2 Security risk assessment and
system design
4-2 Technical security requirements
for IACS products
IS* 2009
1-2 Master glossary of terms and
abbreviations
DC* 10/12
ID* 4Q13
DC* 2Q13
1-3 System security compliance
metrics
2-3 Patch management in the IACS
environment
DTS* 1Q14
Rejected
TR* 4Q14
3-3 System security requirements
and security levels
IS* 08/2013
2-4 Requirements for IACS solution
suppliers
IS* 4Q14
Definitions
Metrics
Requirements placed on security
organization and processes of the
plant owner and suppliers
*DC: Draft for Comment
*IS: International Standard
*CDV: Committee Draft for Vote
*TR: Technical Report
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 11
January 2015
Requirements to achieve a
secure system
*ID: Initial Draft
Requirements to secure system
components
Functional requirements
Processes / procedures
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Various parts of IEC / ISA-62443
are addressing Defense in Depth
Main parts
of IEC 62443
General
IEC / ISA-62443
Policies and procedures
System
Component
Asset Owner
2-1
2-4
Operational and Maintenances
policies and procedures
System Integrator
2-4
3-2
3-3
Policies and procedures
Security capabilities of the
Automation Solution
Product Supplier
3-3
4-2
4-1
Security capabilities of the products
Development process
‘Defense in Depth’ involves all stakeholders:
Asset Owner, System Integrator, Product Supplier
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 12
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
IACS, automation solution, control system
Industrial Automation and Control System
(IACS)
Asset Owner
operates
Operational and Maintenance
policies and procedures
2-1
2-4
+
2-4
System
Integrator
Automation solution
designs and deploys
Basic Process Control System
(BPCS)
3-2
Safety Instrumented System
(SIS)
3-3
IACS environment / project specific
is the base for
Product Supplier
develops
4-1
Control System
as a combination of
Embedded
devices
Network
components
Host
devices
Applications
3-3
4-2
Independent of IACS environment
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 13
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Each stakeholder can create vulnerabilities
Industrial Automation and Control System
(IACS)
Invalid accounts not
deleted
Asset Owner
Operational and Maintenance
policies and procedures
operates
can create
weaknesses
Non confidential
passwords
Passwords not renewed
+
System
Integrator
can create
weaknesses
Temporary accounts not
deleted
Automation solution
designs and deploys
Basic Process Control System
(BPCS)
Safety Instrumented System
(SIS)
Default passwords not
changed
IACS environment
base for
Product Supplier
develops
can create
weaknesses
Control System
as a combination of
Embedded
devices
Network
components
Host
devices
Elevation of privileges
Applications
Hard coded passwords
Example: User Identification and Authentication
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 14
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
• The age of cyberattacks
• The concept of Defense-in-Depth
• The Siemens approach
• Awareness is Key
• Outlook: in future cybersecurity will be regulated
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 15
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
IACS, automation solution, control system
Industrial Automation and Control System
(IACS)
Asset Owner
Operational and Maintenance
policies and procedures
operates
+
System
Integrator
Automation solution
designs and deploys
Basic Process Control
System (BPCS)
Safety Instrumented
System (SIS)
Complementary
Hardware and Software
IACS environment / project specific
Siemens is product and solution supplier
Product Supplier
develops
is the base for
Control System
as a combination of
Embedded
devices
Network
components
Host
devices
Applications
Independent of IACS environment
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 16
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
The Defense in Depth Concept
Plant security
§ Physical prevention of access to critical areas
§ Establishing a Security Management Process
Network security
§ Controlled interfaces between office and plant network
e.g. via firewalls
§ Further segmentation of plant network
System integrity
§ Antivirus and whitelisting software
§ System hardening
§ Maintenance and update processes
§ User authentication for plant or machine operators
§ Integrated access protection mechanisms in automation
components
Security solutions in an industrial context must take account of all protection layers
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 17
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Siemens Industrial Security approach
Industrial Security
The Siemens Approach
Implementation of Security Management
The interfaces are subject to regulations and are monitored accordingly.
PC-based systems must be protected.
The control level must be protected.
Communication must be monitored and can
be segmented.
The Siemens approach is based on five key points
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 18
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
The Siemens Solution
Industrial Security Services
Security Management
Products & Systems
Managed service and
consulting
Processes and policies
Secure PCs,
controllers and
networks
§ Integral security in PCs and
controllers
§ Security products for
networking and communication
The Siemens solution reduces your risk with a well thought-out security concept
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 19
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Step-by-step approach for long-term protection of your industrial control
system (ICS)
Step 1:
Step 2:
Step 3:
Assess
Implement
Information about the security
Planning, development and
Continuous security
services
status and development of a
implementation of a holistic
security roadmap
cyber security program
• Vulnerability analysis
• Gap analysis
• Threat analysis
• Risk analysis
Continuous security through
detection and proactive
protection
• Cyber security training
• Development of security
• Global Threat Intelligence
• Detection and resolution of
strategies and procedures
• Implementation of security
technology
incidents
• Fast adaptation to changing
threats
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 20
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
The Siemens solution for plant security
Implementation of Security Management
The interfaces are subject to regulations
- and are monitored accordingly.
Plant security
PC-based systems must be protected.
The control level must be protected.
Communication must be monitored and
can be segmented.
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 21
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Security Management
Security Management Process
1
• Risk analysis with definition of mitigation
measures
• Setting up of policies and coordination of
organizational measures
• Coordination of technical measures
• Regular / event-based repetition of the risk
analysis
Risk analysis
4
2
Validation &
improvement
Policies,
Organizational
measures
3
Technical
measures
Security Management is essential for a well thought-out security concept
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 22
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
The Siemens Solution for Network Security
Implementation of Security Management
The interfaces are subject to regulations
- and are monitored accordingly.
PC-based systems must be protected.
Network security
System Integrity
The control level must be protected.
Communication must be monitored and
can be segmented.
Implementierung des SecurityPage
23
January 2015
Managements
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Security Integrated is an essential component of a Defense in Depth concept
Plant security
• Access blocked for unauthorized persons
• Physical prevention of access to critical components
Network security
• Controlled interfaces with SCALANCE firewalls
• Further segmentation with Advanced CPs
System integrity
• Know-how protection
• Copy protection
• Protection against manipulation
• Access protection
• Expanded access protection with CP 1543-1
Siemens products with Security Integrated provide security features such as integrated
firewall, VPN communication, access protection, protection against manipulation.
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 24
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
SIMATIC S7-1500 and the TIA Portal
Security Highlights
The SIMATIC S7-1500 and the TIA Portal provide several security features:
• Increased Know-How Protection in STEP 7
Protection of intellectual property and effective investment:
• Password protection against unauthorized opening of program blocks in STEP 7 and thus protection against
unauthorized copying of e.g. developed algorithms
• Password protection against unauthorized evaluation of the program blocks with external programs
• from the STEP 7 project
• from the data of the memory card
• from program libraries
• Increased Copy Protection
Protection against unauthorized reproduction of executable programs:
• Binding of single blocks to the serial number of the memory card or PLC
• Protection against unauthorized copying of program blocks with STEP 7
• Protection against duplicating the project saved on the memory card
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 25
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
SIMATIC S7-1500 and the TIA Portal
Security Highlights
The SIMATIC S7-1500 and the TIA Portal provide several security features:
• Increased Access Protection (Authentication)
Extensive protection against unauthorized project changes:
• New degree of Protection Level 4 for PLC, complete lockdown (also HMI connections need password) *
• Configurable levels of authorization (1-3 with own password)
• For accessing over PLC and Communication Module interfaces
• General blocking of project parameter changes via the built-in display
• Expanded Access Protection
Extensive protection against unauthorized project changes:
• Via Security CP1543-1 by means of integrated firewall and VPN communication
• Increased Protection against Manipulation
Protection of communication against unauthorized manipulation for high plant availability:
• Improved protection against manipulated communication by means of digital checksums when accessing controllers
• Protection against network attacks such as intrude of faked / recorded network communication (replay attacks)
• Protected password transfer for authentication
• Detection of manipulated firmware updates by means of digital checksums
* Optimally supported by SIMATIC HMI products and SIMATIC NET OPC Server
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 26
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
• The age of cyberattacks
• The concept of Defense-in-Depth
• The Siemens approach
• Awareness is Key
• Outlook: in future cybersecurity will be regulated
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 27
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Security Awareness is a basic Element
Technical Security
Organization
Security
Awareness
Processes
Standardization/
Regulations
Industrial Security must be addressed at different levels
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 28
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
… die 10 Top-Tipps der Informationssicherheit
1
Stufen Sie Informationen richtig ein, z.B. als “vertraulich”, und schützen Sie diese
entsprechend
2
Machen Sie Informationen nur denjenigen zugänglich, die diese wirklich benötigen
3
Geben Sie persönliche Passwörter, Zugangscodes oder Ihre PIN/PKI nicht weiter – auch
nicht zu Vertretungszwecken
4
Speichern oder versenden Sie vertrauliche Informationen nur verschlüsselt. Verschlüsseln
Sie Ihre Kommunikation mit Externen
5
Nutzen Sie sichere Entsorgungswege für vertrauliche Informationen, z.B. spezielle
Container, Schredder
6
Führen Sie auf Reisen nur Informationen und Geräte mit, die Sie wirklich brauchen
7
Schützen Sie Informationen vor ungewollten Blicken und unerwünschten Zuhörern, im Büro
und in der Öffentlichkeit
8
Seien Sie stets vorsichtig und wachsam im Umgang mit dem Internet und mit E-Mails
9
Halten Sie Ihre PC- und Antivirus-Software stets auf dem aktuellen Stand
10
Verständigen Sie sofort Ihren InfoSec Advisor, wenn Sie unsicher sind oder Gefahr
vermuten
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 29
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
• The age of cyberattacks
• The concept of Defense-in-Depth
• The Siemens approach
• Awareness is Key
• Outlook: in future cybersecurity will be regulated
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 30
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Security will be regulated
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 31
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Assessment of cybersecurity requires an holistic approach
Cybersecurity protection of IACS
Asset Owner has the appropriate
operational and maintenance policies and procedures
to operate in a secure fashion an automation solution
Asset Owner
+
operates
Automation
solution
Automation solution fulfills the security functionalities required
by the target protection level of the plant
controls
SL 1
Protection against casual or coincidental violation
SL 2
Protection against intentional violation using simple means with low resources, generic skills and
low motivation
SL 3
Protection against intentional violation using sophisticated means with moderate resources, IACS
specific skills and moderate motivation
SL 4
Protection against intentional violation using sophisticated means with extended resources, IACS
specific skills and high motivation
Plant
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 32
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Thank you for your attention!
Dr. Pierre Kobes
Product and Solution Security Officer
PD TI ATS TM 2
E-Mail: [email protected]
siemens.com/industrialsecurity
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 33
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Support & Service for Industrial Security
Information about Industrial Security
WWW: http://www.siemens.de/industrialsecurity
Email: [email protected]
Contact in Marketing Promotion Industrial Security
Oliver Narr
Email: [email protected]
Phone: +49 (911) 895-2442
Contact for Industrial Security Services
Stefan Woronka
Email: [email protected]
Phone: +49 (721) 595-4500
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 34
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Support & Service for Industrial Security
SIMATIC System Presales Support Factory Automation
Email: [email protected]
Phone: +49 (911) 895-4646
Contact in Security Product Management Factory Automation
Dirk Gebert
Email: [email protected]
Phone: +49 (911) 895-2253
Contact for Motion Control
Sven Härtel
Email: [email protected]
Phone: +49 (9131) 98-3059
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 35
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Support & Service for Industrial Security
SIMATIC System Presales Support Process Automation
Email: [email protected]
Phone: +49 (721) 595-7117
Contact in Security Product Management Process Automation
Jean-Luc Gummersbach
Email: [email protected]
Phone: +49 (721) 595-8637
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 36
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Support & Service for Industrial Security
SIMATIC NET support for Network Security
Email: [email protected]
Phone: +49 (911) 895-2905
Customer Support
WWW: http://support.automation.siemens.com
Phone: +49 (911) 895-7222
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 37
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Any questions about Network Security??
Contact in Security Product Management Network Security
Franz Köbinger
Email: [email protected]
Phone: +49 (911) 895-4912
Contact in Business Development Network Security
Maximilian Korff
Email: [email protected]
Phone: +49 (911) 895-2839
Contact in Marketing Promotion Network Security
Christine Gaida
E-Mail: [email protected]
Telefon: +49 (911) 895-2111
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 38
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Industrial Security
Security Information
Siemens provides products and solutions with industrial security functions that support the secure operation of plants,
solutions, machines, equipment and/or networks. They are important components in a holistic industrial security concept.
With this in mind, Siemens’ products and solutions undergo continuous development. Siemens recommends strongly that
you regularly check for product updates.
For the secure operation of Siemens products and solutions, it is necessary to take suitable preventive action (e.g. cell
protection concept) and integrate each component into a holistic, state-of-the-art industrial security concept. Third-party
products that may be in use should also be considered. For more information about industrial security, visit
http://www.siemens.com/industrialsecurity.
To stay informed about product updates as they occur, sign up for a product-specific newsletter. For more information, visit
http://support.automation.siemens.com.
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 39
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum
Thank you for your attention!
Dr. Pierre Kobes
Product and Solution Security Officer
PD TI ATS TM 2
E-Mail: [email protected]
siemens.com/industrialsecurity
Unrestricted / © Siemens AG 2015. All Rights Reserved.
Page 40
January 2015
Industrial Security, Reale Gefahren aus dem virtuellen Raum

Similar documents