CT230 - Industrial Network and Cybersecurity Threats Amadou Diaw Business Development Leader Rockwell Automation - CSM Consulting Services Rev 5058-CO900F Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Physical Layer COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. 2 The Network is Slow!!! Top hosts, conversations, protocols Voice Virus Hacking Multicast DNS Peer-to-peer Worms What’s really happening on my network? COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. 3 Internet Modern ICS Enterprise Network Workplaces Firewall Enterprise Optimization Suite Enterprise Network IP Third Party Application Server Mobile Operator Services Network Connectivity Server Historian Server Application Server Engineering Workplace Control Network Serial, OPC or Fieldbus Redundant Device Network Third Party Controllers, Servers, etc. Serial COMPANY INTERNAL - Internal Use Only RS485 Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Wireless = RF SIGNAL… The 2.4GHz and 5GHz RF represent the physical layer for 802.11 wireless LANs 2.4GHz 802.11b/g and 5GHz 802.11a Not just 802.11 WiFi devices use these frequencies Radar Bluetooth Other Wi-Fi Networks Bluetooth, analog video cameras, cordless phones, microwave ovens, motion sensors, florescent lights The RF environment for good WiFi performance Relatively free of interfering 802.11 and non802.11 devices Adequate signal strength over the target coverage area COMPANY INTERNAL - Internal Use Only 2.4/5 GHz Cordless Phones Microwave Ovens Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. 5 IS CRITICAL of industrial network operators have faced a large scale McAfee and the Center for Strategic and International Studies (CSIS) April 2012 CYBERATTACKS ARE a day is the average costs per 24 hours of McAfee and the Center for Strategic and International Studies (CSIS) April 2012 IS ESSENTIAL was spent on in 2011 PriceWaterhouseCoopers LLP, Nov 2011 COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Anatomy of a Zero-day Attack COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Are you Protected? “Some organizations will be a target regardless of what they do, but most become a target because of what they do…” Compromising network security is a $6 billion global underground industry of which $300 million is directly tied to manufacturing “If your organization is a target of choice, understand as much as you can about what your opponent is likely to do and how far they are willing to go.” Source : 2013 DBIR COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. ICS Security in the News COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. 9 Maroochy Shire Sewage Plant In the spring of 2000, a former employee of an Australian organization that develops manufacturing software applied for a job with a local government, and was rejected. Over a 2-month period, this person used a radio transmitter on as many as 46 occasions to remotely break into the controls of a sewage treatment system. He altered electronic data for the sewage pumping stations and caused malfunctions in their operations. This led to releasing about 264,000 gallons of raw sewage into nearby rivers and parks. Reference: courtesy of Clinton Webb, Central Tech COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. 10 … and how did “they” get it? JAC Motors 4R3 Ford Motor Company F-150 COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Nothing is beyond reach “Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever... “the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.” http://online.wsj.com/article/SB124027491029837401.html#ixzz1dQEQ283S COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. … and how did “they” get it? Chengdu Aircraft Industry Group J20 Lockheed Martin F-35 COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Demo Time Rev 5058-CO900F Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Manufacturing Security Infographic Source : 2013 DBIR Sixty Two Percent 91% of breaches took less than a day to execute took Months or Years to Discover 53% took months to Only 1 out of 10 were discovered by an internal resource… COMPANY INTERNAL - Internal Use Only Contain Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Real-world Threats to Industrial Systems Cyber Attack Effects & Impacts Conficker (2008) Worm that enabled remote access with payload replacement capability – Windows OS affected including Windows industrial PCs. Operation Aurora (2009) Attacks aimed at high tech, security and defense contractors alleged to access and potentially alter source code repositories. Stuxnet (2010) Duqu (2011) Nitro Malware (2011) Computer worm that facilitated the manipulation of PLC logic and operator’s view to disrupt a process and damage assets. Targeted Remote Access Trojan (RAT) alleged to enable reconnaissance and intelligence-gathering as precursor to attack. Remote Access Trojan (RAT) targeting chemical and 19 other organizations in other industries for corporate espionage. Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Security Threat Actors Human System • Malicious • Ignorant • Misconfiguration • Lack of Privilege Control Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 17 Security Threat Vectors Application of patches Natural or Man-made disasters Worms and viruses Theft Sabotage Unauthorized access Denial of Service Unauthorized actions by employees Unauthorized remote access Unintended employee actions Security risks increase potential for disruption to system uptime, safe operation, and a loss of intellectual property Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Industrial Control Systems in PPD-21 Defined Critical Infrastructure Sectors Chemical Commercial Facilities Critical Manufacturing Dams Defense Industrial Base Energy Food and Agriculture Nuclear Reactors Transportation Water/Wastewater Government Facilities Industrial Control Systems are core to operations of Critical Infrastructure Processes Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 19 Industrial Network Security Trends Established Industrial Security Standards International Society of Automation ISO/IEC-62443 (Formerly ISA-99) Industrial Automation and Control Systems (IACS) Security Defense-in-Depth IDMZ Deployment National Institute of Standards and Technology NIST 800-82 Industrial Control System (ICS) Security Defense-in-Depth IDMZ Deployment Department of Homeland Security / Idaho National Lab DHS INL/EXT-06-11478 Control Systems Cyber Security: Defense-in-Depth Strategies Defense-in-Depth IDMZ Deployment A secure application depends on multiple layers of protection. Industrial security must be implemented as a system. Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 20 CT231 - Industrial Network and Cybersecurity Solutions Amadou Diaw Business Development Leader Rockwell Automation - CSM Consulting Services Rev 5058-CO900B Copyright © 2012 Rockwell Automation, Inc. All rights reserved. NIST CYBERSECURITY FRAMEWORK Functions NIST FRAMEWORK CORE Categories Subcategories Information An undertanding of how to manage cybersecurity risks to systems, assets, data and capabilities Asset management, business environment, governance, risk assessment, risk management strategy ISA99 / IEC-62443 NIST SP 800-XX DHL INL/EXT-06-11478 DHS CRR TSA TSSCWG NERC-CIP XXX PROTECT The controls and safeguards necessary to protect or deter cybersecurity threats Access controls, awreness and training, data security, data protection processes, maintenance, protective technologies ISA99 / IEC-62443 NIST SP 800-XX DHL INL/EXT-06-11478 DHS CRR TSA TSSCWG NERC-CIP XXX DETECT Continuous monitoring to provide proactive and realtime alerts of cybersecurityrelated events Anomalities and events, continuous monitoring, detection processes ISA99 / IEC-62443 NIST SP 800-XX DHL INL/EXT-06-11478 DHS CRR TSA TSSCWG NERC-CIP XXX RESPOND Incident-response activities Response planning, communications, analysis, mitigation, improvements ISA99 / IEC-62443 NIST SP 800-XX DHL INL/EXT-06-11478 DHS CRR TSA TSSCWG NERC-CIP XXX RECOVER Business continuity plans to maintain resilience and recover capabilities after a cyber breach Recovery Planning, improvements, communications ISA99 / IEC-62443 NIST SP 800-XX DHL INL/EXT-06-11478 DHS CRR TSA TSSCWG NERC-CIP XXX Reference: www.pwc.com/cybersecurity IDENTIFY Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 22 . Network CyberSecurity Services Overview ASSESS DESIGN/PLAN IMPLEMENT AUDIT MANAGE/MONITOR COMPANY INTERNAL - Internal Use Only Assess the current state of the security program, design, policy Assess the current state of the network design, implementation Design and plan a network infrastructure Installation, procurement and configuration of a network Audit current architecture compared to governing body (ODVA, IEEE, ANSI/ TIA) Manage, maintain and monitor uptime and issues on the network and SANs environment Assess the current state of a manufacturing data center Design and plan security program, policy, infrastructure, business continuity plan Implementation of a security program, infrastructure design, policy training Design and plan a SANs infrastructure Installation, procurement and configurations of a SANs infrastructure Audit security program compared to governing body (NERC CIP, ISA 99, NIST 800-53, NIST 800-82 Managed Security Services (Incident response, disaster recovery, monitoring) Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. LOGICAL NETWORK DESIGN CONSIDERATIONS Rev 5058-CO900F Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Holistic Defense-in-Depth Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 25 Holistic Defense-in-Depth EtherNet/IP Industrial Automation and Control System Network Open by default to allow both technology coexistence and device interoperability for Industrial Automation and Control System (IACS) Networks Secure by configuration and architecture: Configuration Harden the infrastructure through holistic defense-in-depth - multiple layers of security Architecture Structure the infrastructure to defend the edge - Industrial DMZ (IDMZ) Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 26 Industrial Network Security Trends EtherNet/IP Industrial Automation & Control System Network Flat and Open IACS Network Infrastructure Structured and Hardened IACS Network Infrastructure Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 27 Holistic Defense-in-Depth Critical Elements to Industrial Security A balanced Industrial Security Program must address both Technical and Non-Technical Elements Non-technical controls - rules for environments: e.g. business practices, standards, policies, procedures, risk management, education and awareness programs Technical controls – technology to provide restrictive measures for nontechnical controls: e.g. Firewalls, Group Policy Objects, Layer 3 access control lists (ACLs), Physical Access Security is only as strong as the weakest link “one-size-fits-all” Vigilance and attention to detail are KEY to the long-term security success Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 28 CPwE Industrial Network Security Framework Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 29 Industrial Network Security Framework CPwE Architectures Internet Enterprise External DMZ/ Firewall Identity Services Enterprise Zone: Levels 4-5 Industrial Demilitarized Zone (IDMZ) Physical or Virtualized Servers • Patch Management • AV Server • Application Mirror • Remote Desktop Gateway Server Industrial Zone: Levels 0-3 Authentication, Authorization and Accounting (AAA) Core Switches Wireless LAN Controller (WLC) Active Control System Engineers Control System Engineers in Collaboration with IT Network Engineers (Industrial IT) Standby Distribution Switch Stack Level 3 – Site Operations FactoryTalk Client IT Security Architects in Collaboration with Control Systems Engineers SSID 2.4 GHz Level 2 – Area Supervisory Control LWAP SSID 5 GHz I/O Controller Controller Level 1 - Controller Soft Starter WGB MCC Level 0 - Process I/O Drive Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 30 IDMZ - Industrial DeMilitarized Zone Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 31 Network Security Framework Industrial Demilitarized Zone Enterprise Network Level 5 Level 4 E-Mail, Intranet, etc. Site Business Planning and Logistics Network Remote Gateway Services Patch Management Application Mirror Enterprise Security Zone Firewall AV Server Web Services Operations Web E-Mail CIP Application Server Industrial DMZ Firewall Level 3 Level 2 FactoryTalk Application Server FactoryTalk Directory Engineering Workstation Remote Access Server Site Operations and Control Area Supervisory Control Operator Interface FactoryTalk Client FactoryTalk Client Operator Interface Engineering Workstation Basic Control Level 1 Level 0 Batch Control Sensors Discrete Control Drive Control Drives Continuous Process Control Actuators Industrial Security Zone Safety Control Robots Cell/Area Zone Process Logical Model – Industrial Automation and Control System (IACS) Converged Multi-discipline Industrial Network No Direct Traffic Flow between Enterprise and Industrial Zone Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 32 Industrial Demilitarized Zone (IDMZ) Industrial Network Security Framework All network traffic from either side of the IDMZ terminates in the IDMZ; network traffic does not directly traverse the IDMZ Only path between zones No common protocols in each logical firewall No control traffic into the IDMZ, CIP stays home No primary services are permanently housed in the IDMZ Trusted? Untrusted? Disconnect Point Replicated Services IDMZ IDMZ shall not permanently house data Application data mirror and reverse proxies to move data into and out of the Industrial Zone Limit outbound connections from the IDMZ Enterprise Security Zone No Direct Traffic Disconnect Point Industrial Security Zone Trusted Be prepared to “turn-off” access via the firewall Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 33 Industrial Demilitarized Zone (IDMZ) Industrial Network Security Framework Permit Secure Remote Access to Industrial Assets Permit Data from the Industrial Zone to Enterprise Stakeholders Wide Area Network (WAN) Physical or Virtualized Servers • ERP, Email • Active Directory (AD), AAA – Radius • Call Manager Block Untrusted Access to Industrial Zone Web Reports Plant Manager Engineer Untrusted WLC (Enterprise) Remote Access Core switches Firewall (Inspect Traffic) Permit Physical or Virtualized Servers • Patch Management Remote • AV Server Desktop • Application Mirror Gateway Block Industrial Demilitarized Zone (IDMZ) Web Proxy Firewall (Inspect Traffic) Physical or Virtualized Servers • Application Servers & Services • Network Services – e.g. DNS, AD, DHCP, AAA • Storage Array Enterprise Zone Levels 4-5 ISE (Enterprise) Block Permit Firewalls (Active/Standby) Industrial Zone Levels 0-3 Core switches Remote Access Server Level 3 Site Operations WLC (Active) WLC (Standby) Distribution switch LWAP Block Untrusted Access to Enterprise Zone Untrusted WGB PAC Levels 0-2 Cell/Area Zone FactoryTalk Client IO Drive MCC PAC PAC Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 34 Translate Logical-to-Physical Design Translates logical network architecture into physical infrastructure design – using a methodology that reduces operating costs, speeds new hardware implementation, and ensures that future growth requirements are considered and properly planned Rockwell Automation NSS Services Logical Architecture + Panduit Advisory Services Physical Design = Reliable, Scalable, Upgradeable Design Translate into Design Taking Design Phase for granted = Copyright © 2012 Rockwell Automation, Inc. All rights reserved. PHYSICAL NETWORK DESIGN CONSIDERATIONS Rev 5058-CO900B Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Infrastructure Investment Compared to Longevity Software Networking Operations Cabling • 60% • 2 to 5 years • 23% • 5 Years • 10% • 5 Years • 7% • 20+ years (or forever!) 80% of network problems are caused by only 7% of invested budget. Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Think of your Network from End-to-End People in the Controls world tend to Enterprise Control Level think of networks as the link between Central Computer Management Level Local Control System the Control Panel and the device. Industrial Ethernet Control Network DMZ Server Office Ethernet Operator Station Server Control Computers Field Level Process Control Level Sensors Analyzers Field Devices Device Network SM Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Zone Architecture Benefits Traditional Cable Deployment • Node to network room “home runs” Zone Architecture • Flexibility for MAC’s • Reduced installation time • Simplified diagnostics Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Network Infrastructure Physical Layer Design Considerations Copper Cabling Systems IN-FIELD™ IN-ROUTE™ IN-FRASTRUCTURE ™ Fiber Cabling Systems Grounding & Bonding Systems Cable Management Cable Ties and Accessories Fiber Routing Systems IN-PANEL™ IN-ROOM™ Zone Cabling Systems Managed Network Systems Cabinets & Rack Systems Identification Solutions Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 40 Environmental Focus - M.I.C.E. Physical Layer Design Considerations M.I.C.E. provides a method of categorizing the environmental classes for each plant Cell/Area zone. This provides for determination of the level of “hardening” required for the network media, connectors, pathways, devices and enclosures. The MICE environmental classification is a measure of product robustness: Increased Environmental Severity Specified in ISO/IEC 24702 Part of TIA-1005 and ANSI/TIA-568-C.0 standards TIA 1005 Office Industrial Examples of rating: 1585 Media : M3I3C3E3 M12: M3I3C3E3 RJ-45: M1I1C2E2 Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 41 Network Distribution Installation Pitfalls Physical Layer Design Considerations Installation is critical for system performance, security and testability. Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 42 Micro Data Center – IN-ROOM Solution Physical Layer Design Considerations Enterprise/Office Patchfield used to uplink switch to Levels 4 & 5 Enterprise Server Patching Cross connect between production servers and switch Firewall and DMZ Logical buffer zone between the Enterprise and Industrial Zones Industrial Zone Patchfield used to connect Layer 3 switch to Layer 2 switches used on plant-floor Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 43 Validated Building Blocks Physical Layer Design Considerations Design your system using cost effective and easy to troubleshoot Network Architecture Fiber or Copper Leverage Reference Architecture & Validated Building Blocks Industrial Data Integrated Zoneand Reduce Control Panel Solutions toCenter Speed Deployment Risks Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 44 Network Security Framework Physical Port Security Keyed solutions for copper and fiber Lock-in, Blockout products secure connections Data Access Port (keyed cable and jack) Copyright © 2012 Rockwell Automation, Inc. All rights reserved. 45 Availability, Integrity and Confidentiality Enterprise networks require C-I-A Confidentiality of intellectual property matters most Industrial Control Systems require A-I-C Availability and integrity of control matters most control data has low entropy—little need for confidentiality Many ICS vendors provide “six 9’s” of availability Ensuring availability is hard Cryptography does not help (directly) DOS protection, rate limiting, resource management, QoS, redundancy, robust hardware with high MTBF Security must not reduce availability! Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Key Takeways Rev 5058-CO900F Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. TAKE ACTION Education and awareness: Within your organization, for your customers or trusted partners Establish an open dialog between Industrial Automation and IT groups Establish an Industrial security policy, unique from and in addition to the Enterprise security policy Holistic Defense-in-Depth approach: no single product, methodology, nor technology fully secures IACS networks Be aware of Industrial Automation and Control System Security Standards IEC-62443 (Formerly ISA99), NIST 800-82, DHS External Report # INL/EXT-06-11478 Utilize standards, reference models and reference architectures Work with trusted partners knowledgeable in industrial automation and security "Good enough" security now, is better than "perfect" security ... never. (Tom West, Data General) Copyright © 2012 Rockwell Automation, Inc. All rights reserved. Additional Information Rev 5058-CO900F Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Rockwell Automation Educational Tools & Content EtherNet/IP Website: http://ab.rockwellautomation.com/Networks-and-Communications/Ethernet-IP-Network Network and Security Services Website: http://www.rockwellautomation.com/services/networks/ http://www.rockwellautomation.com/services/security/ Network and Security Services Noggin Site: https://noggin.gosavo.com/CustomPage/View.aspx?id=28994665 Reference Architectures Reference Architectures Design Guides Converged Plant-wide Ethernet (CPwE) Application Guides Fiber Optic Infrastructure Application Guide COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Rockwell Automation Educational Tools & Content KnowledgeBase Security Table of Contents TCP/UDP Ports used by Rockwell Automation products Network and Security Services Brochure Whitepapers Patch Management and Computer System Security Updates Scalable Secure Remote Access Solutions for OEMs Top 10 Recommendations for Plant-wide EtherNet/IP Deployments Securing Manufacturing Computer and Controller Assets Production Software within Manufacturing Reference Architectures Achieving Secure Remote Access to plant-floor Applications and Data Design Considerations for Securing Industrial Automation and Control System Networks - ENET-WP031A-EN-E COMPANY INTERNAL - Internal Use Only Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. THANK YOU! Rev 5058-CO900F Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved.