Challenges 62443
Challenges 62443
2017
Martin Zappe
Business Unit Manager
Industrial Engineering
Udo Hipp
Head of Functional Safety and Agile Engineering ICS AG
BC Industrial Safety & Security Sonnenbergstr. 13
D-70184 Stuttgart
Stuttgart // 13.12.2017 1
www.ics-ag.de
Abstract
¬ In April 2016 the BSI (Federal Office for Information Security) released a study about the
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
security status of OPC UA protocol. The performed analyzes showed, that OPC UA offers a
good security level. In this context it is important to understand, that the OPC UA specification
can specify IT-security-measures which secure the related communication only. Threads which
attack e.g. the operating system have to be secured separately. Hence the engineer needs a
bouquet of balanced measures for securing his system/application. These facts lead us to the
"Challenges in Safety and Security for industrial Automation Systems" - in this session we will
describe an all-embracing engineering approach which incorporates also the system view by
the application of IEC 62443.
1
14.12.2017
Agenda
ICS AG – Profile
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
OPC UA
Basics
Level of Security
Security Measures
Risk Assessment
Recap
4
2
14.12.2017
ICS AG – Profile
¬ Facts
¬ Profile
We are an international Systems- and Software Engineering Company
ICS AG’s responsiveness to customer needs and its innovative competence centers ensure your
success
Our employees are a key asset. Most have been with us for many years
We are distinguished by a reputation for premium engineering and support quality focused on:
safety critical, mission critical, business critical Applications
ROS based on OPC UA for seamless Integration [MK] Source: M. Keinert, isw.uni.stuttgart.de
&
Platform and manufacturer independent communication
3
14.12.2017
Protocol version 1.02 on systematic errors. This analysis was divided into the following steps:
Threat analysis (analysis of the objectives and threats, analysis of threats and measures)
Analysis of the OPC UA specification in detail with an emphasis on the parts of 2, 4, 6, 7 and 12
Assessed the findings in the BSI report and initiated necessary measures
no major flaws had been detected,
Measures defined will help to improve the OPC UA Specification and
the implementations.
8
Quelle: outfit4events.de
4
14.12.2017
Source: opcfoundation.org
10
Source: opcfoundation.org
Source: outfit4events.de
5
14.12.2017
Process Level
Implementation Implementation
Level Level
11
[IT-Security Act]
6
14.12.2017
ISO 27000ff
Installation, Implementation, Operation and continous optimization
ISO
27000ff
IEC 62443
IT-Security für Industrial Automation
VDI/VDE 2182 und Control Systems
“IT-security for industrial automation -
2.1
example of use of the general model for
Req. IACS SMS
device manufacturer in factory automation“ ISO 27001/2 Profile
Inspection according to VDI 1000 - content is
transfered into IEC 62443
IEC 62443
VDI/VDE
2182
13
General
Policies &
Procedures
14
Quelle: ISA99 Committee
abgerufen am 20.01.2016
7
14.12.2017
Informative
Req. SMS
Requirements
Policies &
Procedures ISO 27001/2 Service Provider
profile
15
Quelle: ISA99 Committee
abgerufen am 20.01.2016
System
Component
16
8
14.12.2017
Requirements
Requirements
Component
Component Supplier
IT-Security as mandated asset of Dev.-Processes
17
+
integrates
Risk System
(IEC 62443-3-1, IEC 62443-3-2, IEC 62443-3-3)
System- (IEC 62443-2-4) Analysis
Integrator Subsystem 1 Subsystem 2 Additional
HW und SW
Product
implements OPC UA (IEC 62443-4-2)
Product- (IEC 62443-4-1)
System, Sub-System or Componen, e.g.:
supplier
Application Embedded Network- Plattform-
System Component Component
18
9
14.12.2017
People
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
Process
Technology
20
Source: ISA-62443-1-1
10
14.12.2017
Requirements
Foundational
Use Control (UC)
System Integrity (SI)
Technology
Partition of the
requirements
system into zones Derivation security
and conduits requirements
11
14.12.2017
12
14.12.2017
Source: https://opcfoundation-onlineapplications.org/faq/#t=SecurityBulletins.htm
26
13
14.12.2017
Identify vulnerabilities
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
Partition of the
system into zones Derivation security
Challenge is the definition of a a threat model that can be used
and conduits requirements
in cyber security risk assessment to overcome:
Identify and evaluate existing
Detailled cyber countermeasures
security risk
assessment for
- Cyclic and timely update of databases
zones and
Reevaluate likelihood and
conduits
impact
- Large amount of entries
Determine residual risk
Document and
communicate results Compare residual risk with
tolerable risk
- Linkage between CAPEC, CWE and CVE ids using a multiple
relationship
Apply additional cyber security
End countermeasures 28
14
14.12.2017
Identify vulnerabilities
Partition of the
system into zones Derivation security
Weaknesses/
and conduits requirements Vulnerabilities Threats
Identify and evaluate existing
Detailled cyber countermeasures
security risk
assessment for
zones and
Reevaluate likelihood and
conduits
impact
Document and
Determine residual risk
Consequences Likelihood
communicate results Compare residual risk with
tolerable risk
Most databases (CAPEC, CWE, CVE) and the common understanding of security challenges
are working with the three basic values Confidentiality, Integrity, Availability
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
Confidentiality,
Integrity,
Availability
30
15
14.12.2017
Common databases:
No relationship between Security Requirements and the required Security Level
SL 2 Protection against intentional violation using simple additionally: SR 1.2 (from SL 2) Identification additionally:
means with low resources, generic skills and SR 1.1 RE 1 (from SL 2) Unique and authentication of software -
moderate motivation identification and authentication processes and devices
Identify vulnerabilities
¬ System definition, high level risk assessment and the
partition of the system into zones and conduits are
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
Start Identify consequences and manual tasks on system and security Expert level
impact
System definition Determine unmitigated ¬ The detailled cyber security risk assessment on every
likelihood
component is a timeconsuming error-prone task
High level Calculate unmitigated
cybersecurity risk
(organisational) risk
assessment
Proposed solution:
Determine Security level target
¬ Use a formalized description of the system definition
Partition of the
¬ Use a tool generated threat model (CAPEC, CWE, CVE)
system into zones
and conduits
Derivation security ¬ Use a tool generated assignment of threats to components
requirements
based on the formalized system definition
Identify and evaluate existing
¬ Use consequences and impact based on CIA of the threat
Detailled cyber countermeasures model
security risk
assessment for ¬ Define a basic relationship between threat and security
zones and
conduits
Reevaluate likelihood and requirements of the 62443
¬ Calculate automatically the intermediate residual risk
impact
16
14.12.2017
Recap
33
Source: outfit4events.de
ICS AG
Thank you, for Martin Zappe
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
[email protected]
+49 172 7280 508
Sonnenbergstr. 13
D-70184 Stuttgart
www.ics-ag.de
34
17
14.12.2017
Recap
Industrial Security is the matter of the Management!
Establish a Security Officer – implement an ISMS!
35
Source: outfit4events.de
ICS AG
Thank you, for Martin Zappe
ICS AG - 13.12.2017 ROS Industrial Day – © Hipp/Zappe
[email protected]
+49 172 7280 508
Sonnenbergstr. 13
D-70184 Stuttgart
www.ics-ag.de
36
18