Belden

advertisement
Belden
Cybersecurity in an
Interconnected World
Dhrupad Trivedi
November 2015
© 2015 Belden Inc. | belden.com | @BeldenInc
Introduction
Dhrupad Trivedi has been with Belden since Jan 2010
and is currently the President of Industrial IT and
Network Security platforms. Prior to that, he was
responsible for Corporate Development and Strategy
function at Belden. Earlier, he was President, Trapeze
Networks. Before joining Belden, he was responsible
for General Management and Corporate Development
roles at JDS Uniphase. He has 20 years of experience
in the Networking and Communications industry.
Dhrupad has an MBA from Duke University and a
Ph.D. in Electrical Engineering from University of
Massachusetts, Amherst.
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
2
Key Takeaways
• 
Cybersecurity has moved from an IT issue to an Enterprise risk issue.
• 
The notion of “critical” assets has changed with mobile devices and promise of
integrated networks.
• 
Industrial infrastructure requires unique solutions that address their risk profile and
needs of uptime, productivity.
• 
As threats become more sophisticated and pervasive, companies need to evolve
their tools and techniques to manage this risk.
• 
Regulation and Compliance are drivers for some industries – but the real driver is
Business Impact.
• 
Understand your situation, choose the next steps based on business need, have an
emergency response plan and adopt best practices. The right next step may be a
small one.
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
3
A Rich Heritage
• 
• 
• 
Founded by Joseph Belden
in 1902 in Chicago
A long history of innovation for
communications technologies
Early customers
included Thomas Edison
Belden Today
• 
• 
• 
• 
• 
• 
• 
John Stroup, CEO
Headquartered in St. Louis, MO
6,900 employees
NYSE: BDC
Operations in North and South America,
Europe, Middle East, Africa and Asia Pacific
Revenue $1.84B
20+ Sales Offices; 25+ Manufacturing Facilities
Delivering highly engineered signal transmission
solutions for mission-critical applications in a
diverse set of global markets
Radio in the
1920s
Joseph Belden
TV in the
1950s
Computer Networking
in the 1980s and 1990s
Business Platforms
Applications
Vertical Markets
Data
Industrial
Sound
Enterprise
Video
Broadcast
Thomas Edison
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
4
Belden’s Business Transformation and Profile
Portfolio
Expansion
Market and
Geographic
Footprint
Talent/
Leadership
Consistent
Financial
Performance
Belden
TODAY
2015
POSITION
For Accelerated
Value Creation
BUILD
2012
The Foundation
Belden Business System
2008
Strategy, Culture and Values
2005
SCALE THE BUSINESS
PLATFORMS AROUND
THE CUSTOMER
Belden’s transformation has resulted in a…
Global Signal Transmission Solutions Company
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
5
Five Business Platforms Delivering
Innovative Connectivity Solutions
Broadcast
•  Routers and Interfaces
Industrial
Connectivity
Enterprise
Industrial IT
Solutions
•  Industrial and I/O
Connectors
•  Ethernet Switches
•  Broadcast Connectors
•  Copper and Fiber
Connectivity
•  Broadband Connectivity
•  Racks and Enclosures
•  Industrial Cable
•  Routers and Gateways
•  Multi-Viewers and
Monitoring and Control
Systems
•  Ethernet, Fiber Optic
and Coaxial Cabling
•  Distribution Boxes
•  Security Devices
•  Customized
Connectivity Solutions
•  Network Management
Software
•  Playout Systems
•  Custom Infrastructure
Solutions
© 2015 Belden Inc. | belden.com | @BeldenInc
•  Wireless Systems
CONFIDENTIAL
Network
Security
•  Vulnerability
Assessment
•  Security Configuration
Management
•  Log Intelligence
•  Analytics and
Reporting
6
As Internet of Things Proliferates…
Cybersecurity Becomes Crucial
Billions of Sensors, Smart Machines
and Intelligent Systems
Connecting to Create High Value IP-based
Networks of Mission-Critical Applications
All Potentially Vulnerable
to Cyberthreats
© 2015 Belden Inc. | belden.com | @BeldenInc
SECURITY around these highly
valuable, mission critical networks is
essential to make the promise of the
Internet of Things a secure reality
CONFIDENTIAL
7
Security Is Now A Boardroom Topic
This is a Business issue, not an IT issue
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
8
Connecting the Infrastructure to the Boardroom and
Using Metrics
CONNECT
Make security results visible,
measurable and accountable
PROTECT
Dynamically protect the systems your
business depends upon and defend
your objectives
DETECT
Detect leading indicators of security problems
across the dynamic enterprise – before they cause
damage
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
9
Industrial Security is Big News
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
10
But Industrial Cybersecurity Is Much More than Hackers
• 
<10% of issues are related
to hackers
• 
Top risk is software or
device flaws bringing down
the system (closely followed
by human error)
Ø  A
more secure system is a
more reliable system
Ø  A
more secure system is a
more resilient system
Ø  A
more secure system is a
safer system
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
11
The traditional model for IT-oriented Security is
not enough
+ Safety
I.T. Security
C
I
A
ONFIDENTIALITY
NTEGRITY
VAILABILITY
© 2015 Belden Inc. | belden.com | @BeldenInc
I.C.S. Security
A
I
C
VAILABILITY
NTEGRITY
ONFIDENTIALITY
CONFIDENTIAL
12
Industrial Internet Of Things (IOT) – biggest growth
inhibitors are cybersecurity, ease of use and “ROI ”
As more devices and
machines get connected, it
creates a complex network
with potential for economic
gains
The Promise:
Challenges
Improved information and
analytics
-  Tracking capabilities
-  Situational awareness
-  Sensor-based analytics
-  Big data, cloud
Security
- Information
- Infrastructure
Automation and Control
-  Process optimization
-  Resource management
-  Complexity management
Best Practices for Critical
Infrastructure
Think infrastructure vs. devices
Complexity - Embedded
- Number of connections
- Scalability
- Cost tradeoffs (e.g. sensors)
Take steps to improve security
from current situation.
Use existing frameworks and
recommendations (e.g. SAN20,
NIST)
Ease of Use
Crisis response preparedness
Mobility – Wireless
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
13
Cyberthreats Moving to Critical Infrastructure and
Creating Physical Damage
®  DHS Warns U.S.
®  Hackers Target
Utility Was Hacked
German Steel Mill As
Cyber Warfare Gets
Physical
®  Cyber Attackers Caused
Pipeline Explosion in Turkey
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
14
Industrial Control Systems are Being Increasingly
Connected and Also Become More Vulnerable
ICS security advisories
Most common attack vector
used in ICS breaches
800
Unable to
Determine
245
Reported ICS security
incidents in last year
55%
% of ICS attacks involving
APTs
Source: ICS-CERT
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
15
Major Categories of Critical Infrastructure
Critical Infrastructure Sectors
Agriculture and Food
Dams
Information Technology
Banking and Financial
Services
Defense Industrial
Base
Nuclear Reactors,
Materials and Waste
Chemical
Emergency Services
Transportation
Systems
Commercial Facilities
Energy
Water and Wastewater
Systems
Communications
Government Facilities
Critical Manufacturing
Healthcare and Public
Health
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
16
Increasing Sophistication of Attacks Make them Harder to
Detect and Resolve Without New Techniques
Detection and Resolution can be complex
229 days
to detect a significant threat
on a corporate network
>123 days
to resolve a malicious
data breach
>350 days
to detect and resolve
cybersecurity breaches
Creating complexity to effectively manage the risk
Advanced attacks
are harder to detect
Traditional networks
and endpoint security
fail to detect and respond
in real-time
© 2015 Belden Inc. | belden.com | @BeldenInc
Source: Mandian, Ponemon
CONFIDENTIAL
Too many alerts that
are uncoordinated and do
not provide business risk
prioritization
17
Security Issues in Control Networks
§ 
“Soft” targets
§  PCs
run 24x7 without security updates or even antivirus
§  Controllers are optimized for real-time I/O, not for robust networking
connections
§ 
Multiple network entry points
§  The
majority of cyber security incidents originate from secondary points
of entry to the network
§  USB keys, maintenance connections, laptops, etc.
§ 
Poor network segmentation
§  Many
control networks are “wide-open” with no isolation between
different sub-systems
§  As a result problems spread rapidly through the network
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
18
CSX Train Signaling System
Event: Aug, 2003 Sobig computer
virus was blamed for shutting down
train signaling systems
Impact: The virus infected the
computer system at CSX Corporation’s
Jacksonville, Florida, headquarters,
shutting down signaling, dispatching,
and other systems
Specifics: Ten Amtrak trains were
affected
Recovery time:
§  Train service was shut down or
delayed for six hours
© 2015 Belden Inc. | belden.com | @BeldenInc
Lessons learned:
§  Critical patches and Anti-Virus
needs to be applied and
updated regularly
§  Defense-in-depth strategies,
Firewalls
§  Isolate control networks from
corporate networks
CONFIDENTIAL
19
DaimlerChrysler
Event: Aug, 2005 Internet worms infect
DaimlerChrysler’s systems
Impact: Workers were idle as infected
Microsoft Windows systems were
patched
Specifics: A round of Internet worms
knocked 13 of DaimlerChrysler’s U.S.
automobile manufacturing plants offline
Recovery time:
§  Took manufacturing plants offline
for one hour
© 2015 Belden Inc. | belden.com | @BeldenInc
Lessons learned:
§  Critical patches need to be
applied
§  Provide adequate network
segmentation between control
and business networks
§  Place controls between
segments to limit congestion
and cascading effects
CONFIDENTIAL
20
Power Plant and Water Treatment facility
Event: Two circulation pumps at Unit 3
of the nuclear power plant failed
Impact: The unit had to be shut down
manually
Specifics: The failure of the pumps
was traced to excessive traffic on the
control system network, possibly
caused by the failure of another control
system device
Recovery time:
§  SPDS – 4hours 50 minutes
§  PPC – 6 hours 9 minutes
Lessons learned:
§  Provide adequate network
segmentation
§  Place controls on multiple
segments to limit congestion
and cascading effects
§  Provide active network
monitoring tools
© 2015 Belden Inc. | belden.com | @BeldenInc
Event: More than 750,000 gallons of
untreated sewage intentionally released into
parks, rivers, and hotel grounds
Impact: Loss of marine life, public health
jeopardized, $200,000 in cleanup and
monitoring costs
Specifics: SCADA system had 300 nodes
(142 pumping stations) governing sewage
and drinking water
§ Used packet radio communications to RTUs
§ Used commercially available radios and
stolen SCADA software to make laptop
appear as a pumping station
§  Caused as many as 46 different incidents
over a 3-month period (Feb 9 to April 23)
Lessons learned:
§  Suspend all access after
terminations
§  Investigate anomalous system
behavior
§  Secure radio and wireless
transmissions
CONFIDENTIAL
Source: DHS
21
Cybersecurity is Critical and Specialized as We Manage
the Intersection of IT and OT
Level 4
Business Planning & Logistics
Plant Production Scheduling,
Operational Management, etc
Level 3
Manufacturing
Operations & Control
Dispatching Production, Detailed Production
Scheduling, Reliability Assurance, ...
Levels
2,1,0
Batch
Control
Continuous
Control
© 2015 Belden Inc. | belden.com | @BeldenInc
Discrete
Control
CONFIDENTIAL
22
ICS Security Have Unique Needs and Priorities
Recommended Best Practices from ICS-Cert
1. 
2. 
3. 
4. 
5. 
Develop policies and review them periodically
Block access to resources and services (Firewall)
Detect malicious activity (Change Management)
Mitigate possible attacks for known risks
Fix core problem – Architecture approach, know what you have and then protect it
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
23
A Perimeter Defense is Not Enough
• 
We can’t just install a firewall at the edge of the network and forget
about security
• 
The bad guys will eventually get in
• 
Many problems originate inside the plant network
• 
We must harden the plant floor
• 
We need Defense in Depth
• 
Identify the ISA99 ‘Zones’ and ‘Conduits’
in the network (now ANSI/ISA-62443)
Allow only minimum required network
traffic to pass between zones
•  Generate alarms when traffic blocked
• 
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
24
Belden Solution is to Maximize Network Availability At All
Layers Where Failures Can Occur
Deep Packet
Inspection
Zone &
Endpoint
Firewalls
Routers &
Perimeter
Firewalls
3%
Application
7%
Presentation
8%
Session
10 %
Transport
12 %
Network
Switches
25 %
Data Link
35 %
Physical
Source: Datacom, Network Management Special
Cable
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
25
Belden’s 1-2-3 Approach
Industrial
Network
Industrial
PCs
•  Segmentation
•  Zoning
•  Monitoring
•  Secure wireless access
•  Intrusion radiation protection
•  Inventory connected assets
•  Identify unauthorized &
malicious change
•  Identify vulnerable &
exploitable systems
•  Ensure proper configurations
© 2015 Belden Inc. | belden.com | @BeldenInc
Industrial
Controls
CONFIDENTIAL
• Detect and respond to
attacks
• Identify unauthorized &
malicious change
• Identify vulnerable &
exploitable controls
26
A Closer Look at Energy Industry
• 
Energy grid is a potential target for cyber threats
from local and foreign sources as well as
unintentional disruptions
• 
Shows impact of cybersecurity in digital and
physical assets within a single Enterprise
• 
One of the early industries to mandate
compliance requirements with fines and
economic impact – Companies required to show
compliance with prescribed requirements
• 
Pressing Compliance Deadlines
• 
• 
• 
Two new Compliance Requirements in CIPv5
• 
• 
• 
April 1, 2016 – NERC CIPv5 Audit Compliance for
High & Medium Impact Cyber Assets
April 1, 2017 – NERC CIPv5 Audit Compliance for
Low Impact Cyber Assets
CIP-010 – Configuration Change Management &
Vulnerability Assessments
CIP-011 – Information Protection
Fines in 2013 in excess of $150M
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
27
Interesting Case Study: Windows XP End of Service
Windows XP is an operating system that runs a large number of mission-critical, ruggedized industrial
applications.
When Microsoft announced end of service, companies were faced with a difficult choice…especially
as it is related to security of their installed base.
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
28
Making Cybersecurity a Business Need and Simplifying it
with Expertise
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
29
Enterprises Have to Think in Terms of Prevention,
Detection and Response
Detection Gap
Time between actual
breach and discovery
Prevention Gap
Time to put
preventative
measures in place to
avoid future attacks
Can we avoid this
from happening
again?
Have we been
breached?
PREVENTION
GAP
DETECTION
GAP
Response Gap
Time between
discovery to
remediation to limit
damage
RESPONSE
GAP
How bad is it?
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
30
Belden’s Tripwire Adaptive Threat ProtectionTM – An
Example of Integrating All the Pieces
Threat
Intelligence
Vulnerability
Intelligence
Threat Analytics
Zero-Day
Detection
Adaptive
Threat
Protection
Endpoint
Intelligence
Forensics
Threat
Response
Log & Event
Intelligence
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
31
Cybersecurity Reference Framework
CCS
Council on
CyberSecurity
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
32
Evolving Industrial Standards and Best Practices
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
33
Sample Security Metrics
• 
Configuration Quality:
− 
% of configurations compliant with target security standards (risk-aligned)
§ 
• 
• 
i.e. >95% in Critical; >75% in Medium
− 
% of unauthorized or undocumented changes
− 
patch compliance by target area based on risk level
§ 
i.e. % of systems patched within 72 hours for Critical;
§ 
…within 1 week for Medium, etc.
Control effectiveness:
− 
% of incidents detected by an automated control
− 
% of incidents resulting in loss
− 
mean time to discover security incidents
− 
% of changes that followed change process
− 
% of incidents detected by each control or process
Security program progress:
− 
% of staff (by business area) completing security training
− 
average scores (by business area) for security recall test
− 
% of employees (by business area) who responded to “phishing tests”
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
34
Key Takeaways
• 
Cybersecurity has moved from an IT issue to an Enterprise risk issue.
• 
The notion of “critical” assets has changed with mobile devices and promise of
integrated networks.
• 
Industrial infrastructure requires unique solutions that address their risk profile and
needs of uptime, productivity.
• 
As threats become more sophisticated and pervasive, companies need to evolve
their tools and techniques to manage this risk.
• 
Regulation and Compliance are drivers for some industries – but the real driver is
Business Impact.
• 
Understand your situation, choose the next steps based on business need, have an
emergency response plan and adopt best practices. The right next step may be a
small one.
© 2015 Belden Inc. | belden.com | @BeldenInc
CONFIDENTIAL
35
Download