W16 - Fundamentals of Securing Ethernet/IP Networks

Fundamentals of Securing Ethernet/IP
Networks
Jason Dely, CISSP
Principal Security Consultant
[email protected]
Jeffrey Shearer, CISSP, PMP
Principal Security Consultant
[email protected]
November 7, 2012
Rev 5058-CO900B
5058-CO900C
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Agenda and Topic List
 Changing Landscape of Industrial Automation
 Layered Security & Defense in Depth for ICS
 Design-for-Security
 Incident Response and Vulnerability Management
 Security in the Integrated Architecture
 Network & Security Services (NSS)
 Call to Action & Open Discussion
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Evolving Landscape
Themes of a contemporary world




Interconnected, networked digital devices
Complex systems needing unfettered access to data
Security risks and new threat-actors are very real
Security breaches are becoming the „norm‟
Themes of Industrial Control Systems (ICS)
 Systems are growingly complex and interconnected
 ICS „Data‟ spans both information and control
 Targeted attacks against Control Systems are a reality
Consistent Concerns and Desires
 Design and maintain a system resilient to attacks
 Comply with emerging standards and legislation
 Protect what is important…
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
3
Risks and Threats to Networked Systems
Application of
Security patches
Natural or Man-made
disasters
Worms and
viruses
Theft
Sabotage
Unauthorized
access
Denial of Service
Unauthorized actions by
employees
Unauthorized
remote access
Unintended
employee actions
Unaddressed security risks increase potential for
disruption to system uptime and safe operation
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Why is Industrial Security critical?
 Industrial Ethernet is established.
 Convergence of Manufacturing and
Enterprise systems is a reality.
 Stand-alone control systems
are quickly disappearing.
Source: ARC Survey of Control System Engineers 2009
 Remote Access is essential
 Internal– from the business system to the factory
 External– for monitoring and maintenance
Industrial Control Systems are part of the
Enterprise and no longer islands of automation.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Government Attention to ICS Security
 Energy & Power Distribution
 Chemical & Refineries
 Defense
 Transportation
 Water/Wastewater
Sectors
HSPD 7
 Critical Manufacturing
Homeland Security
Presidential Directive 7
Attacks on critical infrastructure could significantly disrupt
the functioning of government and business alike.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
6
Our Focus on Industrial Security
Reduce risks to safe and reliable operation
…Control system architecture with layered security to
help maintain operational integrity under threat
Data Protection
and Confidentiality
Network
Remote
Access
Partners
IP
Role-based
Security
AntiTamper
and
Detection
Supply-chain
Protection
protection
Protect assets & information
Data
…Product and system features to help
control access, tamper-proof and limit
information exposure
Government and Standards Alignment
…Responsible disclosure with control system solutions that follow
global standards and help fulfill independent & regulatory security requirements
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
7
What is Industrial Security?
 Reduce risks associated with
unintended or malicious actions
The use of proven
technologies, policies &
procedures to…
 Improve ability to be free from
danger, injury or loss
 Enhance protection of key assets
from disruption, loss or damage
RISK =
Threat × Vulnerability × Consequence
 Protect & limit potential exposure or damage to key assets
Protect of People, Property & Proprietary Information
from unintended or malicious actions taken against it
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
8
Ways to address risk
AS A QUICK REVIEW…
There are four ways to deal with risk:
1. Risk Mitigation – address it head on
2. Risk Acceptance – i.e. the Risk Tautology
(it is what it is)
3. Risk Transference – i.e. insurance
4. Risk Avoidance – Project X is risky…let‟s
not do Project X
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Agenda and Topic List
√

Changing Landscape of Industrial Automation
 Layered Security & Defense in Depth for ICS
 Design-for-Security
 Incident Response and Vulnerability Management
 Security in the Integrated Architecture
 Network & Security Services (NSS)
 Call to Action & Open Discussion
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Two Critical Elements to Security
A corporation’s risk tolerance
level – often a “fuzzy gray line.”
Risk
Averse
• How much security is enough
security?
NonTechnical Technical
Risk
Friendly
• The amount of security is a system
should rise to meet a corporation‟s
level of risk tolerance.
Attack vector
Attack vector
Non
Technical
Technical
Non
Technical
• In theory, the more security that is
properly designed and deployed in a
system, a lower amount of risk
should remain.
Technical
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Global Security Standards
ISA99 and IEC 62443
ISA99
Over 260
members from
+200 companies
 The ISA99 Committee has aligned S99 standard
with IEC conventions
 Allows fast track acceptance as global standard
 Minimal modifications made for Int‟l acceptance
 IEC is adopting the work of ISA99 as a global
security standard IEC 62443








IEC 62443
Part -1-1 TS - Terminology, concepts and models (Pub‟d)
Part -1-3 System security compliance metrics (Draft)
Part -2-1 Establish industrial automation and control sys security program (Pub‟d)
Part -2-3 Patch management in the IACS environment (Proposed)
Part -2-4 Certification of IACS supplier security policies and practices (Proposed)
Part -3-1 TR - Security technologies for industrial automation & control sys (Pub‟d)
Part -3-2 Security assurance levels for zones and conduits (Draft)
Part -3-3 System security requirements and security assurance level (Draft)
 IEC evaluating WIB 2.0 Supplier security policies
and practices for IEC 62443-2-4 (in progress)
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Industrial Security Trends
Logical Model
Enterprise Network
Level 5
Level 4
E-Mail, Intranet, etc.
Site Business Planning and Logistics Network
Terminal
Services
Gateway
Patch
Management
Application
Mirror
Enterprise
Security
Zone
Firewall
AV
Server
Web Services
Operations
Web
E-Mail
CIP
Application
Server
DMZ
Firewall
Level 3
Level 2
FactoryTalk
Application
Server
FactoryTalk
Directory
Engineering
Workstation
FactoryTalk
Client
Remote
Access
Server
Site Operations
and Control
Area
Supervisory
Control
Operator
Interface
FactoryTalk
Client
Operator
Interface
Engineering
Workstation
Basic Control
Level 1
Level 0
Batch
Control
Sensors
Discrete
Control
Drive
Control
Drives
Continuous
Process
Control
Actuators
Industrial
Security
Zone
Safety
Control
Robots
Cell/Area
Zone
Process
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Industrial Security Trends
Established Industrial Security Standards
 International Society of Automation
 ISA-99
 Industrial Automation and Control System (IACS) Security
 Defense-in-Depth
 DMZ Deployment
 National Institute of Standards and Technology
 NIST 800-82
 Industrial Control System (ICS) Security
 Defense-in-Depth
 DMZ Deployment
 Department of Homeland Security / Idaho National Lab
 DHS INL/EXT-06-11478
 Control Systems Cyber Security: Defense-in-Depth Strategies
 Defense-in-Depth
 DMZ Deployment
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Our Approach to Industrial Security
A secure application depends on multiple layers of protection.
Industrial security must be implemented as a system.
 Layered Security Model
Shield potential targets behind multiple levels
of protection to reduce security risks
Physical
Network
Computer
Application
Device
 Defense in Depth
Use multiple security countermeasures to
protect integrity of components or systems
 Openness
Consideration for participation of a variety of
vendors in our security solutions
 Flexibility
Able to accommodate a customer‟s needs,
including policies & procedures
 Consistency
Solutions that align with Government
directives and Standards Bodies
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
15
Networking Design Considerations
Security
Recommendations and guidance to help reduce Latency and Jitter, to
help increase data Availability, Integrity and Confidentiality, and to help
design and deploy a Robust, Secure and Future-Ready EtherNet/IP
network infrastructure
• Robust Physical Layer
• Segmentation
• Resiliency Protocols and Redundant Topologies
• Time Synchronization
• Prioritization - Quality of Service (QoS)
• Multicast Management
• Convergence-Ready Solutions
• Security - Defense-in-Depth
• Scalable Secure Remote Access
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Security Considerations in Converged
Plantwide Ethernet (CPwE) Architectures
ERP, Email,
Wide Area Network
(WAN)
 Logical framework
 Industrial and IT network
convergence
 Hierarchical segmentation




Scalability
Resiliency
Traffic management
Policy enforcement
 Access Controls
 Security policies

Defense-in-depth
Enterprise Zone
Levels 4 and 5
Demilitarized Zone (DMZ)
Patch Management
Terminal Services
Application Mirror
AV Server
Gbps Link
for Failover
Detection
Firewall
(Standby)
Cisco
ASA 5500
Firewall
(Active)
Industrial Zone
Site Operations and Control
Level 3
FactoryTalk Application Servers
•
•
•
•
View
Historian
AssetCentre,
Transaction Manager
Catalyst
6500/4500
FactoryTalk Services
Platform
Remote
Access
Server
• Directory
• Security/Audit
Data Servers
Demilitarized Zone (DMZ)
Cisco
Catalyst Switch
Catalyst 3750
StackWise
Switch Stack
Network Services
• DNS, DHCP, syslog server
• Network and security mgmt
Cell/Area Zones
Levels 0–2
Rockwell Automation
Stratix 8000
Layer 2 Access Switch
Drive
HMI
Controller
HMI
Controller
DIO
HMI
DIO
Cell/Area #1
Redundant Star Topology
Flex Links Resiliency
DIO
Drive
Drive
Controller
Cell/Area #2
Ring Topology
Resilient Ethernet Protocol (REP)
DIO
Cell/Area #3
Bus/Star Topology
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
17
Defense-in-Depth Security
 Comprehensive Network Security
Model for Defense-in-Depth
 Security is not a bolt-on component
 Industrial Security Policy
 Implement DMZ
 Network & Security Services
 Remote access policy with
robust & secure implementation
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
18
Security Design – the Attributes
 Principle of Least Route (PoLR)



Principle of Least Privilege applies to Applications/User level system access
PoLR applies to network connectivity restriction or “reachability.”
This means small subnets and ACLs (subnet = /29 or /28)
 Security Domain Segmentation is required (i.e. DMZs).
 VLANs are for managing traffic not security.
 Monitoring is REQUIRED



Revisits the IDS/IPS argument
Is IDS sufficient?
Is IPS appropriate for the ICS
environment? Interior? Fringe?
Don‟t forget Microsoft:
IPsec Filters via GPO, netsh, WF/ICS, WMIC, PowerShell, etc...
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Agenda and Topic List
√
 Changing Landscape of Industrial Automation
√
 Layered Security & Defense in Depth for ICS
√
 Design-for-Security
 Incident Response and Vulnerability Management
 Security in the Integrated Architecture
 Network & Security Services (NSS)
 Call to Action & Open Discussion
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Design for Security approach
Specifications
Audits & Gaps
Enhance &
Improve
Resiliency & Robustness
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
21
Vulnerability Assessment
 Review coding practices










Firmware/Patch update behavior
Password Policy (i.e. No defaults, Expiration)
Open TCP / UDP ports (Traffic Mapping)
Server Hardening Practices
SNMP Policy / Usage
Principle of Least Route
Protocol Compliance
Preparation for compliance with ISA99 / IEC62443
Evolving specifications …v1.0  v2.0
Impacts to disrupted operations at runtime
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
22
Component Level Risk Assessment
 Anti-tamper capabilities
 Authorization & Authentication
 Physical security (controller
 Role Based Access Control
key switch)
System from Vendor of choice
 CPU Lock (unauthorized
 Integration with Microsoft
access)
Active Directory (AD)
 Read/Write Tags
 Defined Constants (Persistent
Tags)
 IP & Know-how Protection
 Main Controller Function
 Source code
Blocks are not user accessible
 Custom routines
 Firmware signing
 Authenticity
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
23
Patch Management
 Are you following a structured process
for patch management for your control
system equipment?
 Where do you learn about the
availability of new patches?
 How do you build confidence that a
patch is going to work and not disrupt
your system when applied?
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
24
Microsoft Patch Management
Microsoft Patch
Qualification
for Rockwell Automation software
Whitepaper:
Why patch your
Computers?
*TechConnect support contract required
http://rockwellautomation.custhelp.com/app/answers/detail/a_id/35530
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
25
Change Control / Disaster Recovery
*note: this is a representative example.
 Uncontrolled (and controlled) change can disrupt the integrity and
availability of a system.
 All components of a system must be controlled.
 How do you protect yourself from change?
 Do you have a solid backup and disaster recovery strategy?
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
26
Scalable Secure Remote Access
Solution is Application Driven
Stand-alone Application
WAN
 Example: small manufacturer with few
automated machines
 Requires: Little to no IT, no alignment
with Industrial Security Standards
 Recommended Solution: Stand-alone
security appliance
Security
Appliance
WAN
Router
Remote Site
Plant Engineer
Machine Builder
System Integrator
Plant Site
Industrial application within a greater Enterprise
 Example: Larger manufacturer with production (industrial) and business (IT) systems integration
 Requires: IT presence, defense-in-depth requirement, alignment with Industrial Security Standards
 Recommended Solution: Rockwell Automation & Cisco Secure Remote Access solution, Rockwell
Automation Network and Security Services
WAN
It’s about policy, procedures and scalability.
One-size-does-not-fit-all.
Remote Site
Enterprise Systems
Plantwide Systems
Plant Engineer
Machine Builder
System Integrator
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
27
Product-level Security
 Source protection and high-integrity AOIs
 Data access control
Security Authority
(Domain Controller
and/or FactoryTalk
Directory)
 Trusted slot designation
 Authentication and authorization for user access control
 Security server validation at controller level
 Controller change detection
 Firmware digital signatures
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
28
Responding to Risks and Threats
• Legal, PR, product & security experts
• Coordination with government agencies
• Commands highest internal priority
RECEIVE
EVALUATE
& ASSESS
MITIGATE &
REMEDIATE
CLOSE
Communications
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
29
Executing the plan
RSLogix 5000
▼
FactoryTalk Service
RNAutility.dll
Sept 13
Sept 16
Sept 27
Oct 5
Individual FTSP
Patches released
Click me!
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
30
Security Advisory Index
Vulnerabilities, Advisories and Disclosures
 We expect them.
 We plan for them.
 We work to avoid them.
 We support our customers.
https://rockwellautomation.custhelp.com/app/utils/create_account
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
31
Security Launch & Landing Pad
http://rockwellautomation.com/security
Security
Resources
Assessment
Services
Security
Technology
w/ Security Technotes
Security
FAQ
MS Patch
Qualification
Security
Services
Reference
Architectures
Leadership &
Standards
Assessment
Services
Knowledgebase
[email protected]
Pretty Good Privacy (PGP) Public Key
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
32
Steps to Increasing Security
1. Create a Program
NOTE: This is different than an Enterprise Security Program.
“Programs” drive accountability, action and responsibility.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
33
Steps to Increasing Security (cont.)
2. Know what you have in your process
 Every control system event must be coded. EVERY ONE!
 This means that every almost network event can be predicted
 Some exceptions, like ARP, NetBIOS traffic, etc.
 If it can be predicted, it can be whitelisted and authorized via tiered
firewall rule sets and layer 3 access control lists (ACLs)
 If these can be whitelisted, other network events can be tuned for
disclosure in intrusion detection and prevention systems (IDS/IPS)
Knowing what you have in your process allows for the creation of a
defensible network architecture and response posture
REMEMBER: Security is about variable management.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Steps to Increasing Security (cont.)
3. Harden your endpoints
 Enable the security features of products implemented in the environment!
 Configure what you already have in the environment
 Most Microsoft Windows platforms now support firewalls. Use them.
 Enable Infrastructure & Application security features (Active Directory
features, etc.)
 Enable Control System software and hardware security features (key
switch, etc.)
 Through the processes developed, maintain ICS life cycle by enacting:
 Endpoint Protection updates (patches, virus definitions, host IDS/IPS
signatures, etc)
 Change and Configuration management
Variables: Good guys need to manage all of them.
The bad guys only need one variable for compromise…
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Steps to Increasing Security (cont.)
4. Audit the Environment
Design/Implementation Audits
 Configuration audits to verify end states conforms to the Conceptual
and Detailed Design projects
 Very important as “things change” during implementation
Safety Audits
 Many times required by regulation – now part of the common “culture”
Security Audits
 Many times required by regulation (depending on industry)
 Ensures proper security management going forward (i.e. hire/fire
procedures, governance and security programs, etc.)
 Security should be and will be part of the common “culture”
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Steps to Increasing Security (cont.)
5. Monitor the Systems
Si ViS PACEM, PARA BELLUM
If you wish for peace, prepare for war.
 Infrastructure: double edged sword


The purveyance of an attack (vector)
Greatest asset in digital protection (mitigation)
 Many Commercial & FOSS packages available to assist
Multi-Tier and Distributed UTM and Intrusion Detection/Prevention Systems
 Distributed packet capture, Syslog, SNMP, Nagios and various management
apps

If you wish for a stable, secure network, prepare for the day your network completely
falls apart, fails, and turns against you.
Complacency Kills–100% Vigilance is REQUIRED
Copyright © 2011 Rockwell Automation, Inc. All rights reserved.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Agenda and Topic List
√
 Changing Landscape of Industrial Automation
√
 Layered Security & Defense in Depth for ICS
√
 Design-for-Security
√
 Incident Response and Vulnerability Management
√
 Security in the Integrated Architecture
 Network & Security Services (NSS)
 Call to Action & Open Discussion
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Consulting Project Services
Security Program Development
Network & Security
Services (NSS)
Consulting Team provides
industry expertise & insight,
and supporting leadershipguidance to design and
create a complete security
deployment plan
Security
Physical
Services
Perimeter
Enforcement
Network
Computer
Application
Device
Device
Security
For help with design and deployment of security
programs or response to security incidents.
• Security Program Development & Deployment
• Security Incident Response
Reviewing customer IT security policy is part of the process – IT Policies
are used, adapted or enhanced to fit manufacturing needs.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
39
Network & Security Services Line Card
NETWORKS
SECURITY
Assess
Design Assessment
Onsite Assessment
• General
• Comprehensive
Policy, Design and Onsite Assessment
• Operational
• Risk
• Vulnerability
Plan /
Design
Network Design Development
Network Migration Development
Network Standards Development
Security Program Development
• Security Policy Development
• Security Design Development
• Business Continuity Planning
Network Installation
Network Configuration
Security Program Implementation
• Security Configuration
• Non production Penetration Testing
• Security vulnerability management & system hardening
• Security Policy Training
Network Audit
Security Audit
Network Management
• Remote Monitoring
• Incident Response
• Onsite Support
Managed Security
• Remote Monitoring
• Incident Response
• Disaster Recovery Assistance
Implement
Audit
Manage /
Monitor
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
40
Secure Remote Access Whitepapers
http://literature.rockwellautomation.com/idc/groups/lit
erature/documents/wp/enet-wp009_-en-e.pdf
http://literature.rockwellautomation.com/idc/groups/litera
ture/documents/wp/enet-wp025_-en-e.pdf
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
41
Industrial Security Resources
 Security-enhanced Products and Technologies

Rockwell Automation product and technologies with security capabilities
that help increase overall control system system-level security.

http://www.rockwellautomation.com/solutions/security/technology.html
 EtherNet/IP Plantwide Reference Architectures

Control system validated designs and security best-practices that
complement recommended layered security/defense-in-depth measures.

http://www.ab.com/networks/architectures.html
 Network & Security Services (NSS)

RA consulting specialists that conduct security risk assessments and
make recommendations for how to avert risk and mitigate vulnerabilities.

http://www.rockwellautomation.com/services/security
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
42
Security Launch & Landing Pad
http://rockwellautomation.com/security
Security
Resources
Assessment
Services
Security
Technology
w/ Security Technotes
Security
FAQ
MS Patch
Qualification
Security
Services
Reference
Architectures
Leadership &
Standards
Assessment
Services
Knowledgebase
[email protected]
Pretty Good Privacy (PGP) Public Key
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
43
Agenda and Topic List
√
 Changing Landscape of Industrial Automation
√
 Layered Security & Defense in Depth for ICS
√
 Design-for-Security
√
 Incident Response and Vulnerability Management
√
 Security in the Integrated Architecture
√
 Network & Security Services (NSS)
 Call to Action & Open Discussion
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Industrial Security 2012 & Beyond…
 It‟s about continuing Partnering & Collaboration efforts
 Users, Vendors, Researchers and Agencies
 Cooperation and coordination
 It‟s about enhancing Communication
 Needs, desires and vigilance
 Interdepartmental relationships
 Consistency and Objectivity
 It‟s about furthering Standards
 Process, Policy & Procedures (with compensating controls)
 Internal and External - emerging global standards
 Continuous Improvement (Suppliers & Users)
 It‟s about ongoing Acknowledgement and Addressing Risk
 Everybody has something to lose
 Everybody has something to protect
REMEMBER: IGNORING RISK IS NOT AN OPTION
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.
Questions?
Follow ROKAutomation on Facebook & Twitter.
Connect with us on LinkedIn.
www.rockwellautomation.com
Rev 5058-CO900B
5058-CO900C
Copyright © 2012 Rockwell Automation, Inc. All rights reserved.