Penetration Testing For Industrial Control Systems

advertisement
P E N E T R AT I O N T E S T I N G F O R
IN DUSTRIA L CO NTRO L SYSTEMS
Embrace the Exponential
P E N E T R AT I O N T E S T I N G F O R
INDUSTRIAL CONTROL SYSTEMS
INTRODUCTION
The Industrial Control Systems Cyber
Emergency Response Team (ICS-CERT)
reported 245 cybersecurity incidents
between September 2014 and February
2015, including at least 154 incidents
affecting critical manufacturing,
energy systems, and chemical and
nuclear facilities (see Exhibit 1).
These incidents are increasing in
frequency, complexity, and severity. Last
year, more than half of the incidents
involved advanced persistent threats.
But despite an increasing need for
improved security controls, monitoring,
and detection capabilities, the rise
of the Industrial Internet—along with
progressively sophisticated threat
actors—has considerably increased the
number of exploits available in the past
5 years. In this constantly evolving cyber
environment, knowing your risk surface
is critical. Penetration testing allows you
to validate your cyber processes and
investments to protect your operational
technology (OT) in the Industrial Internet.
precautions must be taken when testing
OT systems because traditional methods
could have serious adverse effects
on infrastructure and operations.
Penetration testing is often used to
validate the findings from a vulnerability
assessment, which is an exhaustive
search to identify as many vulnerabilities
as possible within an environment. Both of
these methods contribute to an overall risk
assessment, which measures and rates
the level of risk that potential scenarios
could present to a system or environment.
At Booz Allen Hamilton (Booz Allen), we
combine the results of all of these
Exhibit 1: Reported Cyber Incidents, Sept. 2014 to Feb. 2015
COMMUNICATIONS | 14, 6%
COMMERCIAL FACILITIES | 7, 3%
CHEMICAL | 4, 2%
UNKNOWN | 6, 2%
WATER | 14, 6%
TRANSPORTATION | 12, 5%
NUCLEAR | 6, 2%
INFORMATION TECHNOLOGY | 5, 2%
CRITICAL
MANUFACTURING
HEALTHCARE | 15, 6%
65, 27%
WHAT IS PENETRATION TESTING?
A penetration test or “pentest” simulates
an actual cyber attack by employing
the same techniques and methods
used by hackers. Pentests can be very
invasive, because the objective is often
to gain unauthorized access to systems
by exploiting vulnerabilities. Special
GOVERNMENT FACILITIES | 13, 5%
FINANCE | 3, 1%
FOOD AND AGRICULTURE | 2, 1%
ENERGY
79, 32%
1
components into a comprehensive Security
Analysis Framework for ICS Security
(SAF-ICS, pronounced Safe ICS), which we
apply to help our clients prioritize and
mitigate risks in the Industrial Internet.
WHEN AND WHY TO PERFORM A
PENETRATION TEST
Penetration testing in OT environments
is often met with skepticism, fear, and
even outright rejection. Without the
necessary precautions, penetration
testing can pose significant risks to
production systems. However, the only
way to accurately assess the resilience
of your cyber defense strategy is to
test it against a strong offense.
If you use American football as an example,
a coach would never send their defense
into a game without first holding a
scrimmage. The team could have the most
athletic players in the most strategic
formations, but defensive strategies
depend on the ability of the players to
react as the offensive plays develop.
Likewise, you can blanket your OT
environment with “best practices” and
multiple layers of “in depth defense,” but
2
you cannot assess the efficacy of these
approaches, nor test your mitigation
strategies, without penetration testing. The
bottom line is that you must understand
the techniques and methods attackers use
to exploit your vulnerabilities, how malware
infects your systems, and whether or
not your countermeasures are effective.
Penetration testing provides you with that
intelligence.
Penetration testing should be conducted
throughout your risk assessment lifecycle,
including:
+ Validating vulnerability assessment
findings to weed out false positives
+ Evaluating existing cybersecurity controls
at the beginning of the project
+ Assessing controls and responses after
remediation and mitigations have been
deployed
Ultimately, penetration testing should be
part of a complete risk management
lifecycle, which also includes creating
attack scenarios and providing critical
risk rating data to create more efficient
and cost-effective risk mitigation/
remediation plans.
INCORPORATING INDUSTRIAL
SECURIT Y STANDARDS
IDENTIFYING ZERO-DAY
VULNERABILITIES
Asset owners and operators often want
the confidence provided by using methodologies and processes backed by industry
standards. While common industrial
security standards (e.g., NERC CIP, NIST
SP800-82, ISA-99/IEC 62443) have
matured to provide excellent guidance on
OT cybersecurity best practices, there is
still limited guidance for OT penetration
testing. NIST SP800-115 provides significant guidance on vulnerability assessment and penetration testing, but it is not
specific to OT systems. As a result, OT
penetration testers must formulate their
strategies by combining their traditional
penetration testing skills, actual industrial experience, and implied guidance
from industrial security standards (ideas
interpreted from general OT cybersecurity
guidance). The lack of industry standards
should not be an impediment to deploying
penetration testing as a part of your
overall risk assessment lifecycle, but
you should ensure that your penetration
testers possess the right mix of expertise
and experience with OT systems to prevent
inadvertent effects on your infrastructure.
One of the most specialized and technical
aspects of penetration testing is “0day,”
or “zero-day,” vulnerability research and
discovery. A task suited for only the most
highly skilled penetration testers, zeroday vulnerability research is the process
of finding vulnerabilities that have not
yet been reported or even discovered,
much less patched. The vendor has
had “zero days” to fix the vulnerability.
Vendors and advisors, such as ICS-CERT,
help facilitate vulnerability discovery,
patching, and reporting processes for
enterprise IT, but when it comes to OT
vulnerabilities, the industrial community
lags behind for several reasons:
+ OT devices and protocols were not
originally developed with security in mind
and therefore have several decades of
catch up, patching, and redesign to
complete.
+ Many vendors are reluctant to patch
these vulnerabilities or redesign their
products with more security in mind
because of lack of resources or disruption to operations.
3
“Attackers think differently.
When you lock all your
doors, they will get the spare
key from your unlocked
neighbor’s house. When you
change the locks, they’ll come
in through a window. When
you lock all the windows, they
will clone your garage door
opener. Once they’re in your
garage, they will have access
to all your power tools, as well
as your ‘hidden’ spare key.
The only way to validate your
security is to have it checked
by a trained penetration
tester.”
—MICHAEL WATERS,
Manager of Enterprise Information
Security, Booz Allen Hamilton
4
+ Most of the vulnerabilities that are
discovered are not necessarily being
reported to the information sharing
and advisory services, such as ICSCERT and the Information Sharing
and Analysis Centers (ISAC).
When it comes to OT vulnerabilities, you
should not rely solely on ICS-CERT and
the ISACs (by no fault of their own) to get
the most up-to-date vulnerability advisories and information. Perform zero-day
vulnerability research on the devices
and systems that are specific to your
organization’s operations, in conjunction
with monitoring ICS-CERT and the ISACs,
for the most accurate and relevant
vulnerability situational awareness.
RULES OF ENGAGEMENT
The “rules of engagement” are one of the
first considerations—and one of the most
important aspects—of any penetration
testing project. This statement could not
be any more accurate when considering
OT systems. The rules of engagement
describe what methods and techniques
are allowed and what is prohibited to keep
from disrupting business and operations.
These rules are the cornerstone of OT
penetration testing projects when it comes
to maintaining safety and production.
Rules of engagement are unique to
each project and are determined based
on the needs and requirements of the
project, systems, and organization.
STRATEGIES
In addition to the rules of engagement, the
specific testing strategies are a critical
consideration that set an OT penetration
testing project apart from a traditional
enterprise IT penetration test. These
strategies are relevant to the specific
design and functionality of OT systems,
applications, protocols, and devices,
and attempt to take advantage of flaws,
weaknesses, and vulnerabilities in that
design and functionality. As part of the
SAF-ICS process, it is important to ensure
that all of the penetration testing findings
constitute a valid and realistic risk to OT
systems. For example, gaining access to
a particular asset with limited impact on
critical systems, or no communication
path to these systems, provides little
overall value to the risk assessment
results—aside from establishing that
particular asset and/or communication
path as a low risk. Strategies and findings
that have value will demonstrate a
realistic potential for a successful attack
to negatively or even critically affect
safety, production, or brand reputation.
FOOTPRINTING
Finding useful information about the
target on the Internet, also known as
“footprinting” (aka “recon’, open source
intelligence, or “OSINT”), is not specific to
just OT systems; however, it is typically the
first step and a critical part of the overall
process that provides data to be used
in subsequent strategies. The methods
Exhibit 2: Recreation of the Purdue Model, as illustrated in ISA-99/IEC 62443
Level
5
Enterprise Network
Enterprise Servers
Level
4
Web
Services
Historian
(Mirror)
Terminal
Services
Application
Server
Enterprise
Zone
Security
Server
DMZ
EXTERNAL TESTING
External penetration testing refers to
testing Internet-facing environments
from the Internet. This can include traditional enterprise IT systems, as well as
OT systems. However, we want to avoid
actively pentesting production OT systems
and devices, even if they are directly
accessible from the Internet. Instead,
we use Internet-facing adjacent networks,
such as the enterprise network, as a
pathway to the OT networks. The idea is
that, in the absence of Internet-facing
OT systems and devices, attackers can
attempt to gain access to these other
enterprise networks and work their way into
the OT networks through connected paths.
“Pivoting” is a term that refers to using
a compromised system as a “relay”
for further attacking the network.
What makes pivoting so effective and
useful is that it keeps the attacker from
having to download additional tools
onto a compromised system. Using
a compromised system directly often
has complications, such as additional
network traffic that could be detected
by an intrusion detection system (IDS)
or antivirus. The host-based IDS could
detect and/or prevent the activity,
Level
3
Production
Control
Optimizing
Control
Historian
Engineering
Workstation
Operations and Control
Level
2
Level
1
Supervisory
Control
HMI
HMI
Supervisory
Control
Control
Zone
Supervisory
Control
Batch
Control
Discrete
Control
Level
0
Continuous
Control
Hybrid
Control
Control
Process
C02.036.16_003
used in footprinting are no different
from any other penetration test, such as
researching company information on the
Internet and discovering IP address blocks
and URLs associated with the target.
and other limitations imposed by the
compromised system could also prevent
certain tools from being installed. However,
pivoting allows the attacker to use the
compromised system as a relay, or
essentially a router, to continue attacks
within the inside network while using
the entire arsenal of their original attack
platform. The goal is to gain access
to the OT networks. According to most
industrial security standards, especially
the Purdue Model (Exhibit 2) found in
ISA-99/IEC 62443, not only should the
network architecture separate the OT
networks from the other networks, but
data should typically not flow from higher
zones (levels 4 and 5) to lower zones
without a properly established “trust
conduit.” Systems should communicate
5
using a push model from the OT network
(levels 0 to 3) to higher zones.
“Everything is about
attempting to take control
of or affect OT processes in
a way that could pose a
meaningful risk to safety
and production.”
6
There are still a few limitations to network
segmentation strategies that make adjacent networks a viable attack vector to the
OT networks. OT network architects do not
always adhere to this network segmentation and data communication standard.
Engineers often bypass these restrictions
by creating a dual-home workstation,
which is a workstation with two network
interface cards, one connecting to the OT
network and one connecting to an adjacent network. This effectively negates any
firewalls. Due to the nature of transmission
control protocol communication, sessions
can potentially be “hijacked,” allowing an
attacker to gain access to the communicating system in the OT network. Internet
control message protocol (ICMP) communication is often allowed through to the OT
network, which creates an opportunity for
an attacker to launch ICMP-related attacks
or use the ICMP protocol as a data tunnel.
and social engineering, can provide
additional alternative attack vectors for
your OT systems. Comprehensive “red
team” testing, which includes physical
attack vectors, simulates threats that will
seek to gain access to your OT systems.
Social engineering takes advantage of
one of the weakest links in any security
program: the human factor. Technical
social engineering methods—such as
“spear phishing,” social media vectors,
and planting infected social media—
combined with specialized tools, allow
penetration testing teams to test some of
the most effective attack vectors used by
modern threats today. The use of social
engineering, insiders, and planted devices
renders perimeter-focused “layered
defense” relatively useless. Layered
defense needs to be comprehensive and
also include elements such as network/
intrusion monitoring, end-point protection,
and awareness training designed to
counter social engineering threats.
A LT E R N AT I V E AT TA C K V E C T O R S
TESTING THE ACTUAL OT NETWORK
When formulating attack strategies or
considering defensive countermeasures,
it is important to look beyond the obvious
attack vectors, such as the Internet and
adjacent connected networks. Other attack
vectors, such as physical weaknesses
At this point, we are staging the test
as if the attacker is on the OT network.
Everything is about attempting to take
control of or affect OT processes in a
way that could pose a meaningful risk to
safety and production. If exposures were
found in adjacent networks, we do not
recommend continuing to pivot onto the
production OT systems. Most, if not all, of
the strategies and techniques at this stage
should be performed in a lab or a test and
development network that most accurately
represents the actual production systems.
It does not have to be to scale. As long
as a sampling of each type of device,
server, workstation, configuration, and
version is tested, you should end up
with a reasonable representation of the
exploitable risks that exist within your OT
systems. One of the best ways to achieve
this—besides physically including each
device type, model, and version—is to
virtualize the servers and workstations.
Many asset owners use virtualized images
for their backups, so creating a virtual
replica of the systems and network should
be straightforward. For environments
that do not produce virtualized backups,
it is best to start with a test and
development network and go from there.
TESTING OT DEVICES
OT device control or disruption is the
end goal of a threat determined to cause
maximum impact. Unfortunately for asset
owners, causing these devices to behave
in a way that is outside of their designated
function is not that difficult, since security
was probably not an inherent design
consideration. For example, a network
stack is often unable to handle traffic
that it is not intended to receive. Other
hardware components of the device
also have limited thresholds that can be
exploited, for example, by creating a load
that causes a spike in processor utilization.
Scenarios such as this have been known to
cause devices to malfunction, reset, and
fault. To further complicate things from a
security perspective, most of the IP-based
industrial protocols these devices use are
equally weak. Due to the lack of encryption
and authentication mechanisms in many
of these protocols, they are susceptible
to being altered, hijacked, or even crafted
from scratch to potentially manipulate,
disrupt, or even control OT devices.
TESTING OT SERVERS AND
W O R K S TAT I O N S
The vast majority of OT servers and
workstations are now Microsoft Windowsbased, while a scattered few still remain
UNIX- or Linux-based. Regardless of the
operating system used, there is nothing
unique about exploiting an OT computer
versus those in the traditional enterprise
IT world. The use of Windows actually
presents an even larger security issue
when considering the limited patching
availability and extended lifecycles of
legacy systems. Outdated and unpatched
versions of Windows are known for
7
For More Information
BRAD MEDAIRY
Senior Vice President
medairy_brad@bah.com
+1-703-902-5948
SCOT T STABLES
Chief Technologist
stables_scott@bah.com
+1-630-776-7701
CLINT BODUNGEN
Lead Associate
bodungen_clint@bah.com
+1-281-832-3129
www.boozallen.com/data-science
being quite insecure, and we continue
to see even Windows XP workstations
still in production to this day. While
this provides a ripe penetration testing
environment, it also means an ample
target-rich environment for real-world
threats and big problems for asset owners.
SUMMARY
While the “keystroke-by-keystroke” details
of an entire penetration testing project
would be too extensive for a single
article, this discussion should help asset
owners conceptualize OT specific threats,
attacks, and risks when considering
defensive strategies and mitigations.
Here are a few key takeaways you should
consider when building, managing, or
hiring a penetration testing team:
+ Ensure penetration testers have the
necessary pertinent skills commensurate with traditional penetration testing
techniques and strategies.
+ For OT penetration testing, ensure the
testers have a thorough understanding
of OT systems, devices, and applications.
+ Establish clear rules of engagement and
avoid performing active, potentially
harmful, penetration testing techniques
on production systems.
8
+ If possible, employ an OT engineer as a
subject matter expert.
+ Know, study, and understand existing OT
vulnerabilities, and stay up to date on
the trends and techniques of OT-focused
malware campaigns.
+ Perform zero-day vulnerability research
on your organization’s specific systems
(do not rely on advisories and ISACs to
be a definitive source of information).
+ Ensure that attack scenarios and
findings represent meaningful, realistic,
and actual risk to OT systems (e.g., risks
to safety, production, and company
reputation).
The need for special precautions when
conducting penetration testing for OT
systems cannot be overemphasized.
At Booz Allen, our OT security experts
apply their cybersecurity and industrial
systems expertise through our proven
models to help our clients identify
and mitigate potential risks before
they expose critical assets to threat
sources. As part of that overall strategy,
our SAF-ICS incorporates penetrations
testing to optimize OT security through
a complete risk assessment lifecycle.
About Booz Allen
Booz Allen Hamilton has been
at the forefront of strategy and
technology for more than 100
years. Today, the firm provides
management and technology
consulting and engineering
services to leading Fortune 500
corporations, governments, and
not-for-profits across the globe.
Booz Allen partners with public and
private sector clients to solve their
most difficult challenges through
a combination of consulting,
analytics, mission operations,
technology, systems delivery,
cybersecurity, engineering, and
innovation expertise.
With international headquarters in
McLean, Virginia, the firm employs
more than 22,500 people globally,
and had revenue of $5.27 billion
for the 12 months ended March
31, 2015. To learn more, visit
www.boozallen.com. (NYSE: BAH)
© 2016 Booz Allen Hamilton Inc.
C.02.036.16
03/09/16
www.boozallen.com/cyber
Download