SIS Cybersecurity
SIS Cybersecurity
SIS Cybersecurity
IDC TECHNOLOGIES
2nd Safety Control Systems & Hazardous Areas
Conference
Auckland, New Zealand
Tuesday 22nd – Wednesday 23rd August 2017
Session Five
Practical Cyber Security for Safety Instrumented
Systems
Peter Jackson
Senior Systems Engineer – ECL Engineering Control
Abstract
Cyber attacks on a DCS/PLC/SCADA systems can lead to serious
consequences. The consequences on SIS can be even more significant.
International best practice as defined by IEC/ISA standards requires that the
cyber security level needs to provide more risk reduction than required safety
integrity level for SIF to be effective. Proper management of ICS Cyber Security
is key to mitigating the risks of a security breach of an SIS. This paper outlines
10 steps to help defend against targeted and non-targeted threats:
1. Cyber Security Management
2. Asset Inventory
3. Network Segmentation
4. Secure Access
5. Role-Based Access & Logging
6. Password Policy
7. Device Hardening
8. Personnel & Training
9. Involve Management
10. Detect & Response Plan
Disclaimer
It is acknowledged that even well-defended organisations may experience a
cyber incident at some point. This paper cannot, and does not, offer any
insurance against such incidents. Organisations are urged to seek professional
advice in addressing the risks identified here.
Introduction
Included in the new revision of IEC 61511 are requirements to identify security
threats and provide reliance against identified security risks. This paper will
outline practical techniques in accordance with best practice to ensure that the
safety instrumented system will function effectively despite increased risk in the
21st century. Air-gaps and firewalls only provide limited protection. An
intentionally or unintentionally comprised SIS could result in reduced process
Use of this type of structure allows multiple layers of protection, ensuring that if
a breach occurs in the enterprise network, there is still protection in place for the
lower levels including application network, control systems network and safety
systems network. For more information on this architecture, see the SANS
Institute: Secure Architecture for Industrial Control Systems paper [8].
In implementing appropriate network segregation, organisations will likely come
across a meeting between information technology (IT) and operational
technology (OT). IT personnel are typically responsible for operation and
maintenance of infrastructure in the enterprise network (Purdue level 4+). OT
personnel are typically responsible for operation and maintenance of
infrastructure in the control systems network (Purdue level 3-). Some of the
conflicts between IT and OT are shown in table 1:
• Level 4+ • Level 3-
• Servers/PCs • All configurable devices
• People focus • Device focus
• Lifetime 3-5 years • Lifetime 15-20 years
• Server focus • End-point focus
• Confidentiality and integrity focus • Safety and availability focus
Table 1 – IT vs OT
This conflict between IT and OT should be managed by ensuring that IT and OT
representatives form a part of the cyber security team. Policies and procedures
should clearly outline roles and responsibilities so that effect cyber security
management can take place. For more information on IT vs OT, see the Nex
Defense: IT OT Convergence Whitepaper [9].
4. Secure Access
Ensure that access to all ICS assets is restricted as much as practicable. This
includes physical security to server rooms, control rooms, configuration
workstations and plant areas. After-hours access should only be provided to
those with a genuine need. Workstations should have a screen saver requiring
a password to unlock to prevent unauthorised access (a continuously manned
control room being the exception). Only authorised workstations (including
laptops) should have access to the ICS network – these should have up to date
anti-virus and operating system security patches. Utilise managed network
switches for the ICS network, turning off unused ports and triggering an alert
when port status changes. Where remote access is required, ensure a thorough
risk assessment is completed and risks managed out as part of the design and
implementation, including the use of VPN encryption. Use secure protocols
where possible for configuration, access and management.
5. Role-Based Access & Logging
Where ICS systems have user management capabilities, implement role-based
access control, ensuring that end users only have access to the applications and
services they need to carry out their role. Named logins (Joe Bloggs not User1
or Administrator) ensure that user accounts can be enabled/disabled as team
members come and go without changing a shared password every time or
accepting residual risk. Furthermore, Joe may think twice about making
unauthorised changes if he knows his actions have been logged. Ensure that all
activities are logged in a separate log management location (to make it harder
for threat actors to remove traces of their attack) and reported to support
personnel to take appropriate action.
6. Password Policy
Consider your password policy. Short/simple passwords allow easy cracking via
a brute force attack whereas longer passwords are harder to remember. Unique
passwords can be difficult to manage unless a password manager is utilised. If
a password manager is used, ensure that the passwords are stored securely and
only on the client-side. Ensure that any new devices added to the ICS have
default accounts/passwords changed or removed as part of commissioning to a
unique password which is held securely and then used to set up role-based
access if possible. Log password failure attempts to detect attempts at
unauthorised access and implement account lock-out if this is feasible and report
to support personnel to take appropriate action.
7. Device Hardening
Ensure that devices are made as secure as possible. For servers and
workstations, implement anti-virus and operation system patching. Consider the
benefits and risks of automated vs manual scheduled patching for these
systems. Ensure that the anti-virus solution includes some form of proactive
threat detection so that malware that doesn’t match an identified virus signature
can still be blocked. Register with vendors to get the latest firmware for all
devices – many firmware updates are released because of security
vulnerabilities that have been identified and published. This could be a ‘low