security & privacy architecture design (spade) · security and privacy architecture design use...

24
SEGRID Summit (Schiphol) Security & Privacy Architecture DEsign (SPADE)

Upload: others

Post on 02-Jun-2020

9 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

SEGRID Summit (Schiphol)

Security & Privacy

Architecture DEsign

(SPADE)

Page 2: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• Security and privacy architecture

Structured and modular composition of interconnected, possibly depending

and cooperating, security and privacy mechanisms and technologies.

• Motivation

Secure the IT infrastructure of smart grid use cases

Ensure mitigation of security risks and acceptable performance

• Goal

Iterative process to define adequate security and privacy architectures

Architectures must be use-case-specific and fulfill related requirements

Page 3: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

Use Case

Security and

privacy goals

Functional description

of IT infrastructure

Prioritized

security &

privacy risks

Selected security

controls & privacy

design tactics

Risk Treatment Plan

Page 4: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

Use Case

Security and

privacy goals

Functional description

of IT infrastructure

Best practices and

design patterns

Prioritized

security &

privacy risks

Selected security

controls & privacy

design tactics

Risk Treatment Plan

Catalogue of security and privacy

solutions, mechanisms and technologies

Page 5: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

Use Case

Security and

privacy goals

Functional description

of IT infrastructure

Best practices and

design patterns

Security and Privacy

Architecture

• Mitigated risks and vulnerabilities

• Fulfilled security and privacy goals

• Sustainable performance and costs

Prioritized

security &

privacy risks

Selected security

controls & privacy

design tactics

Risk Treatment Plan

Catalogue of security and privacy

solutions, mechanisms and technologies

Page 6: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• SPADE

S&P Architecture DEsign process

Output: Use-case-specific architecture

Fulfillment of security and privacy goals

• Three distinct phases

“Design”, “Check”, “Evaluation”

Possible iteration among phases

• Flexible and adaptable

Improve already existing architectures

Design architectures for different systems

Page 7: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• Mapping with the Risk Management process

SPADE starts at the end of the Risk Treatment phase

• Input from Risk Management

List of prioritized risks

Risk treatment plan

(contains intended security controls)

• SPADE lifetime and roles

Directly cover steps 5-7 of Risk Management

Determine how to implement the selected

security controls from the risk treatment plan

Test solutions and evaluate residual risks

Page 8: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• Goal

Analysis & synthesis of SPADE inputs

Build a first preliminary security and privacy architecture

• Considered input

Specific use case – Functional component and communication flows

Cost and performance requirements – Maximum costs and minimum performance

Security and privacy goals – Information and system assets

Prioritized risks and required security controls – From the early risk assessment

Adversary model – Capabilities, available information, available resources

Best practices and design patterns – Guidelines and approaches

Security and privacy controls, mechanisms and technologies

→ Design

Page 9: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

→ Design

Trusted third parties

Key Managers

Aggregation entities

Logging entities

SEGRID partners

have developed

novel security solutions

on these areas

Catalogue of

security and privacy

solutions, mechanisms

and technologies

Secure

communication protocols

Secure platforms

Secure resource

discovery

Management

console interface

Security life-cycle

management interface

Transparency and control

user interface

Redundancy

infrastructure

Resilient communication

infrastructure

Monitoring and Intrusion

Detection Systems

Page 10: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

→ Design

Security and Privacy Architecture DEsign

Page 11: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• Step 0 – Consider the identified risks

Produced as part of the SEGRID Risk Assessment process

Prioritized and along with required security and privacy controls

• Step 1 – Consider the specific use case

Actual scenario and IT infrastructure

Interconnected components

Related information and communication flows

• Step 2 – Define a trust boundary

Partition the use case scenario into two portions (based on goals and risks)

Everything above/beyond is out-of-scope and not (required to be) addressed

Everything below/within is in-scope and to be secured by SPADE

→ Design (analysis and synthesis)

Page 12: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• Step 3 – Select the security and privacy solutions

Goal: produce a secure version of the use case

Based on trust boundary, prioritized risks and list of security controls

For each pair <Risk, Treatment Actions>

Select and combine mitigating security controls, based on the treatment actions

Justify why the chosen controls are good to address the risk

Justify how the chosen controls relate to each other and the use case

Justify how interdependencies/conflicts between controls are addressed

• Step 4 – Tune and refine the security solutions

Fine tuning of controls, mechanisms and technologies

Part of a high-level validation evaluation, before the proper Check phase

→ Design (analysis and synthesis)

Page 13: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and privacy architecture

• Goal

Verify that the preliminary architecture fulfils security and

privacy requirements, as well as design criteria

• Considered aspects

Security and privacy goals satisfactorily fulfilled

Expected maximum costs not exceeded

Risk and threat mitigation – Acceptable residual risks

Vulnerability analysis – E.g. securiCAD tool

• Possible steps back

Redesign the preliminary security and privacy architecture

Perform a new Threat and Vulnerability Risk Assessment

→ Design → Check

Page 14: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

→ Design → Check

Security and Privacy Architecture DEsign

Page 15: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and privacy architecture

• Goal

Carry out extensive practical tests

Assess overall functionality and performance

• Considered means

Experimental tests on real hardware and testbed

Simulation software and other assessment tools

• Possible outcomes

Required major changes, through a new design

Required minor performance improvements, before evaluating again

Final security and privacy architecture ready for implementation and deployment

→ Design → Check → Evaluation

Page 16: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

→ Design → Check → Evaluation

Security and privacy architecture

Page 17: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

• Example on SEGRID Use case 2 – Scenario 2

Load balancing renewable energy centrally

Balancing MV renewable energy centrally

• Focus on the SPADE Design phase

The outcome is the preliminary security and privacy architecture

Purely illustrative example (outcomes may likely be more complex)

Page 18: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

DERSecondary substation

Primary substation

SCADA

Switch

DataConcentrator

IED

Energy Supplier

Use case 2 - Scenario 2

RTU

.. ..

.

IED IED

RTU

IED IED

RTU

kWh meter kWh meter

Fixed WAN(e.g. fiber)

Mobile network(e.g. GPRS, LTE)

DSOBack end

Remote ElementManagement

TSOHW/SW vendor

DSO sIT

Mobile network(e.g. GPRS, LTE)

PLCnetwork

...

Page 19: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

DERSecondary substation

Primary substation

SCADA

Switch

DataConcentrator

IED

Energy Supplier

Use case 2 - Scenario 2

RTU

.. ..

.

IED IED

RTU

IED IED

RTU

kWh meter kWh meter

Fixed WAN(e.g. fiber)

Mobile network(e.g. GPRS, LTE)

DSOBack end

Remote ElementManagement

TSOHW/SW vendor

DSO sIT

Mobile network(e.g. GPRS, LTE)

PLCnetwork

Trust boundary

Outside scope

...

Page 20: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

DERSecondary substation

Primary substation

SCADA

Switch

DataConcentrator

IED

Energy Supplier

Use case 2 - Scenario 2

RTU

.. ..

.

IED IED

RTU

IED IED

RTU

kWh meter kWh meter

Fixed WAN(e.g. fiber)

Mobile network(e.g. GPRS, LTE)

DSOBack end

Remote ElementManagement

TSOHW/SW vendor

DSO sIT

Mobile network(e.g. GPRS, LTE)

PLCnetwork

Trust boundary

Outside scope

...

Security and Privacy Architecture DEsign

Example of Prioritized Risks & Risk Treatment Plan

UKR

2016

Attackers deliver malware launcher to the SCADA zone of

the Utility. The launcher has been programmed with

knowledge of the RTU protocols used by the utility. The

launcher issues commands according to protocol standards

to open high voltage breakers which creates blackouts in

part of a major city of the attacked country

Possible Very high Critical

FR 3: Data integrity - Ensure the integrity of the

IACS to prevent unauthorized manipulation.

FR 7: Resource availability - Ensure the

availability of the control system against the

degradation or denial of essential services.

UKR

2015

Attackers leverage legitimate credentials to obtain access

to three DSOs, use remotely operated breakers to

disconnect power, and wipe additional systems using

KillDisk malware at the end of the attack. Corruption of

firmware of serial-to-ethernet devices at substations, and

follow-up attacks to interfere with restoration efforts.

Possible Very high Critical

FR 3: Data integrity - Ensure the integrity of the

IACS to prevent unauthorized manipulation.

FR 5: Restrict data flow

UC2_Tn

Denial of Service attack on the WAN causing the

commnication between primary substation and SCADA to

be interrupted.

Possible Medium Major

FR 7: Resource availability - Ensure the availability

of the control system against the degradation or

denial of essential services.

SR 7.2 – Management of network resources

… ... … … … ...

Risk Treatment -

Selected Security ControlsID Threat Impact RiskLikelihood

Page 21: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

SDN Controller

SCADA Zone

DERSecondary substation

Primary substation

Switch Data Concentrator

IED

Energy Supplier

Use case 2 - Scenario 2

RTU

..

.

IED IED

RTU

IED IED

RTU

kWh meter kWh meter

Fixed WAN(e.g. fiber)

Mobile network(e.g. GPRS, LTE)

DSOBack end

Remote ElementManagement

TSOHW/SW vendor

DSO sIT

PLCnetwork

Master

Frontend Frontend Frontend

Switch

SwitchSDN Controller

Engineering Zone

Switch

Master Master

Trust boundary

PS PS PS

PS

PS PS

Key Manager

Intrusion Detection

System

ResilientSCADASystem

Office Zone

AMI ZoneSCADA

Zone

PS Platform securitySecure storageProcess isolation

Platform integrity

Secure Communication

Network Segmentation

PS PS PS

PS PS PS

Key Manager

PKI

PS

PS

Mobile network(e.g. GPRS, LTE)

Outside scope

kWh meter

PS

Group Manager

...

Zone Zone

Zone

PSPS

PS

Note: to support secure communication

Page 22: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

SDN Controller

SCADA Zone

DERSecondary substation

Primary substation

Switch Data Concentrator

IED

Energy Supplier

Use case 2 - Scenario 2

RTU

..

.

IED IED

RTU

IED IED

RTU

kWh meter kWh meter

Fixed WAN(e.g. fiber)

Mobile network(e.g. GPRS, LTE)

DSOBack end

Remote ElementManagement

TSOHW/SW vendor

DSO sIT

PLCnetwork

Master

Frontend Frontend Frontend

Switch

SwitchSDN Controller

Engineering Zone

Switch

Master Master

Trust boundary

PS PS PS

PS

PS PS

Key Manager

Intrusion Detection

System

ResilientSCADASystem

Office Zone

AMI ZoneSCADA

Zone

PS Platform securitySecure storageProcess isolation

Platform integrity

Secure Communication

Network Segmentation

PS PS PS

PS PS PS

Key Manager

PKI

PS

PS

Mobile network(e.g. GPRS, LTE)

Outside scope

kWh meter

PS

Group Manager

...

Zone Zone

Zone

PSPS

PS

Note: to support secure communication

UKR

2016

Attackers deliver malware launcher to the SCADA zone of

the Utility. The launcher has been programmed with

knowledge of the RTU protocols used by the utility. The

launcher issues commands according to protocol standards

to open high voltage breakers which creates blackouts in

part of a major city of the attacked country

Possible Very high Critical

FR 3: Data integrity - Ensure the integrity of the

IACS to prevent unauthorized manipulation.

FR 7: Resource availability - Ensure the

availability of the control system against the

degradation or denial of essential services.

Risk Treatment -

Selected Security ControlsID Threat Impact RiskLikelihood

Novel security solutions

• Resilient SCADA systems

Cost

Assessment

Page 23: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

Security and Privacy Architecture DEsign

SDN Controller

SCADA Zone

DERSecondary substation

Primary substation

Switch Data Concentrator

IED

Energy Supplier

Use case 2 - Scenario 2

RTU

..

.

IED IED

RTU

IED IED

RTU

kWh meter kWh meter

Fixed WAN(e.g. fiber)

Mobile network(e.g. GPRS, LTE)

DSOBack end

Remote ElementManagement

TSOHW/SW vendor

DSO sIT

PLCnetwork

Master

Frontend Frontend Frontend

Switch

SwitchSDN Controller

Engineering Zone

Switch

Master Master

Trust boundary

PS PS PS

PS

PS PS

Key Manager

Intrusion Detection

System

ResilientSCADASystem

Office Zone

AMI ZoneSCADA

Zone

PS Platform securitySecure storageProcess isolation

Platform integrity

Secure Communication

Network Segmentation

PS PS PS

PS PS PS

Key Manager

PKI

PS

PS

Mobile network(e.g. GPRS, LTE)

Outside scope

kWh meter

PS

Group Manager

...

Zone Zone

Zone

PSPS

PS

Note: to support secure communication

UC2_Tn

Denial of Service attack on the WAN causing the

commnication between primary substation and SCADA to

be interrupted.

Possible Medium Major

FR 7: Resource availability - Ensure the availability

of the control system against the degradation or

denial of essential services.

SR 7.2 – Management of network resources

Likelihood Impact RiskRisk Treatment -

Selected Security ControlsID Threat

Novel security solutions

• Resilient communication infrastructure

Page 24: Security & Privacy Architecture DEsign (SPADE) · Security and Privacy Architecture DEsign Use Case Security and privacy goals Functional description of IT infrastructure Best practices

SEGRID Summit

Thank you!