ot cyber security - aiche · 2018. 5. 2. · not one unified platform (windows xp, windows 7,...

40
© Yokogawa Electric Corporation OT Cyber Security Organizational challenge or Technical challenge 1 Marcel Kelder Director Advanced Solutions April, 2018

Upload: others

Post on 26-Aug-2020

3 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

OT Cyber SecurityOrganizational challenge or Technical

challenge

1

Marcel KelderDirector Advanced Solutions

April, 2018

Page 2: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

The Challenge

2

Page 3: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

What is Cyber Security

3

incident

Threats

Threats

Threats

Threats

Threats

Threats

Technology

Process

People

Prevention

Losses

Losses

Losses

Losses

Losses

Losses

Technology

Process

People

Recovery

BARRIER MANAGEMENT

Page 4: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Even a bigger challenge

4

Page 5: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

5

Introduction

Page 6: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

The different domains

6

Level 1

Level 2

Level 3

Level 4

Sensing and manipulating equipment

(e.g. instrumentation and valves)

Supervisory, control and safety systems (PCD)

Systems to integrate level 2 and 4 (MES)

Enterprise Resource Planning system (Office domain)

Level 3.5 Demilitarized Zone (DMZ)

PCD = Process Control Domain

MES = Manufacturing Execution SystemThe objectives of ISA-95 are to provide consistent terminology that is a foundation for supplier and manufacturer

communications, provide consistent information models, and to provide consistent operations models which is a

foundation for clarifying application functionality and how information is to be used.

Inte

gra

tio

n

Page 7: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

User and Information streams

7

Level 2

Level 3

Level 3.5

Level 4

Process Control Network

Process Information Network

DMZ Network

Office Network

The way information is exchanged between the different layers significantly

determines the Cyber Security Infrastructure

Users Data

Page 8: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Cyber Security for the different domains

Today integration between different domain is crucial for plant

operation

Remote services is direct related to Cyber security and nowadays

critical part of operation

Cyber security in the control & production domain L2 and L3 is

different from Cyber security in the office domain L4

Page 9: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Why is the OT domain so different

Business as usual for many years

Many different suppliers

No owner or multiple owners for Cyber security

Limited knowledge of OT Cyber security

Limited awareness for integrity and confidentiality

Not one unified platform (Windows XP, Windows 7, Windows 10)

Different levels of cyber security maturity among the suppliers

OT System performance impacts availability and/or safety

System updates by others may impact warranty or maintenance

Often no proper asset inventory

9

Page 10: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Yokogawa Plant Security Program

10

Consultancy

ServicesManaged

ServicesCyber

security

Risk Management Framework

Page 11: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Certified company and consultants

Global Industrial Cyber Security Professional (GICSP)

applies for all our OT security consultants

Certified Information Systems Security Professional

(CISSP)

Statement on Standards for Attestation Engagements

(SSAE) No. 16 (from October 2015)

ISO27001: Information security management

Page 12: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

The ISA-62443/IEC 62443 Series

12

Page 13: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

13

Typical security level (IEC 62443)

Skills Motivation Means

ICS

specificModerate

Sophisti-

cated

(Attack)

Moderate

(groups of

hackers)

Generic Low Simple

Low

(Isolated

individuals)

No attack

skillsMistakes

Non-

intentional

Employee,

contractor

Resources

ICS

SpecificHigh

Sophisti-

cated

(Campaign)

Extended

(multi-

disciplinary

teams)

SL4

SL3

SL2

SL1

Nation-state

Hacktivist,

Terrorist

Cyber crime,

Hacker

Careless

employee,

contractor

IEC 62443

Page 14: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

14

Maturity Indicator Levels

Practices have been further institutionalized and are now being

managed. Policies exist, the organization is fully risk aware and

periodic audits and reviews of all activities are in place to improve

and anticipate on new threats.

MIL4

Practices are no longer performed irregular or ad hoc, performance

of the practices is sustained over time and are well documented.

Overall performance is measured and documented .

Initial formal practices exist but may be performed in an ad hoc

manner. however they must be performed.

No formal practices exist.

MIL3

MIL2

MIL1

Page 15: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

15

Awareness

Page 16: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Awareness

16

Unconscious

Incompetence

(Start)

Conscious

incompetence

Conscious

competence

Unconscious

Competence

(Goal)

Competence

Co

ns

cio

us

ne

ss

Page 17: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Awareness training

17

Strategic(Why and when)

(Plan and Policy)

Tactical(Where and how)

(Procedures)

Operational(What)

(Tasks)

Leadership

Cyber

Security

Awareness

training

Practical

Cyber

Security

Awareness

training

Page 18: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

18

Risk Assessments

Page 19: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Stages of maturity scale

Risk management

controls are not

identifiable in

operational

practice

Risk management

controls are

implemented

ad hoc and

disorganized

Risk management

controls follow

regular pattern

but are not

documented

19

Risk management

practices are

documented and

understood by

workers

Risk management

process is

continuously

monitored and

measured

Organizational

change is

systematically

factored into risk

control

Stage 1

Absent

Stage 2

Low

Stage 3

Moderate

Stage 4

Contained

Stage 5

Managed

Stage 6

Optimized

The practical Risk Management Framework process is executed in six

phases, the first two of which involve the establishment of a formal

security framework that is based on the setting of the boundaries of

control and the definition of a security control set.

Page 20: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Vulnerabilities versus Risk

Risk = Likelihood * Impact

Risk = Threat * Vulnerability * Asset

Risk = ((Vulnerability * Threat)/CounterMeasure) * AssetValueatRisk

20

Page 21: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Types of risk assessment

Asset Risk Assessment

Goal is detect the vulnerabilities related to the assets (e.g. end point security, user

access, network security etc.) and determine the OT security base line. The

assessment is focused on technology.

It is a benchmark of the types and size of potential vulnerabilities, which could have

a significant impact on asset and organization.

It must be emphasized that the baseline is an initial risk assessment that focuses on

a broad overview in order to determine the risk profile to be used in subsequent risk

assessments and/or next step of the OT security program.

The outcome is a risk profile with a clear description of the identified risks

Operational Risk Assessment

Goal is to assess the operational effectiveness of identifying, analyzing and respond

to risk in the OT domain. The assessment is focused on organization and

processes.

Similar to the Asset Risk Assessment, initially it is a benchmark to determine the

base line.

The outcome is a risk profile with a clear description of the identified risks

21

Page 22: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Infrastructure Readiness Assessment

Inventory (asset) management

Nodes connected to the network

Installed software and versions

Physical Security assessment

Network Security assessment

Network Architecture

Firewalls

Routers & Switches

Remote Access

Host Based Security assessment

Antivirus Management

Patch Management

System Hardening

Disaster Recovery assessment

22

Physical Security

Network Security

Host Based Security

Application Based Security

Disaster Recovery

Page 23: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

ITIL Process

23

Incident

Management

Problem

Management

Change

Management

Release

Management

Configuration

Management

Help

desk

Page 24: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Assessment report

Deliverables:

Score card

Site report with findings and recommendations

24

0

1

2

3

4

5

Security Procedures

Physical Security

Network architectureNetwork Security

Host based security

0

1

2

3

4

5

Incident Management

Problem

Management

Change ManagementRelease Management

Configuration

Management

OperationsIncident Management

Problem Management

Change Management

Release Management

Configuraiton Management

Physical SecurityEnvironment

User Access Policy

Network ArchitectureNetwork levelling

Network Zoning

Network SecurityFirewall

Routers & Switches

Legacy Devices

Network Management

Host Based SecurityAntivirus Management 2.4

Patch Management 1.0

System Hardening 1.5

Backup and Disaster Recovery 1.5

`Remote access

1.5

2.8

2.7

2.1

1.6

Page 25: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Types of risk assessment

Business Risk Assessment Goal is to identify risk with respect to information security between the IT domain and the

OT domain.

The main information streams between the IT and OT domain are analyzed in accordance

with the three security objectives; Confidentiality, Integrity, and Availability

The potential CIA impact values are determined by using the values low, moderate, high or

not applicable.

25

CMMSData

Historian

SchedulingLIMS

DCS Tank

Gauging

Energy

Monitoring

ERP Planning HSE

IT Domain

OT Domain

Information streams

Information

stream

Security category Comment

C I A

Accounting

Environmental

reporting

Planning &

Scheduling

Logistics

Page 26: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Security Objectives

CONFIDENTIALITY

Preserving authorized restrictions on information access and disclosure,

including means for protecting personal privacy and proprietary information

➢ A loss of confidentiality is the unauthorized disclosure of information

INTEGRITY

Guarding against improper information modification or destruction, and

includes ensuring information non-repudiation and authenticity

➢ A loss of integrity is the unauthorized modification or destruction of information

AVAILABILITY

Ensuring timely and reliable access to and use of information➢ A loss of availability is the disruption of access to or use of information or an information

system

26

Page 27: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Potential impact on organization and business

The potential impact is LOW if:

The loss of confidentiality, integrity, or availability could be expected to have

a limited adverse effect on organizational operations, assets, or individuals.

The potential impact is MODERATE if:

The loss of confidentiality, integrity, or availability could be expected to have

a serious adverse effect on organizational operations, assets, or

individuals.

The potential impact is HIGH if:

The loss of confidentiality, integrity, or availability could be expected to have

a severe or catastrophic adverse effect on organizational operations,

assets, or individuals.

27

Page 28: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Categorization of Information Types

SC information type = {(confidentiality, impact), (integrity,

impact), (availability, impact)}

where the acceptable values for potential impact are LOW, MODERATE,

HIGH, or NOT APPLICABLE

SC information system = {(confidentiality, impact), (integrity,

impact), (availability, impact)}

where the acceptable values for potential impact are LOW, MODERATE,

HIGH, or NOT APPLICABLE

Examples:

SC control system = {(confidentiality, LOW), (integrity, HIGH),

(availability, HIGH)}

SC historian system = {(confidentiality, moderate), (integrity, HIGH),

(availability, moderate)}

28

Page 29: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Baseline Risk Assessment

The overall OT security baseline risk management provides the

understanding of the actual and potential risks to asset, people and

processes. This information is useful in determining the next step in the

OT security program. Next step could be:

Determine and prioritize the policy statements

Determine and prioritize the security countermeasures

Input to the OT security business case

29

Base line

Business

Assessment

Operational

Assessment

Asset

Assessment

Page 30: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

30

Policy, Procedures,

Business Case and

Design Principles

Page 31: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Management Structure

31

System

A

System

B

System

C

System

D

System

E

Site 1 Site 2

Helpdesk Infrastructure

Monitoring Controlling Optimizing Reporting

Organization

Responsibility

Audit

Responsibility

Policy

Commitment

Leadership

Strategic

Policy

Tactical

Procedures

Operational

Work instructions

Procedures

Page 32: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Policy

[Wiki] A policy is a deliberate system of principles to

guide decisions and achieve rational outcomes. A

policy is a statement of intent, and is implemented as

a procedure or protocol. Policies are generally

adopted by a governance body within an

organization.

Policies are clear, simple high level statements of

how your organisation intends to conduct its

services, actions or business.

Page 33: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Typical Cyber security policy content

33

Function Category

What processes and

assets need protection?Identify

Asset Management

Business Environment

Governance

Risk Assessment

Risk Management Strategy

What safeguards are

available?Protect

Access Control

Awareness and Training

Data Security

Information Protection Processes & Procedures

Maintenance

Protective Technology

What techniques can

identify incidents?Detect

Anomalies and Events

Security Continuous Monitoring

Detection Processes

What techniques can

contain impacts of

incidents?Respond

Response Planning

Communications

Analysis

Mitigation

Improvements

What techniques can

restore capabilities?Recover

Recovery Planning

Improvements

Communications

Page 34: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Procedures

A Procedure is based and related to a Policy and its

deliverables.

[Wiki] A procedure is a document written to support a

"policy directive". A procedure is designed to describe

Who, What, Where, When, and Why by means of

establishing corporate accountability in support of the

implementation of a "policy".

Page 35: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Design Principles

35

Design principles are sets of generally guidelines and design

considerations, all of which reflect the accumulated policies and

procedures. They serve as a starting point for detail design.

Level 2

Level 3

Level 3.5

Level 4

Process Control Network

Production Information Network

DMZ Network

Office Network

Firewall

Firewall

WSUSAntiVirus

RemoteAcces

DomaincontrollerBack up

NMSWSUSAntiVirus

IntrusionDetection

HMI HMI ENG

WSUS : Windows Server Update Services

NMS : Network Monitoring StationHMI : Human Interface Station

ENG : Engineering Station

Log fileserver

Page 36: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Business case for OT security

The business case is a translation of the risk assessment and

policies into a proposal to senior management for budget to

implement the total OT program

Typical content for an OT security business case

Executive summary➢ Summary for senior management

Recommendations➢ Provide a recommendation for solving the business and operational needs/problems

Business and operational needs➢ Analysis of the Business and operational needs in relation to the identified risks

Solution Analysis

➢ Summary of the different OT security solutions including the CAPEX and OPEN costs

Available Options

➢ Alternative solutions or example outsourcing of services

36

Page 37: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

OT security program

37

Kick Off Meeting Workshops

Drafting of Document(s)

Intermediateversion for

review

Final review meeting

Final set of documents

Kick off Meeting

WorkshopsDrafting of

Document(s)

Intermediateversion for

review

Final review meeting

Final set of documents

Business

Case

Policies

Procedures

Project Intro Definition Project Goal Organization RASCI Schedule

Kick Off Meeting

WorkshopsDrafting of

Document(s)

Intermediateversion for

review

Final review meeting

Final set of documents

Kick off

Meeting

Risk

Assessment

Drafting of

Report(s)

Intermediate version for

review

Final review meeting

Final set of reportsAssessment

Kick off Meeting

WorkshopsDrafting of Design(s)

Intermediateversion for

review

Final review meeting

Final set of documentsDesign

Page 38: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

38

Managed services

Page 39: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

© Yokogawa Electric Corporation

Managed Services

Requirement Yokogawa Managed Service

Asset Inventory Automated asset discovery and asset inventory

O.S. Security patching Automated distribution of validated Microsoft updates

Anti-Virus Management & Updates Automated distribution of validated signature updates

Intrusion detection and prevention In-line deep packet inspection of inbound and outbound network traffic

Remote Access Unified secured remote access, with 2 factor authentication

Log file collection Automated log file collection to central log server

Traffic monitoring Active alerting and proactive blocking of unauthorized communication

Security majority reporting Automated report of the status of the applied security measures

Proactive system monitoring CPU, Memory load, Disk usage, system and software failures

24x7x365 supported Helpdesk and managed services

Incident response Global security incident response team

39

Page 40: OT Cyber Security - AIChE · 2018. 5. 2. · Not one unified platform (Windows XP, Windows 7, Windows 10) Different levels of cyber security maturity among the suppliers OT System

| V2016 | April 2016 |

© Yokogawa Electric Corporation

40