Industrial Security & Compliance Cyber Security Vulnerability Assessment Cyber Security Vulnerability Assessment A cyber security vulnerability assessment (CSVA) can provide your organization with an evaluation of the security level and risks related to your industrial control systems. This kind of assessment is quickly becoming a requirement at both corporate and industry levels for process control industries. Performing a cyber security vulnerability assessment on industrial control systems critical to operations in a production environment is extremely challenging and requires special techniques and experience. Industrial Security & Compliance understands these challenges and has developed a range of techniques for quickly and efficiently assessing control systems without risking an outage or slowdown. Options for CSVA The scope of a CSVA can vary, but at a minimum, it involves the following: • • • verification that only ports and services required for operations are enabled discovery of all access points to the Electronic Security Perimeter (ESP) review of controls for default accounts, passwords and network management community strings How Matrikon Can Help Using our field-proven techniques, Industrial Security & Compliance can: • • • • review the security components recommended by industry standards assess additional security controls that may be specified in your corporate security policy provide all required documentation, including the process, results and action plan implement the steps outlined in the action plan Techniques for Assessing Control Systems Honeywell use several strategies and techniques to perform cyber vulnerability assessments. Industrial Security & Compliance is Powered by Matrikon, which represents vendor neutrality. This product works with third-party control systems and applications. Network Management Strings Using an SNMP query tool, we poll cyber assets on the network to identify devices that respond to default community strings. Only Ports and Services Required for Operations are Enabled Where possible, we apply our field-proven techniques to quickly and efficiently determine open ports and services. Our preference is to use tools and utilities supplied by the operating system and device, as this is a more reliable method of obtaining ports/service information than external port scanning. However, for cyber assets and ESP access points whose loss would impact operations, we employ other tools and procedures to obtain this information. (For Microsoft® Windows® devices, we are able to obtain open services data through automated means without risking impact on operation of the device.) For the most critical and/or legacy device types, we can also scan and evaluate the device in a non-production environment or mode. Once we have identified open ports and services, we work with your staff members and your change management records to identify which of these ports and services are required for operations. Additionally, a cyber security professional evaluates the usage of ports and services to identify the security risks associated with them, and to suggest alternatives if necessary. Review of Controls for Default Accounts and Passwords For Microsoft Windows, Unix®, Cisco® and many other devices, we can query this information utilizing proven field tools, without risking impact on operation of the device. For other devices, we employ other tools or manual methods to accomplish this task. A security professional will then provide suggestions for default accounts that can be disabled or modified. They will also provide ways to enhance security controls for passwords and default accounts that will reduce security risks. Cyber Security Vulnerability Assessment Discovery of all ESP Access Points We generally apply non-automated tools for this task, to avoid risk of impact on operations. In order to discover all active devices on the network, we often start with a simple ping sweep that will not affect the reliability of control systems. We then perform a physical inspection of control systems and their communication connectivity (e.g., network interfaces and modems) to identify all ESP access points. Action Plan to Remediate or Mitigate Vulnerabilities For each vulnerability identified, we assign a risk rating to help prioritize findings. We then collaborate with you to determine whether each vulnerability should be remediated or mitigated through some sort of compensating measure. Finally, we work with you to develop the required action plan to accomplish these tasks. Industrial Control System Expertise Staff Interviews We talk with your staff in order to evaluate non-technical security subjects such as change management, policies versus actual practices, training, information protection, testing and incident response. Honeywell offer the largest and most experienced team of industrial control system security consultants in the industry. We have integrated, upgraded and secured DCS and SCADA systems from all major vendors including Emerson™, Honeywell®, GE®, Invensys™, ABB®, Areva®, and others. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and other countries. UNIX is a registered trademark of The Open Group. Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Emerson is a trademarks and service marks of Emerson Electric Co. Honeywell is a trademark of Honeywell International Inc. GE is a registered trademark of General Electric Co. Invensys is a trademark of Invensys plc. ABB is a registered trademark of ABB. Areva is a registered trademark of the AREVA group. For more information: For more information about Industrial Security & Compliance, visit our website www.honeywell.com/ps or contact your Honeywell account manager. www.matrikon.com security@matrikon.com Honeywell Process Solutions 2500 W. Union Hills Dr. Phoenix, AZ 85027 Tel: 877.466.3993 or 602.313.6665 www.honeywell.com/ps DS - 969 June 2011 © 2011 Honeywell International Inc.