Revealing Net Threats Fears - Byres
Revealing Net Threats Fears - Byres
Revealing Net Threats Fears - Byres
nyone integrating automation technologies these days is well aware of the pressure on the operators of industrial plants to increase productivity, reduce costs, and share information in real time across multiple industrial and enterprise systems. Adding to these business pressures is the growing fear of cyber attack as the world has become aware that the Stuxnet worm was specically designed to disrupt an industrial process. Operators and engineers are under pressure to isolate automation systems at the same time as management is asking for greater interconnectedness. This article explains how the ANSI/ISA-99 security standards provide a framework for helping deal with network security threats that arise from the push for productivity and the fear of the next Son-of-Stuxnet worm.
1. Why the push for productivity has degraded control network security
As corporate networks have converged with industrial networks, there have been many integration projects where proprietary networks or equipment were replaced with TCP/IP networks
26
WWW.ISa.OrG
SyStem IntegratIon
and commercial-off-the-shelf equipment. This shift in technology has greatly increased the complexity and interconnectedness of control systems. As a result, they now have many of the same vulnerabilities that have plagued enterprise networks. In addition, the controllers in these networks are now subjected to new threat sources that they were never designed to handle. The result has been a signicant increase in the number of plant disruptions and shutdowns due to cybersecurity issues in the control networks at industrial facilities. The Repository for Industrial Security Incidents (RISIwww.securityincidents.org) is the worlds largest database of security incidents in control and SCADA systems. An analysis of the data from 1982 to 2009 found the type of incidents breaks down as follows: 76% of incidents were accidental in nature 24% of incidents were due to malware In our study of the incidents in the RISI database, we see problems arising from three common sources: a. Proliferation of soft targets: Control systems devices were designed with a primary focus on high-performance real-time I/O, not robust networking. Many devices will crash if they receive malformed network trafc or even high loads of correctly formed data. Also, Windows PCs in these networks often run for months at a time without security patches or antivirus updates and are susceptible to even outdated malware. b. Multiple points of entry: Even without a direct connection to the Internet, control systems are accessed by numerous means, including: Remote maintenance/diagnostics connections Shared historian and Manufacturing Execution Systems (MES) servers Serial connections Wireless systems Mobile laptops USB devices These pathways can be exploited by malware and other disruptive elements. c. Poor network segmentation: Control networks are now more complex than ever before, consisting of hundreds or even thousands of individual devices. Unfortunately, the design of many of these networks has remained at with virtually no segmentation. As a result, problems that originate in one part of the network can quickly spread to other areas.
term. Most plant operators are dependent on their equipment vendors to secure the controllers and software that they use. With the competitive pressure that most companies face to improve productivity and access to the systems and data in their plants, it is unlikely they will be able to signicantly reduce the number of internal and external pathways into their plants. However, operators can implement good network segmentation, and we address this topic in this article.
2. the fear of Stuxnet 2 and its impact on industrial control project priorities
2010 was a watershed year for industrial cybersecurity because of the identication of the Stuxnet worm and the wake-up call it has created for operators of all industrial facilities. Stuxnet has given a clear warning: Secure your control and automation systems, or the reliability and safety of your entire operation is at risk. For those of you who have not closely followed the Stuxnet story: The Stuxnet worm was discovered in June 2010 by a Belarus-based company doing business in Iran. It is a very advanced computer worm that took many man-years to create. It was designed to jump from computer to computer using human and network pathways until it found the specic, well-protected control system it was designed to destroy (most likely Irans nuclear enrichment program). Once it penetrated the facilities in Iran, Stuxnet targeted Siemens programmable logic controllers (PLCs) and human machine interfaces (HMIs). From there, it modied commands and data going to the frequency converters that regulate the speed at which centrifuges spin to enrich nuclear fuel. The worm made the centrifuges turn very quickly so they were damaged, but not destroyed. The worm also masked the changes in speed or PLC logic from being discovered at the operators control panel. At its height, Stuxnet infected an estimated 100,000 computers Fast Forward and 50 to 60 indus rISI data shows security problems arise trial control systems from three common sources: proliferation of around the world. soft targets, multiple points of entry, and poor network segmentation. Most facilities will ISa-99 introduces the concepts of zones not be subject to an and conduits as a way to segment and attack as sophisticated isolate the various sub-systems in a control as Stuxnet. However, system. the worms existence Defense in depth is multiple layers of has paved the way for defense distributed throughout the future industrial concontrol network. trol system attacks
INTECH jaNuary/fEbruary 2011 27
mitigations
There is limited opportunity for control system engineers to address the rst source in the short
SyStem IntegratIon
and abolished the concept that security by obscurity protects automation systems. As well, the detailed and public analysis of Stuxnets design has become an instruction manual for future worm developers, showing them how to attack other industrial systems.
Sub-section number and description 4.3.2.3.1: Develop the network segmentation architecture
requirement A network segmentation countermeasure strategy employing security zones shall be developed for Industrial Automation and Control Systems (IACS) devices based upon the risk level of the IACS. Any high-risk IACS zone shall be either isolated from or employ a barrier device to separate it from other zones with different security policies, levels, or risks. The barrier device shall be selected commensurate to the risk reduction required. Barrier devices shall block all non-essential communications in and out of the security zone containing critical control equipment.
zone to meet a requirement. Zone and conduit design starts with the facility being analyzed to identify groups of devices that have common functionality and common security requirements; these groups are the zones of equipment that require protection. For example, a facility might rst be divided into operational areas, such as materials storage, processing, nishing, etc. Then within these areas, it could be further divided into functional layers, such as MES, Supervisory Systems (i.e., operator HMIs), primary control systems (i.e., PLCs), and safety systems. Often, the models from other standards such as ANSI/ISA-95.00.01-2000 or the Purdue manufacturing model are used as a basis for this division. The next step is to discover the pathways in the network through which data is passed between these zones; these are the network conduits. Industrial rewalls can be installed in these conduits and congured to pass only the minimum trafc that is required for correct plant operation, blocking all other unnecessary trafc. Good network design would also suggest the rewalls should implement some kind of alarm reporting mechanism to alert operations or security personnel any time that abnormal behavior (i.e., blocked trafc) is observed in the network. This approach implements a strategy of defense in depthmultiple layers of defense distributed throughout the control networkwhich has been proven in the IT community to be a
strategy that works well. Consider how a network protected in this manner would respond to threats such as a trafc storm created by a device failure or a Son-of-Stuxnet virus. The impact would be limited by the rewalls to the specic zone in which the problem occurred, and the alarm messages from the rewalls would pinpoint the zone and even the source device where the problem originated.
a real-world example
An example from a real customer application shows how an ISA-99 zones and conduits analysis was performed in a renery to analyze the potential threat sources and develop a plan to protect the plant. A high-level network diagram of the renery is shown in Figure 2. For simplicity, only two renery operations areas (Op #1 and Op #2) are shown, but in real life, there were multiple operations. Each operation has its own basic control, safety, and HMI/supervisory systems. These systems connect to a common Process Information Network, where Historian and MES servers are accessible from the Enterprise and control networks. In addition, wireless sensors are being deployed throughout Op #2, and a Remote Access gateway is provided to permit remote maintenance on plant systems by the control system engineers. The rst step was to identify the zones of devices with common functionality and common security requirements. The next step was to identify all the conduits that exist in the plant network. The result of this analysis is
SyStem IntegratIon
shown in Figure 3. Following this analysis, the potential threat sources and consequences of an attack were identied and reviewed with the plant engineers. Through this analysis, it was evident the safety integrated system in each operational unit should be located in its own zone. To ensure continued safe plant operation, it was vital that the safety system could not be compromised from the plant control network. These were the rst zones to be protected with plug and protect security appliances.
can be installed in the control network without any changes to the design or IP addressing of the network. Some industrial security appliances can be ne-tuned for a particular purpose by installing rmware modules that implement security features, such as rewall, asset management, VPN, and content inspection of particular protocols, such as Modbus or OPC. In an ANSI/ISA-99 zones and conduits deployment, industrial security appliances would be installed in each conduit that was identied in the network. Once this is done, a rewall module can be activated in each appliance to provide the capability to lter all trafc passing through that conduit. The rewall makes it simple to build intrinsically secure networks because it automatically blocks and reports any trafc for which there is no allow rule. The control system engineer need only congure rewall rules that specify which devices in the network will be allowed to communicate through the conduit and what protocols they may use, and the industrial security appliance will block any other trafc not matching these rules.
29
SyStem IntegratIon
the multiple industrial security appliances can be managed from a single management console application.
Summary
New network and PC-based technologies introduced into control systems have provided tremendous improvements in plant performance and productivity. In 2010, the Stuxnet malware showed us sophisticated viruses targeted at industrial processes exist and are likely to be more common in the future. The impact of these two trends will be to increase the urgency and thus project priorities for cybersecurity initiatives that improve control network security and reliability. The ANSI/ISA-99 standards provide a framework for companies to achieve and maintain security improvements through a life cycle that integrates design, implementation, monitoring, and continuous improvement. System integrators and control engineers who become procient with segmenting control networks for zones and conduits, and who gain expertise with appropriate industrial security solutions, will be able to mitigate cybersecurity threats that arise from the push for productivity and Son-of-Stuxnet malware.
aBoUt tHE aUtHor
eric Byres, ISA Fellow, is a security expert and CTO of Byres Security. His e-mail is [email protected]. Byres is heading an ISA committee that will conduct a gap analysis of the current ANSI/ISA-99 standards to see if companies following this standard would have been protected from Stuxnet.
View the online version at www.isa.org/intech/20110204.
rESOurCES
Stuxnet
www.tonosecurity.com/stuxnet-central
aNSI/ISa-99.02.01
www.isa.org/link/ISA99_09
building Intrinsically Secure Control and Safety Systems
Fluke. Keeping your world up and running.
2009, 2011 Fluke Corporation. Ad 3471046A Specications are subject to change without notice.
www.isa.org/link/Build_secure
31