www.thalescyberassurance.com In this white paper Modern control systems are increasingly complex, digital and connected. Where in the past these were isolated from other networks, today’s operators typically require data to be transferred between industrial and external networks. This has created the potential for malware and hackers to gain access to and disrupt real time control systems and dependent infrastructure. This white paper analyses the different types of control systems and their associated threats, the methods of countering cyber intrusions, and the services Thales is able to provide to counter these cyber security threats. White Paper Cyber Security for SCADA Systems Autumn 2013 www.thalescyberassurance.com Introduction The security of SCADA (Supervisory Control and Data Acquisition) and realtime systems represents a significant challenge in today’s world. High profile cyber security threats are a recent phenomenon – think of the Stuxnet or Night Dragon attacks – yet the systems running critical industrial processes are typically a generation older. Consequently, there are many legacy systems that may be vulnerable to cyber attack because cyber security was simply not a consideration at the time of initial design and installation. The security of even recently deployed systems may also be an issue, and often there are media reports of instances where systems are connected to the internet with inadequate protection, or the manufacturers of the equipment have used hardcoded usernames and passwords, thereby gifting cyber intruders with inside knowledge with the ability to manipulate the system settings. What is SCADA? SCADA, or Supervisory Control and Data Acquisition, is a type of industrial control system (ICS). These are computer controlled systems that monitor and control industrial processes that exist in the physical world. SCADA systems historically distinguish themselves from other ICS systems by being large scale processes that can include multiple sites, and large distances. These processes include industrial, infrastructure, and facility-based processes. It is against this backdrop that we can consider the critical differences between real-time/SCADA systems versus the protection and risks associated the enterprise systems. Figure 1 summarises these issues. An organisation may be more concerned about intellectual property theft, persons gaining access to financial or strategic information, or just plain denial of service on IT systems. Although serious for a business, these risks are unlike those for industrial control systems (ICS) / SCADA where the impact may be to lose visibility of the system sensor readings, and consequently loss of control of the plant. So where threats against business systems may impact the financial viability of the company, the potential consequences of attacks on ICS/SCADA represent a threat to safety and human life in an extreme case. This is not to say Industrial IT Systems are not vulnerable to loss of critical Historical Records, loss of Data Integrity, loss of time-dependent or synchronised performance, progressive degradation and randomised effects. Over 1 million SCADA / ICS systems are connected to the internet with unique IPs Financial Integrity General state of real time system security seen as poor by hackers Honeypot deployment of virtual SCADA proves attackers change settings Industrial Control Systems Business IT Systems Denial of Service Financial and Reputational Risk Loss of Information Loss of View Loss of Control Impact on Systems Safety and Operational Risk Figure 1 - Business System versus ICS Risk Cyber Security for SCADA Systems - Autumn 2013 2 www.thalescyberassurance.com A holistic view of security Before moving further into the Cyber aspects we must consider the wide range of threats that can be broadly categorised as below – Threat Category Typical Represention Typical Mitigation Controls Personnel Insider attack, bribery & subversion Personnel Vetting Acceptable Use Policy, Audit regime, Logs & Alerting Physical Intruders, burglars, prohibited items (drugs, explosives, firearms) Locks, fences, CCTV, guards, alarms, C&C etc. Cyber Hackers, malware Security audits, IDS /SIEM, antivirus, firewalls, etc. Environmental Fire, flood, earthquake, power failure, severe weather DR facilities, BCP, redundancy, remote access controls etc. In some cases it may not be practical to enforce security controls that would be mandatory in a business environment. For example, common user accounts – though preferable, in a real time plant environment accounts may be shared by a number of users in a control room under a group account. It is, however, necessary to take a holistic view and where practical a common approach to dealing with the personnel, physical, cyber and environmental threats. For example, with a critical site there is little point in only implementing physical controls by building a large fence with cameras around the periphery if a cyber attack can be used to disable the cameras in a certain location to replay a video loop, and allow access via the turnstiles into the site. Indeed, the ability to carry out a cyber attack negates the need for a physical attack if the systems within the site can be shut-down or put into an undesired and perhaps unstable mode from outside, perhaps overriding interlocks, and causing pressures, temperatures, rotational speeds and levels to go beyond safe limits. The cyber attack may be seen as the easy option by attackers, which may be undertaken from another country, with attribution of source difficult to prove. To put it simply, rather than travelling hundreds or thousands of miles to perform a physical attack on a well defended site, after months of planning, a competent belligerent is liable to instead to use SHODAN to determine the IP number of a SCADA system located on the other side of the world, download exploit code for the SCADA systems from Metasploit, then launch the attack via the anonymity services of TOR, perhaps within the time frame of 1 hour or less. In short, SCADA/ICS systems must be defended more robustly than they are now. Industrial Systems, Controllers and Risk The computerised equipment used in the control of equipment and industrial processes are deployed in every aspect of Critical National Infrastructure, such as: uclear Power Plants & N Reprocessing Facilities Railway signalling systems Chemical Plants LPG Tankers Mail Sorting Offices Oil Refineries Gas Processing Facilities Food Production Cyber Security for SCADA Systems - Autumn 2013 Pharmaceutical Production Distribution Centres and Ports Motor Vehicle Production Facilities Wind Turbines 3 www.thalescyberassurance.com Clearly an adverse event taking place in any of these facilities could have serious health implications for those persons in the vicinity and nearby locations. Some attacks will have more serious implications than others – a cyber attack on a wind-farm is unlikely to have the same impact as another attack on a Nuclear Reprocessing facility which may result in a long-lasting nuclear event, radioactive plume, and contamination. The consequences of a cyber, or other attack on these facilities should be given due consideration within site risk assessments, and national risk registers, so as to understand the extent of physical, cyber, personnel and environmental security controls that should be put in place. Exploitation of SCADA Systems Google Search is an everyday common tool for most people accessing the internet, which operates by indexing the content of web pages to allow rapid retrieval based on user search criteria. SHODAN on the other-hand is a search engine similar to Google except this search engine indexes HTTP (web message) header information – allowing users to find routers, servers, traffic lights, and industrial control equipment. Project SHINE (SHodan Intelligence Extraction), uncovered that over 1 million SCADA / ICS systems are connected to the internet with unique IPs, and this figure is growing by between 2000 – 8000 / day. It is most likely that many of these devices will be insecure and exploitable. All the attacker needs to do is use SHODAN to determine the device facing the internet based on the header information revealing the software version in place or other similar information, retrieve the appropriate exploit code for that device from a repository such as Metasploit, set up a proxy connection using TOR or similar, then exploit the remote system. It is commonly recognised that the robustness of SCADA/ICS in the face of a direct cyber attack is poor, as many systems were not intended to be connected to the internet. Systems should be designed such that there are security controls (such as firewalls/ data-diodes, and identity & access management systems) between the real time systems and the internet. The current state of SCADA/ICS systems is regarded as woeful by security researchers. It is common to find ActiveX, secure coding approaches are rare, and many systems are so brittle they are unable to withstand security scans & probing. Backdoor administrative accounts are present, and in some cases hardcoded authentication credentials used – which if known guarantees hacker access. Basic fuzzing of ICS causes some to crash and buffer overflows are a serious problem, and some have no password timeouts allowing brute-force login attempts. Hacking of ICS is made easier with ready-made plug-ins for the Metasploit framework and Nessus, to allow hackers easy access to real-time systems. Cyber Security for SCADA Systems - Autumn 2013 4 www.thalescyberassurance.com Once a system has been “owned” such as a PLC, then new “ladder logic” can be uploaded. During the attack on Natanz with Stuxnet, it was reported that the controller logic was changed to cause the centrifuges to speed up / slow down rapidly. A similar approach could be adopted on other systems to ignore multiple safety interlocks with catastrophic effects. Perhaps the controllers are duplicated for safety and availability, but if the cyber attack changes the logic in all systems, then the outlook is not good. Cyber attacks on SCADA/ICS are rare but increasing. The temptation is to dismiss the problem; however, a blackhat presentation in 20131 proved that if a honeypot was placed on the internet simulating a real-time system, some connecting parties changed settings to potentially hazardous levels. This was just a virtual honeypot, not a real SCADA system, but the outcome of external hackers connecting to real systems and changing settings, may have serious implications. If possible, robust SCADA/ICS products should be used, with security built– in, not an afterthought. However, this may not be practical and it is therefore essential to segregate these systems from high risk networks such as the internet, and certainly do not allow IP numbers for SCADA/ICS to be directly accessible from the internet, unless there is a good reason and appropriate security controls are in place. Industrial Protocols A protocol, in the original sense of the word, is a code of conduct or defined procedures to be followed. With respect to Industrial IT systems, the protocol allows communication from one device to be understood by other devices. Given that Industrial IT hardware has a range of functionality, provided by many manufacturers, there has evolved a very wide range of industrial protocols, often vendor specific. There has been some standardisation around the use of Fieldbus, Profibus, and Modbus – but these have all been developed and deployed long before IT security became a major issue. Modbus, for example, has no controls against unauthorized commands and interception of data. Therefore, routing of industrial protocols over the internet or other IP networks nowadays requires professional care and additional controls to maintain security of the data and ensure both commands interactions and critical information retain their integrity. Understanding the Business Risk The business risk will vary between different sectors of the CNI, but also within specific aspects of the same company. For example a key risk for a Gas Processing plant in an area of political unrest may be physical intrusion and/or terrorist attack. However, an oil rig off the coast of the UK will have a different risk profile – perhaps relating no non-availability of systems due to severe weather or concerns of leaks causing environmental damage. It is this variability of threat and risk that must be considered during a risk assessment, which should be undertaken through the whole business cycle – from conceptual design though to close-down and decommissioning. 1. https://media.blackhat.com/us-13/US-13-Wilhoit-The-SCADA-That-Didnt-Cry-Wolf-Whos-Really-Attacking-Your-ICS-Devices-Slides.pdf Cyber Security for SCADA Systems - Autumn 2013 5 www.thalescyberassurance.com Typical Threat sources listed by CPNI (Centre for Protection of National Infrastructure) that should be considered are - Cyber Security for SCADA Systems - Autumn 2013 Threat Sources / Actors Representation of Threat Contractors Externally employed staff on company premises, that may not be trained in the appropriate measures that should be undertaken (e.g. removal of faulty IT equipment from site that contains sensitive information). These persons may not have appropriate vetting and represent a threat if influenced to undertake malevolent activities whilst on the CNI site (such as inserting USB key-loggers, or gathering site security details). Corporate intelligence Competitors, some of whom will target CNI facilities to understand the site and steal intellectual property such that this can be replicated elsewhere, perhaps in competitive bids. This threat can also be present where companies are requested to bid for lucrative contracts, only to have these designs copied and used elsewhere in competitive bids. Criminals / Organised Crime Criminals will be an issue where financial gain is of interest. This could be a break-in to steal computer equipment, which if not backed-up would represent a threat to business continuity. Criminals may also subvert staff to undertake malicious activity. Disgruntled Staff Persons with a grudge, who may have been passed over for promotion, notified of redundancy, have moral objections to what the organisation is undertaking, or with other circumstances such as financial difficulties that put them at risk of compromising security, perhaps giving information to outsiders. Foreign Intelligence Services Highly capable nation state organisations that are able to deploy considerable resources to gain information, such as interception of data, influence other threat actors to steal data, or hack in to environments for industrial espionage purposes. It is not only state secrets that will interest the FIS. For countries that have a close link between state & industry, the FIS will actively seek industrial information, and intellectual property for financial gain of the state linked industries. Hackers Whether state sponsored, funded by serious organised crime, or independently motivated, hackers have the potential to compromise the confidentiality, integrity or availability of systems by their actions. Externally this action may manifest itself in website defacement, or theft of customer details. However for clients running real time / ICS systems, perhaps geographically spread, hackers may use search tools such as SHODAN to discover internet connected equipment, and perform malevolent actions on this infrastructure. Internal Attackers / bystanders Persons on-site perhaps temporarily, who are visitors or bystanders may pose a risk, by observing information when present in the facility, or perhaps unauthorised access systems that are logged in. Protestors and Activists Persons having an ideological grudge against the operations of the company. Traditionally this has been to blockade facilities, or intimidate staff to impede company operations or gain media publicity. However the recent emergence of ‘Hacktivism’ has meant the wilful unauthorised penetration into company systems by politically motivated parties. Staff undertaking unauthorised actions Sometimes wilful, but other times may be due to inadvertent consequences. Unauthorised actions by staff, perhaps trying to get round what is seen as onerous / inflexible security controls can introduce threats. A typical example would be the use of personal USB sticks which contain malware, in the absence of an alternative and available route to transfer information. Terrorists Persons with malicious intent whose primary aim to date has been physical attacks on systems to compromise availability. This does not necessarily mean that electronic attacks will not occur in future with respect to real time / SCADA systems as available exploits against these systems become common-place. 6 www.thalescyberassurance.com Regulatory Compliance With the emergence of cyber threats and the need to secure data, standards have arisen for other industries such as defined in the Health Insurance Portability and Accountability Act (HIPAA), and the Payment Card Industry Data Security Standard (PCI DSS). The difficulty with applying a modern compliance regime to SCADA systems would be the difficulty in adapting the old systems to a new framework of controls. With the landmark event of Stuxnet, the security issues of SCADA came into prominence. It became evident that organised parties were intent on performing cyber attacks to access SCADA/PLC systems to invoke damage of plant equipment. Given the difficult nature of implementing robust controls in industrial environments, various national authorities such as NIST and CPNI have produced standards and security guides for real-time systems integrators. With the abundance of poorly protected ICS equipment, which will be in place for many years to come, often running protocols where security was never a consideration, there has been considerable effort by national and international bodies to define standards for securing the CNI infrastructure. Notable examples being: UK CPNI Security Guides ISA 99 USA NIST 800-82 IEC62443 Zoning, Segregation, and Protection of Industrial Networks It is the interconnected nature of environments, and the need and expectation for access to data generated in the real-time arena, that causes the challenges. For example, in a rail transport scenario it would be very useful for travellers to know the position of trains, but it would also represent a risk if hackers or malware could enter via this internet connectivity, and compromise the safety of the track signalling systems. It is only by performing thorough risk assessments, and designing secure gateways, perhaps including one-way diodes, that ICS/SCADA networks can be protected from external threats. ISA99 and IEC62443 propose the zoning of architectures, and this has been generalised in Figure 2. This shows that with no security controls, external malware and hackers may gain access to ICS/SCADA systems, but with secure controls such as one-way-diodes, the threats resident on the business systems cannot spread to the real time arena, with a Level 0 to Level 4 zoning approach in the segregation of systems. The principles of Figure 2 should be followed, but the practicality of securing a widespread ICS/SCADA infrastructure will be complex with the “conduits” (WAN, VPNs) needing to be secured to remote outstations, and the need for controlling support personnel having remote access into the infrastructure below the industrial DMZ. Cyber Security for SCADA Systems - Autumn 2013 7 www.thalescyberassurance.com Enterprise / DMZ Enterprise Systems Internet Gateway Devices Level 5 Internet Centralised ERP, ERM CRM, C&C, Helpdesk Internet Middleware Level 4 MOM, ESB, etc. Site Manufacturing Operations and Control Gateway Devices Conduit Enterprise Systems Enterprise Systems Industrial / Level 3 DMZ Industrial Control Systems Industrial Control Systems Level 2 PLC SCADA, ICS Level 1 Critical I/O Infrastructure Level 0 Sensors, Actuators, Motors Industrial Control Systems Figure 2 - Segregation of Business and Real-Time Networks Situational Awareness Stuxnet graphically illustrated that even air gapped industrial controls systems (ICS) in high security environments are vulnerable to sophisticated attack, especially with many ICS directly controlled via the host company’s business network. Appreciating that many ICS are directly connected to the internet, the attack vectors, attack surfaces and likelihood of a security incident increase dramatically. If it is not within the immediate remit of the organisation to change the design and configuration of the network supporting the ICS. It is vital to have full situational awareness of the nature of the attack even if it has proved impossible to prevent the successful compromise. In order to achieve this it is necessary to incorporate protective monitoring technology, supported by policies and process into the organisation, coupled with experienced analysts who can identify suspicious network activity. Should this not be a practical solution, if for example the company size does not justify the expenditure on full-time security monitoring, then engaging with a managed service provider should be considered, who is able to provide the services of a 24/7 SOC (Security Operating Centre) that can monitor vulnerable networks together with other crucial feeds, such as Access Control Systems. Security and Incident/Emergency Management solutions exist that build a full Situational Awareness picture of physical, environmental personnel and cyber domains, enabling effective controlled and recorded responses. Cyber Security for SCADA Systems - Autumn 2013 8 www.thalescyberassurance.com Forensic Readiness In the event of the worst case scenario occurring and a security compromise is suspected or has been identified, time is not a luxury that will be available. In the event of a serious incident, how the incident is managed and the time it takes to investigate and remediate it is likely be scrutinized closely by various organisations. Depending on the industry sector concerned, various compliance requirements may be mandated, this is highly likely to include Forensic Readiness. As an example ISO 27001 series of security control measures recommend that responsibilities and procedures should be established in order to quickly and effectively respond to security incidents, this includes cyber security breaches. In the UK, the Government has published the Security Policy Framework that mandates baseline security measures in 20 different areas to address technical security risks; this document is applicable to all Government employees (including contractors) and covers all areas of government and associated departments. The Risk Treatment section (Mandatory Requirement 9) states that “Departments and Agencies must have a forensic readiness policy that will maximise the ability to preserve and analyse data generated by an ICT system that may be required for legal and management purposes”. To assist with the drafting and implementation of a forensic readiness policy, CESG (Communications-Electronics Security Group, part of the state intelligence agency, GCHQ) have produced a Good Practice Guide (GPG 18) together with Information Assurance Implementation Guide Forensic Readiness Planning. This guide recommends a scenario-based approach to forensic readiness planning, examining hypothetical risks and real previous incidents. Each of these potential incidents should have a corresponding incident response policy that is documented and exercised. Incident Response Key to successful investigation and remediation is to have an assured Cyber Incident Response provider identified and preferably engaged as a forensic service provider in advance of an incident. This way the client has the confidence that the supplier has the availability, technology and capability to manage the incident on the client’s behalf. Engaging a forensic company that employs manual techniques to identify and remediate a malware incident on a large enterprise network is likely to result in a protracted cyber version of “Whack a Mole”. Technical solutions now exist where entire enterprise networks can be examined concurrently for malware or an unknown APT, for example by looking for suspicious applications that are running in computer memory. Once the malware is identified a forensic snapshot of the data can be taken and all systems on the network forensically searched, whereupon remediation of infected devices can take place. The remediation option could then include (if required) the simultaneous stopping of processes or the forensic wiping of all traces of the malware across the entire domain. Previously, the manual approach would probably have taken weeks onsite or may not have fully remediated the attack. Now, new technology dramatically brings the response and remediation time down, allowing companies to resume normal business in a timely fashion. Cyber Security for SCADA Systems - Autumn 2013 9 www.thalescyberassurance.com Integration of Cyber Monitoring and Defence can be combined into modern Security Facilities enabling Cyber Security, Physical Security and Process Management to be combined into holistic Situational Awareness and Tactical Response Management control rooms. Cyber Incident Reporting Depending on the industry sector there is likely to be a requirement for the mandatory reporting of the incident to one of the UK Computer Emergency Response Teams such as GovCertUK or MODCERT (MODWARP). How quickly and accurately the information on your cyber attack is passed to that authority will reflect in their ability to alert in a timely fashion other areas of industry, especially critical national infrastructure. It may also be reflected in any enforcement measures that the Information Commissioner (or similar organisation) may wish to take as a result of the cyber breach. So where does Thales fit in? When it comes to security and critical systems Thales is a world leader. There are many statistics, here are some – T hales technology secures 80% of the world’s financial transactions (90% in the UK) billion rail passengers 3 carried annually by the Thales SelTrac CBTC systems T hales implementation of the World’s largest urban security project in Mexico City Thales implementation of security for the world’s largest oil terminal Thales securing thousands of kilometres of pipelines and border surveillance Road toll collection on 4000 lanes of 30 motorways worldwide Significant involvement in air-traffic management, and airport security IT should be noted that CNI & ICS/SCADA spreads over a multitude of industries, and Thales is a major player in these arenas, if not a world leader, with much experience in implementing large-scale operation critical secure systems. Cyber Security for SCADA Systems - Autumn 2013 10 www.thalescyberassurance.com Thales Critical Infrastructure & Cyber-security Services Thales believes Good Cyber is Good Business. Taking a holistic approach to security is the critical factor. Layered architectural models should be built that bring together world leading products from both the system/technology integrator and third parties to ensure that the holistic security requirements of the customer are met. It should be part of a solution to ensure the integrity of both the integration layer and the operation elements. Individual components of the solution should be understood in conjunction with concept of operation, policies, training, maintenance, supportability and the service aspects. Possible individual components and services are listed below but it should be understood that the real benefits come from solution providers, who can deliver all encompassing holistic security solutions. Critical Infrastructure Cyber Security for SCADA Systems - Autumn 2013 Service Comment CCTV / Site Security Controls Selection of appropriate CCTV systems, calculation of field of view, illumination requirements, and other fence technology such as PIDs. Calculation of zoning for image analytics, and physical control selection such as inner / outer fence, camera poles, towers, bunds, biometrics, access control, video analytics and other measures to deter & detect intruders. Command Centre Design With involvement in the largest and most sophisticated command centres on a worldwide basis, Thales is well placed to select the most appropriate technologies for inclusion in the command centre to support user requirements. The physical security aspects of the command centre will be considered, together with the internal IT system requirements / systems integration, and secure connectivity to local and remote stakeholders to offer holistic Situational Awareness and Response Capabilities. Physical Intrusion Tests Covert intrusion by specialised Thales employees with skills in physical entry into critical facilities, using various techniques to overcome existing controls are used to test existing controls and operational processes in place to stop intruders. Thales personnel will leave agreed markers which will signify places that were reached which could signify the placement of explosives or theft of material – whatever the client values and is trying to protect. Physical Security Audits Visiting client sites to understand existing security controls such as guard mechanisms, fences, doors, alarms, CCTV, and other aspects including security management systems and reporting mechanisms, and production of reports for clients highlighting shortfalls and what should be done with respect to security improvements. 11 www.thalescyberassurance.com Security and Emergency / Event Management Integration Selection of appropriate event management software to cover security, incident and emergency management. These systems can be highly sophisticated, and require integration with a large number of other system / site & remote sensors & CCTV, and stakeholders for management of events to give maximum operational benefit. Communications Network Design CNI sites may have a lot of on-site sensors such as CCTV / PIDs, or ground based sensors and radar technology for detection of threats further away. GPS tracked assets such as vehicles and personnel may need to be monitored, for dynamic display on the video wall in the command centre. This entire site based data, plus data to / from offsite stakeholders, needs to be secure. Thales is skilled in the design of such networks allowing fixed cable, wireless / microwave / laser / radio / satellite communications in a secure, integrated, highly available and resilient manner. Process Control and Automation Thales has decades of experience in providing comprehensive Process Control and Automation systems. SCADA, Monitoring, DCS and Command Centres, both fixed, multi-site and mobile. The integration of traditional Industrial IT System expertise with Security System and Cyber System expertise sets Thales as a key total solution provider. Cyber Security Cyber Security for SCADA Systems - Autumn 2013 Service Comment Cyber-Range Activities Ability to undertake cyber engagements against other participants acting as APT actors or DDOS attackers. Cyber Security Training Ability for users of the Cyber Integration Centre to practice incident response, and configuration of hardware / software on both virtual and real industrial systems. Enterprise / Solutions Architecture Design & Systems Integration Analysis of the customer requirements and determine whole enterprise architecture requirements, such as server architecture, SANs , enterprise software components, ESB, Databases, etc. Design of whole solution. Hardware / Software Evaluation Evaluation of hardware appliances and / or software for external clients Holistic Security / Cyber Maturity Audits Deployment of Thales personnel onto client sites, to gather information on current client cyber maturity and make recommendations regarding controls that should be put in place. Thales operate teams where personnel are members of CLAS, and recognised under the CCP scheme. Incident Response Emergency deployment to client sites on a worldwide basis to resolve issues relating to APT and other cyber incidents. Ability to deploy hardware network appliances and client probes to capture indicator of compromise information, analyse the date and remove the cyber intrusion. Load Testing Ability to take customer appliances and apply severe data loading to understand behaviour. Similarly for server based software to understand that the specified servers will be able to support the expected user community. 12 www.thalescyberassurance.com Security Architecture Design Analysis of existing or new architecture requirements, and determine the security controls that should be in place to secure the architecture. Selection of products & detailed design. Virtualised DR Failover Testing Use of Cyber Integration Centre to test disaster recovery scenarios to prove that is one virtualised instance fails, other infrastructure can recover the situation, and human processes defined & users trained. Virtualised Enterprise Environment (VEE) Ability within the Cyber Integration Centre to simulate whole enterprise networks including servers, routers, switches, LAN/WAN issues (bottlenecks, jitter, time delays), real time infrastructure, and user communities. This enables clients to understand systems prior to deployment, or test changes prior to roll-out and understand how the system will operate under user load. Virtualised Vulnerability Testing Similar to VEE above, except ability to use Thales VA team to analyse software / firmware build status to understand components that should be patched or have lockdown policies applied. Vulnerability Assessment / Penetration Testing Deployment of Thales teams to client sites to perform vulnerability assessments against existing architecture, allowing current build status and vulnerabilities to be identified, and a report produced on these findings. Similarly, if the customer wishes, Thales is able to take these vulnerabilities and exploit these to gain access to further resources. Thales team members are recognised under the CREST scheme. Gateway Services Cyber Security for SCADA Systems - Autumn 2013 Service Comment NOC as a service Thales is able to link to client sites and undertake a Network Operations Centre (SOC) Service, where client network infrastructure is managed & monitored, and software updates / patching is applied. PSN Gateway Services Thales is a provider of gateway services to the PSN and other networks, and is able offer clients the ability to connect to the UK Public Sector Network (PSN) is required CSOC as a service Thales is able to link to client sites and undertake a Cyber Security Operations Centre (CSOC) service, where these networks are monitored for cyber attacks, and APT characteristics. This is a particularly useful service for those clients who have taken advantage of the Thales Incident Response service, allowing through life aftercare. 13 www.thalescyberassurance.com Figure 3 - One of the growing number of Thales Cyber Integration Labs Figure 3 shows one of the interconnected network of labs used for staging and testing of concepts in relation to real-time / SCADA and enterprise systems. In this case a video wall is present for displays covering CCTV and security management. Simulations are present for nuclear reactor control, pipeline monitoring, and site perimeter security. Other systems allow the overlay of incidents and sensor / asset data on top of site maps. There are a number of SCADA, PLC and Security Management systems in place and the ability to feed these systems from a number of sensors. Within this lab a section of fence is present, together with physical intrusion sensors, and cameras to react to intrusion events. This lab is available for industrial control and physical security solution and it can be linked to other labs allowing cyber incidents to be simulated. Thales has access to thousands of malware signatures, and is able to simulate sophisticated attacks against the ICS/SCADA and Security equipment, then design appropriate security architectures to keep such attacks out. The virtualised labs can also act as a Cyber training centre enabling the deployment of cyber attacks, and allowing response personnel to train in containing the event and removal of the malware or attackers from the network. Although the labs can operate to support cyber range training in cyber-warfare-defence, the labs are primarily aimed at repelling existing cyber attacks, which are commonplace. The availability of such facilities is a formidable resource in allowing clients to test equipment & concepts prior to deployment with realistic simulated loads and architectures, having extensive server resources and state of the art network simulation equipment means that millions of users can be simulated, events timed to the nanosecond, and network problems such as bottlenecks / jitter / timedelays simulated to provide the most realistic of environments Thales can help solve client problems, test the real system software to be used with realistic loads and events, then deploy to client sites via our consultancy and implementation teams, wherever the client is located on a global basis. Physical Artefacts Switches, CCTV, PIDS etc. Virtualised Enterprise Environment Virtual User Community Switch / Routing Infrastructure External User Community External Components and Non-Virtualised Infrastructure External Hacking Community Company Enterprise Server / Application Infrastrucure Internal / External – LANs/MANs External Hacking Community Security / Authentication Infrastructure Real-time Industrial Control Infrastructure and Process Stage Complete / Partial Enterprise Infrastructure Replicate Processes & Workflow SCADA Simulation Simulate Network Infrastucture and Bottlenecks Stress Test Applications Pen Test / Vulnerbility Assessments Supply Chain Interaction Replicate Hacking and Incident Response Figure 4 - Virtualised Enterprise Environment Cyber Security for SCADA Systems - Autumn 2013 14 www.thalescyberassurance.com Conclusion We live in a fast changing world. Unfortunately, this includes the threats against the SCADA integral to the functioning and prosperity of businesses and Critical National Infrastructure. There are many misconceptions on the levels of threat, the extent of damage or disruption and the effort and skills required for protection. The field of cyber security in relation to SCADA and Industrial Control Systems is complex, and the consequences of either ignoring the threats or implementing inadequate controls may have significant consequences, perhaps involving loss of life if an attack was launched which achieved the end objective. Cyber and SCADA Security is now of major concern for all industrial infrastructures. The nature of the threat demands rapid, accurate, and informed decision-making to ensure safety, security, and operational effectiveness are maintained regardless of any incidents or accidents that may occur. This requires the application of holistic security solutions, delivered by organisations such as Thales who is able to deliver the integrated security systems designed to meet the increasing threats and ensure that Critical Operations receive the best protection. This white paper has shown that vulnerable organisations should take a holistic approach to securing their SCADA systems. Interrelated cyber, physical, and industrial IT vulnerabilities must be managed effectively from the outset to meet new threats. With its wide range of services and state of the art testing, integration and simulation facilities, Thales is able to understand the nature of the customer environment, integrate security into the system design from the ground up to cover the main risks of physical, cyber, personnel or environmental security, or retrofit solutions to shield legacy solutions from the wide range of threats today. Cyber Security for SCADA Systems - Autumn 2013 15 www.thalescyberassurance.com About Thales Whenever critical decisions need to be made, Thales has a role to play. World-class technologies and the combined expertise of 65,000 employees in 56 locally based country operations make Thales a key player in assuring the security of citizens, infrastructure and nations in all the markets we serve – aerospace, space, ground transportation, security and defence. For more than 40 years, Thales has delivered state of the art physical and cyber security solutions to commercial, critical national infrastructure, government and military customers. Thales will help you refocus your security spend to defend your organisation and prevent significant loss of revenue and reputation. Thales will ensure your competitive advantage is maintained by being able to demonstrate resilient and secure use of physical and cyber security. Why Thales? As a world leader in providing modular, integrated physical and cyber security solutions, Thales is able to: Design and implement upgrades to the existing security of your organisation with minimal impact to your business operations. Thales is trusted to secure critical energy facilities, transport networks and defence assets in the UK and around the world. P ull through capabilities from the global Thales Group and our industry partners to deliver secure solutions that deliver tangible business benefits. For example, Thales implemented a fully integrated security management system in Mexico City as part of the ‘Secure City’ project. Use our world leading encryption product suite to protect your data. Our encryption hardware help secure an estimated 80% of the world’s payment transactions, including 3.7 billion BACS transactions every year. Contact Us Thales UK Ltd, Mountbatten House, Basing View, Basingstoke RG21 4HJ, UK Tel: +44 (0) 1256 376633 Email: cyber@uk.thalesgroup.com Website: www.thalescyberassurance.com © 2013 THALES UK LTD. This document and any data included are the property of Thales UK Ltd. No part of this document may be copied, reproduced, transmitted or utilised in any form or by any means without the prior written permission of Thales UK Limited having first been obtained. Thales has a policy of continuous development and improvement. Consequentially the equipment may vary from the description and specification in this document. This document may not be considered as a contract specification. Graphics do not indicate use or endorsement of the featured equipment or services. Cyber Security for SCADA Systems - Autumn 2013 16