Security for smart Electricity GRIDs

advertisement
Estimering av sikkerhet – En sikkerhetseksperts syn på saken
Security for smart Electricity GRIDs
Hordan estimere vi risk ?
Prestasjoner og planer
1
Hvordan estimerer vi risk i SEGRID prosjektet?
Innhold
§ Hva er SEGRID?
§ SEGRID Steps i risikoanalyse
§ Hvordan estimerer vi risk i SEGRID?
Hva har vi gjort
Hva har vi lært
Hva har vi tenkt å jobbe med videre
2
Security for smart Electricity GRIDs
Topic:
Project type:
Grant agreement no:
Thematic Priority:
Start date of project:
Duration:
Coordinator:
3
SEC-2013.2.2-3 Protection of smart energy grids against cyber attacks
Collaborative project – small or medium scale focused research project
607109
FP7-SEC-2013-1
October 1st, 2014
36 months
TNO, The Netherlands
SEGRID is supported by the EU FP7 Programme under Contract No. 607109
The main objective of the SEGRID project is
to enhance the protection of smart grids against cyber-attacks
§ We do this by
applying a risk assessment approach to a number of smart grid use cases
enhancing risk assessment methodologies
§ Based on the results of the risk assessments we
Likelihood
define security requirements
determine gaps in current technologies, standards and regulations
develop novel security measures for smart grids
Very likely
Minor
Major
Critical
Highly
Critical
Highly
Critical
Likely
Very Minor
Minor
Major
Critical
Highly
Critical
Possible
Very Minor
Minor
Major
Critical
Critical
Unlikely
Very Minor
Minor
Minor
Major
Critical
Very
Unlikely
Very Minor Very Minor
Minor
Major
Major
Medium
High
Very High
Very low
4
Low
Impact
SEGRID
Partners
Distribution System
Operators
Manufacturers
Knowledge institutes
Universities
5
SEGRID
Work package structure
WP 2 (ABB)
Application & Enhancements of Risk Assessment
M1
WP 3 (KTH)
Enhancements of Vulnerability Assessment techn.
WP 4 (SICS)
Novel Security Solutions
T4.1 System
& Platform
T4.2 Comm.
protocols
T4.3 Resilient
Comm. infra
WP 6 (TNO)
Dissemination & Exploitation
WP 7 (TNO)
Project management
6
M1
M3
M1
WP 5 (ENCS)
Testing and evaluation
WP 1 (EDP)
Use cases and security goals
M1
T4.4 Privacy
by design
M1
M1
SEGRID
Maturity
Storyline
Current state of
security is insufficient
Gaps in available security
technology for the Smart Grid
SOLL
Smart Energy
Grid
New
threats
5) Automatic reconfiguration
4) Load balancing regionally
Known
threats
3) Dynamic power management
2) Load balancing centrally
IST
1) Smart Metering
Current Energy
Grid
Time
7
SEGRID
Maturity
Use Cases and security goals
Current state of
security is insufficient
Gaps in currently available security
technology for the Smart Grid
SOLL
Smart Energy
Grid
New
threats
5) Automatic reconfiguration
4) Load balancing regionally
Known
threats
3) Dynamic power management
2) Load balancing renewable energy
IST
http://ec.europa.eu/energy/sites/ener/files/docum
ents/xpert_group1_reference_architecture.pdf
1) Smart Metering
Current Energy
Grid
Time
8
Functional architecture
for UCs using SGAM
Steps in SEGRID Approach to Risk Assessment
Vision Security
Trends
Technology
Regulation
Stakeholder
Analysis
Regulation
Values
Expectations
Vision smart grid
Technology
Architecture
Processes
1. Define scope
2. Impact
assessment
3. Threat
assessment
4. Estimate risk
Identify
stakeholders
Choose relevant
assets
Identity threat actors
Determine risks per
stakeholder
Identify stakeholder
processes
Define impact
values stakeholders
Identify threat
scenarios
Overall risk per
threat scenario
Identify assets
Identify and assess
threat sources
Estimate likelihood
Define impact
Estimate impact
Link assets &
stakeholder
processes
9
Prioritise threat
scenarios
Step 1: Scope of the Risk Assessment
§ Use case scope
Identify
Stakeholders and
assets
Link stakeholder
processes & assets
using the SGAM
functional view
10
Use Case 1 Scenario 2: Remote power switching
RA Step 1: Define Scope - Summary
Use Case 1 Smart meter used for on-line reading of consumption and technical data
Scenario 2 - Remote power switching
System
Assets
2
1
11
Monitoring
Data
Energy
Supplier
System
Safety
Legal and
regulatory
Financial
Reputation
Operations
Safety
Legal and
regulatory
Financial
1
1
1
1
1
1
1
3
1
2
1
1
4
3
4
2
3
3
2
4
3
3
3
4
1
Information
3
Integrity
asset
Privacy
Operations
Switch Data
Reputation
1
Stakeholder
Customer
Financial
Information
Assets
Confidentiality
Stakeholder Energy Supplier
Assurance of Supply
Stakeholder DSO
Stakeholder
Availability
2
2
3
1
2
2
2
3
1
3
2
2
1
Confidentiality
1
1
1
1
1
1
1
1
1
2
1
1
1
Integrity
3
3
4
2
3
3
2
4
1
3
2
2
1
Availability
3
3
2
2
3
3
2
3
1
3
2
2
1
Confidentiality
1
1
1
1
1
1
1
1
1
2
1
1
1
Integrity
1
1
1
1
4
3
4
1
2
2
4
1
Availability
1
1
1
1
3
2
3
1
2
2
2
1
System 1
asset 1
Step 2: Stakeholder Impact Assessment
Stakeholder Impact Assessment
What kinds of threats have critical impact on stakeholders?
12
Use Case 1: Smart meter used for online reading of consumption & technical data
Scenario 2: Remote power switching
SEGRID RA Step 2: Stakeholder impact assessment
Legenda
Level 4
Enterprise
Energy
Supplier
System
Monitoring
Operate
Maintenance IT DSO:
Smart Metering
Information
System (AMI)
Maintenance
Functional layer
Level 3
Operation
Data Hub:
Exchange
System
SCADA
Make Data available
Make Data available
Meter Data
Concentrator
Information layer
Communication
Level 2
Station
layer
Make Data available
RTU
Level 1
Field
Component
Switch
Data
Household
Smart Meter
Display
Monitoring
Data
layer
Level 0
Process
13
Sensors
Actuator
(Switch)
Use Case 1: Smart meter used for online reading of consumption & technical data
Scenario 2: Remote power switching
SEGRID RA Step 2: Stakeholder impact assessment
Level 4
Enterprise
Level 3
Operation
Energy
Supplier
System
Monitoring
Operate
Maintenance IT DSO:
Smart Metering
Information
System (AMI)
Data Hub:
Exchange
System
SCADA
Make data available
Make data available
Meter Data
Concentrator
Stakeholder x
Level 2
Station
Make Data available
Level 1
Field
- Confidentiality
- Integrity
Household
- Availability
Smart Meter
Switch
Data
14
Legal &
regulatory
Compliance
Display
Financial
Monitoring
Data
Level 0
Process
Reputation Operations
Sensors
Actuator
(Switch)
Safety
Use Case 1: Smart meter used for online reading of consumption & technical data
Scenario 2: Remote power switching
SEGRID RA Step 2: Stakeholder impact assessment
Use Case 1 Smart meter used for on-line reading of consumption and technical data
Scenario 2 - Remote power switching
1
15
Monitoring
Data
Energy
Supplier
System
Financial
1
1
1
3
1
2
1
Integrity
3
3
4
Availability
2
2
3
Assessed
2
3
3
impact
1
2
2
Confidentiality
1
1
1
1
1
Integrity
3
3
4
2
Availability
3
3
2
1
1
1
- Confidentiality
1
1
-1 Integrity
-1Availability
1
1
Privacy
Legal and
regulatory
1
Impact category
stakeholder
Assurance of Supply
Safety
1
Availability
Operations
1
Integrity
Reputation
1
Confidentiality
Financial
Confidentiality
Stakeholder
Customer
Legal and
regulatory
Operations
2
Switch Data
Reputation
1
Financial
System
Assets
Information
Assets
Stakeholder
Stakeholder Energy Supplier
Safety
Stakeholder DSO
1
4
2
4
3
3
3
4
1
2
3
1
3
2
2
1
1
1
1
1
2
1
1
1
3
3
2
4
1
3
2
2
1
2
3
3
2
3
1
3
2
2
1
1
1
1
1
1
1
2
1
1
1
1
1
4
3
4
1
2
2
4
1
1
1
3
2
3
1
2
2
2
1
Step 3: Threat Assessment
§ In the scope of the Use Case
Identify
Threat Actors
Potential attacks
Threat scenarios
Motivation
Capacity
Opportunity
16
Use Case 1: Smart meter used for online reading of consumption & technical data
Scenario 2: Remote power switching
SEGRID RA Step 3: Threat assessment
Motivation
Capacity
Opportunity
IT DSO: Smart
Metering In formation
System (AMI)
IT DSO is impacted
by a law suit for
violating the
privacy directive
Medium
DSO Legal and
regulato ry
compliance
Self-satisfaction,
thrill
Insufficient
Data Miner/
access control
Software
Hacker
17
Hacker Penetrates the
System and extracts customer
data from the systems data (readout) that the customer shall be
switched off and publishes it
[Unlikely]
Theft of
information about
the customer to
be switched off
High
Customer Privacy
Step 4 – Risk Estimation
Very many
customers lose
power
Estimate
High
Customer
Assurance of
Supply
Likelihood
Impact
Data Hub: Exchange
System
Political
Insufficient
Cyberwarrior
/ Software access control
Hacker
Hacker Penetrates the
System and sends <switch off>
commands to very many
customers
[Unlikely]
High
IT DSO is impacted
due to false
<switch off>
commands
Data Hub systems
integrity breach
DSO Operations
Medium
High
Medium
Energy supplier is
not able to supply
customers
18
DSO Legal and
Regulatory
Compliance
Data Hub
Operations
High
High
Data Hub Legal
and Regulatory
Compliance
Medium
Energy Supplier
Operations
Energy Supplier
Financial
Step 4 – Risk Estimation
Based on ETSI TS 102 165 & ISO/IEC 18045 – enhanced for SEGRID
§ Likelihood estimation
Motivation
With TVRA we score what an attacker has to be able
to do in terms of Time, Expertise, Knowledge,
Opportunity, and Equipment
higher score means that the attacker has to have a
higher attack potential
Scores are used as a metric for likelihood
Capacity
Opportunity
§ Impact estimation
Intensity of the attack is a factor of the Impact
Threat Group
Manipulate,
Integrity
Threat Description
Vulnerability: Data Hub: Exchange System
has software vulnerabilities, accessible
Scenario: Attacker penetrates the system
and sends switch off commands to very
many customers. The attack can be carried
out by exploiting a vulnerability to install a
malicious process that tries to influence
Factor
Time
Expertise
Knowledge
Opportunity
Equipment
Asset Impact
Intensity
Opportunity
19
What about
Motivation?
Attack
Notes
Range
Attack requires some planning
<= 1 week
Expert in these systems (insider, state sponsored)Expert
Knowledge of AMI internals is not publicly known Restricted
Remote access, inside access
Difficult
PC
Standard
Very many customers lose power, ES, DSO
High
Attacking large number of customers at once
High intensity
Value
1
5
1
12
0
4
2
Potential
Likelihood
High
Unlikely
Impact
Risk
Very high
Critical
Capability
Risk = likelihood X impact
Business Blackout Report
«Erebos Cyber Blackout Scenario – extreme event»
§ Threat source – unidentified highly motivated group
§ Threat actors – highly knowledgeable hackers – highly skilled
§ Time to prepare
1 year to research, develop malware, penetrate systems
9 months to map networks, disable safety systems, plan attack launch
§ Attack on 50 generators
Sophisticated attack involving a range of different techniques
social engineering («Phishing»), physical intrusions, hacking of remote
access to the control systems
§ Incident – massive outage – 15 states, including NYC and DC
§ Economic impact estimated at $ 1 trillion...
http://www.businessinsider.com/r-cyber-attack-on-us-power-grid-could-cost-economy-1-trillion-report-2015-7
20
SEGRID Risk Assessment
Challenges
§ Risk assessment of cyber attacks with physical impact
do we have good enough tools, methods to estimate risks taking into
account the attacker motivation, opportunity and capability?
§ How do we estimate threats and risks for the Smart Grid 2020?
it’s not even built yet...
§ Assessing threats from the viewpoints of different stakeholders
emerging sophisticated attacks, threats can impact a wide range of
stakeholders
§ What about societal impact?
national black-out
malicious disruption of electricity grid
Business Blackout Report analyses economic impact
21
Risk Assessment - Challenges
Vision Security
Trends
Technology
Regulation
Stakeholder
Analysis
Regulation
Values
Expectations
Vision smart grid
Technology
Architecture
Processes
How to include
Motivation?
2. Impact
assessment
3. Threat
assessment
4. Estimate risk
stakeholders
Choose relevant
assets
Identity threat actors
Determine risks per
stakeholder
Identify stakeholder
processes
Define impact
values stakeholders
Identify threat
scenario’s
Overall risk per
threat scenario
Identify assets
Identify and assess
threat sources
Estimate likelihood
Define impact
Estimate impact
1. Define scope
How to determine
Societal
Impact?
Identify
Link assets &
stakeholder
processes
22
Assessing
attacks/attack
Prioritise threat
paths onscenarios
SG 2020
Questions
Mail:
Website:
Telephone:
info@segrid.eu
www.segrid.eu
+31 8886 67758
Judith E. Y. Rossebø, PhD
Cyber Security Specialist
ABB AS
Phone: +47 22874725
Mobile: +47 41563062
E-mail: judith.rossebo@no.abb.com
23
Download