here - Mas2tering

advertisement
Business Convergence
WS#2
Smart Grid Technologies
and Project Use Cases
Embedding Security Software
Sébastien Breton, Airbus Defence & Space CyberSecurity
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Forewords
Be reminded that there are two cultures:
 For IT People, security means cybersecurity
 For ICS people, security means safety and
reliability
In electric systems, safety and reliability
are of paramount importance, and any
cyber security measures should not
jeopardize power system operations!
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
IT: Information Technology
ICS: Industrial Control System
Embedding Security Software
Outline
 Introduction
 Cybersecurity context: today’s grid
 Cybersecurity concepts
 Defence-in-depth
 Incident handling
 Critical elements
 Cyber-physical attacks
 Preventing the hack
 Can your smart grid system survive from a cyber attack?
 Conclusion
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Introduction
Cybersecurity must be considered as a whole
system approach
Security requirements to be implemented in a
given system must be drawn from a security
risk analysis, which, in the specific field of
smart grid systems, must take into account not
only cyber risks and physical risks, but
combined cyber-physical risks, so as to deter
cyber-physical threats
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Cyber Security Context: today’s grid
Blackouts, reported in several cities since 2000
(Northeast, Florida, etc.), could have been
caused by cyber-attacks against the electric grid
U.S. Department of Homeland Security
investigated over 200 serious cyber-attacks
against critical infrastructure during the first
half of 2013
 Electric grid targeted in over half of these attacks
Blackhat: Pentesting Smart Grid and SCADA
with SamuraiSTFU
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Defence-in-depth
 Setting up a cybersecurity strategy, based on a
layered approach, to mitigate the risk:
Recovery
• Reconstitution of smart grid operations
• E.g.: Remediation activities
Response
• Emergency operation plans and incident
mitigation activities (short term actions)
• E.g.: Containing a cyber attack, modifying
firewall filtering rules
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Prevention
• Continuous actions and measures put in
place to reduce the risk of threats
• E.g.: Patch management process, software
updates, security by design
Detection
• Approaches to identify anomalous behaviours
and discover intrusion
• E.g.: Intrusion detection system, traffic
inspection
Embedding Security Software
Critical elements
The cybersecurity strategy should consider the
following critical elements as being all
necessary for each prevention, detection,
response, recovery building blocks:
PEOPLE
PROCESS
TECHNOLOGY
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
• TRUSTED
SUPPLY
CHAIN
• PATCH
VALIDATION
TECHNOLOGY
• CYBER
SECURITY
AWARENESS
• TRAINING
(SECURE
CODING)
PROCESS
PEOPLE
Critical elements applied to prevention
(Example)
• UP-TO-DATE
ALGORITHM
• STANDARD
Embedding Security Software
Cyber-physical attacks
Cyber-physical attacks (also called blended
attacks) cause a greater impact and/or different
consequences than a cyber or physical attack
could cause individually
To address the enhanced impacts, risks and
vulnerabilities for both cyber and physical
attacks must be considered
Can your smart grid system survive from a cyber
attack?
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Common control system
vulnerabilities and weaknesses
Software / Product
Security Weaknesses
Configuration
weaknesses
• Improper input
validation
• Poor code quality
• Permissions,
privileges and access
controls
• Improper
authentication
• Insufficient verification
of data authenticity
• Cryptographic issues
• Credentials
management
• Configuration and
maintenance
• Permissions,
privileges and access
controls
• Improper
authentication
• Credentials
management
• Security configuration
and maintenance
• Planning, policy,
procedures
• Audit and
accountability
configuration
Network security
weaknesses
• Common network
design weaknesses
• Weak firewall rules
• Network component
configuration
(Implementation)
vulnerabilities
• Audit and
accountability
Source: Cyber–Physical System Security for the Electric Power Grid , Proceedings of the IEEE | Vol. 100, No. 1, January 2012
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Embedding security software
 Large scale key management and cryptographic algorithm

Integrity of the software is not simply checking a CRC « signature »
 It must rely on cryptographic signature, which implies managing secret
elements (cryptographic keys). It is the only way to truly authenticate the
software editor
 Don’t implement your own cryptographic algorithm. You’ll fail!
 Secure communications

Must be based on standard protocols with a given cryptograhic key size
 Managing technological obsolescence… !
 Authentication of remote critical controls
 Protection against eavesdropping (encrypt!)
 Get your software product independently assessed or pentested
 And of course, it is all about human people:
 Provide relevant training (secure coding…)
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Conclusion
 To address new security challenges, cyber security
needs to be integrated with system theory to guarantee
resilience of the grid
 MAS²STERING shall provide:
 Cross domain (power/electrical to cyber/digital) security event
detection (SIEM), analysis and response
 Secure communications in regards of the privacy concerns
 Role-based access control (RBAC) to authenticate, authorize
and grant access to the smart grid system
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Backup slides
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Embedding Security Software
Bibliography
 NIST 7628 - Guidelines for Smart Grid Cybersecurity
 Volume 1 – Smart Grid Cybersecurity Strategy, Architecture,
and High-Level Requirementsines for Smart Grid Cybersecurity
 Volume 2 – Privacy and the Smart Grid
 Volume 3 – Supportive Analyses and References
 SANS Institute
 The Incident Handlers Handbook
 The CERT Division
 Secure coding
 OWASP
project co-funded by the European
Commission within the 7th Framework
Program (Grant Agreement No. 619682)
Download