PCIC Europe 2017 Cyber Security Tutorial Energy Automation and Iec 62443
PCIC Europe 2017 Cyber Security Tutorial Energy Automation and Iec 62443
PCIC Europe 2017 Cyber Security Tutorial Energy Automation and Iec 62443
Agenda
Realization Approaches
2 PCIC EUROPE
Why Cyber Security?
Statements from the MIT report on the
right (issued in March 2017)
3 PCIC EUROPE
Why Cyber Security?
4 PCIC EUROPE
Cyber Security: Factors for Threat Consideration
5 PCIC EUROPE
Protection Goals
Availability
Property of being
accessible and usable
upon demand by an
authorized entity
Definitions from ISO/IEC27000:2012
6 PCIC EUROPE
Areas of Conflict
Office IT Industrial OT
Automated patching,
up-to-date patch level Frequent patching tough,
feasible conflicts with availability
Secure
Available
Performance impact of
System
Anti-Virus solution
Malware protection
is common
SW support
over long lifetime
User locked out: annoying,
but easy to recover
Operator locked out:
(regular procedures)
may harm people,
or damage plant
7 PCIC EUROPE
How realistic are cyber security threats today?
8 PCIC EUROPE
Basic steps of the Ukraine power grid attack
9 PCIC EUROPE
But where to find good approaches to secure deployments?
• Percentage of ICS-CERT
FY 2014 and FY 2015
incidents potentially
mitigated by each strategy
10 PCIC EUROPE
Tutorial Agenda
Agenda
Realization Approaches
11 PCIC EUROPE
Capabilities based on risks within the organization
Secure Vulnerability
Organizational Secure Secure
Integration and and Incident
Preparedness Development Operation
Service Handling
12 PCIC EUROPE
Cyber security standards target different areas and roles
13 PCIC EUROPE
Selected Key Security Standards for Energy Automation
Key
Standards
• IEC 62443
(System Security)
• IEC 62351
(Communication
Security)
• ISO/IEC 27001/27019
(Security Management)
14 PCIC EUROPE
ISO 27000 Definitions
„Management System“
15 PCIC EUROPE
Information Security Management System (ISMS)
ISO/IEC 27001:
Information Security Management System
16 PCIC EUROPE
ISO/IEC 27000 Framework overview (selected parts)
Vocabulary 27000
standard Overview and vocabulary
27001 27006
Requirement
ISMS Family of standards
27002
27005
Code of practice for information security
Information security risk management
controls
27004
Information security management -
Measurement
27019
Sector- Information security management
guidelines based on ISO/IEC 27002 for
specific process control systems specific to the
energy utility industry
17 PCIC EUROPE
Security Standards – Structuring based on the Role
Asset
Owner operates and maintains Operational policies and procedures
Service
Provider Maintenance policies and procedures
+
System designs and deploys Automation solution
Basic Process Safety Complementary
Integrator Control System Instrumented Hardware and
(BPCS) System (SIS) Software
Control System
Product develops as a combination of components
Supplier Embedded Network
devices components
Host
devices Applications
18 PCIC EUROPE
The IEC-62443 Framework of Security Standards: Covering all areas
IEC / ISA-62443
General Policies and procedures System Component
1-1 Terminology, concepts 2-1 Requirements for an 3-1 Security technologies for 4-1 Product development
and models IACS security management IACS requirements
system Ed.2.0
1-2 Master glossary of terms Profile of 4-2 Technical security
3-2 Security risk assessment requirements for IACS
and abbreviations ISO 27001 / 27002
and system design products
1-3 System security 2-3 Patch management in the 3-3 System security
compliance metrics IACS environment requirements and security
levels
2-4 Requirements for IACS IS* 08/2013
solution suppliers
IS* 06/15
Definitions Requirements placed on security Requirements to achieve a Requirements to secure system
Metrics organization and processes of secure system components
the plant owner and suppliers
Functional requirements Processes
19 PCIC EUROPE
IACS, automation solution, control system
Asset
Operational policies and procedures 2-1
Owner operates and maintains
Service 2-3
Maintenance policies and procedures 2-4
Provider
+
System designs and deploys Automation solution 2-4
Basic Process Safety Complementary
Integrator Control System Instrumented Hardware and
(BPCS) System (SIS) Software 3-3
IACS environment / project specific
is the base for
Control System
Product as a combination of components 3-3
develops 4-1
Supplier Embedded Network Host Applications
devices components devices 4-2
20 PCIC EUROPE
IEC 62443: Product Supplier View
Secure development
process covering the
IEC / ISA-62443
product development
General Policies and procedures System Component
lifecycle
1-1 Terminology, concepts 2-1 Requirements for an 3-1 Security technologies for 4-1 Product development
and models IACS security management IACS requirements
system Ed.2.0
1-2 Master glossary of terms Profile of 4-2 Technical security
3-2 Security risk assessment requirements for IACS
and abbreviations ISO 27001 / 27002
and system design products
Functional
1-3 System security 2-3 Patch management in the 3-3 System security
compliance metrics IACS environment requirements
requirements and security
levels
to the
2-4 Requirements for IACS product components
IS* 08/2013
solution suppliers Products consider
IS* 06/15 functional system
Definitions Requirements placed on security
Provide security Requirements
requirementsto achieve a Requirements to secure system
Metrics organization and processes of
documentation, secure system components
the plant owner and suppliers
operational guidelines
Functional requirements Processes
21 PCIC EUROPE
IEC 62443: System Integrator View
IEC / ISA-62443
General Policies and procedures System Component
1-1 Terminology, concepts 2-1 Requirements for an 3-1 Security technologies for 4-1 Product development
and models IACS security management IACS requirements
system Ed.2.0
1-2 Master glossary of terms Profile of 4-2 Technical security
3-2 Security risk assessment requirements for IACS
and abbreviations ISO 27001 / 27002
and system design products
1-3 System security 2-3 Patch management in the 3-3 System security
compliance metrics IACS environment requirements and security
levels
2-4 Requirements for IACS SolutionIS*
meets
08/2013
solution suppliers functional
IS* 06/15
Provide Security requirements
Definitions Requirements placed on security Requirements
as a wholetosystem.
achieve a Requirements to secure system
Metrics documentation,
organization apply of
and processes secure system components
secure
the policies
plant owner and
and suppliers
System components fit
procedures during secure design
Functional requirements Processes
integration
22 PCIC EUROPE
IEC 62443: Asset Owner View
IEC / ISA-62443
Security management
General Policies and procedures
process of the asset owner System Component
1-1 Terminology, concepts 2-1 Requirements for an 3-1 Security technologies for 4-1 Product development
“Profile” of ISO
and models
27000 IACS requirements
IACS security management
system Ed.2.0
1-2 Master glossary of terms Profile of 4-2 Technical security
3-2 Security risk assessment requirements for IACS
and abbreviations ISO 27001 / 27002
and system design products
1-3 System security 2-3 Patch management in the 3-3 System security
compliance metrics IACS environment requirements and security
levels
2-4 Requirements for IACS
Solution IS* 08/2013
meets
solution suppliers
functional
Maintenance policies IS* 06/15 requirements
Definitions Requirements placed on security Requirements to achieve a Requirements to secure system
and
procedures of the as asecure
whole system.
Metrics organization and processes of system components
asset ownertheorplant owner and suppliers System components fit
service provider secure design
Functional requirements Processes
23 PCIC EUROPE
Why such standards at all?
24 PCIC EUROPE
IEC 62443-3-3 Foundational Requirements (FRs)
FR 2 – Use control
FR 3 – System integrity
FR 4 – Data confidentiality
FR 7 – Resource availability
25 PCIC EUROPE
Detailed example: IEC 62443-3-3 SR 1.1
• Requirement
• The control system shall provide the capability to identify and authenticate all human
users. This capability shall enforce such identification and authentication on all interfaces
which provide human user access to the control system to support segregation of duties
and least privilege in accordance with applicable security policies and procedures.
• Rationale and supplemental guidance
• All human users need to be identified and authenticated for all access to the control
system. Authentication of the identity of these users should be accomplished by using
methods such […]
• Requirement enhancements
• SR 1.1 RE 1 – Unique identification and authentication
• SR 1.1 RE 2 – Multifactor authentication for untrusted networks
• SR 1.1 RE 3 – Multifactor authentication for all networks
• Security levels
§ SL-C(IAC, control system) 1: SR 1.1
§ SL-C(IAC, control system) 2: SR 1.1 (1)
§ SL-C(IAC, control system) 3: SR 1.1 (1) (2)
§ SL-C(IAC, control system) 4: SR 1.1 (1) (2) (3)
26 PCIC EUROPE
Zones and Conduits (IEC 62443-3-2)
27 PCIC EUROPE
IEC62443-2-4: Functional Areas, Topics
28 PCIC EUROPE
IEC62443-2-4: Functional Areas, Topics (continued)
29 PCIC EUROPE
IEC 62443-2-1
Main content:
• Additions to ISO/IEC 27001
− e.g. related to information security risk management
30 PCIC EUROPE
Relation between IEC 62443 and ISO/IEC 27000
ISO/IEC 27001
ISO/IEC 27019
Operator IT Infrastructure IEC 62443-2-1
Functional Procedural
31 PCIC EUROPE
Tutorial Agenda
Agenda
Realization Approaches
32 PCIC EUROPE
Goal: analyze possible attack actions, understand risks
• Misuse of credentials,
• Tamper data
• Disclose data • Misuse of credentials
• Exhause resources • Bypass of access control
• Misuse elevated privileges • Malicous input • Tamper data
• Disclose data,
• Exhaust resources
OS level access User interfaces
Network
communication
Component-to-
Physical
component
interfaces
interfaces
33 PCIC EUROPE
Security Risk Management
34 PCIC EUROPE
Risk Management along the PDCA Cycle
35 PCIC EUROPE
Definition: Threat
Threat
36 PCIC EUROPE
Definition: Risk Evaluation
Level of Risk
Input:
A list of identified relevant incident scenarios, including identification of
threats, vulnerabilities, affected assets, consequences to assets and business
processes.
Output:
List of risks with value levels assigned to all relevant incident scenarios ISO 27005:2011
37 PCIC EUROPE
Risk Assessment Methodology
Impact Rating
Risk
Impact/Consequence level
Likelihood
Impact
Asset
Threat
Likelihood rating
Product / solution Threat List Likelihood Impact Risk
Likelihood
Threat 1 Very likely Critical
Intended operational
environment
Threat 2 Possible Disastrous
38 PCIC EUROPE
Risk Treatment Options
• Introduce or modify • Accept risk. Risk • Avoid condition • Share with another
security controls meets creating the risk party
(techn. or acceptance
procedure) criteria • Example: Remove• Example:
vulnerable Subcontractor,
• Example: • Example: component Insurance
Add firewall rule to Identified risk
block access to a below threshold
vulnerable
component
39 PCIC EUROPE
Resulting Risk and Security Levels
• To define appropriate security controls aligned with identified risks, „levels“ can be used
40 PCIC EUROPE
IEC 62443-3-3 Security Levels: Interrelation
System architecture
zones, conduits 3-2 Security risk
Protection against intentional
violation using simple means with assessment and
Target SLs
SL 2 low resources, generic skills and low system design
(work in progress)
motivation
Achieved SLs
Protection against intentional violation Automation solution
using sophisticated means with
SL 3 moderate resources, IACS specific
skills and moderate motivation 3-3 System
Capability SLs security
Protection against intentional violation Control System requirements and
using sophisticated means with Security levels
capabilities
SL 4 extended resources, IACS specific Independent
skills and high motivation of plant environment
41 PCIC EUROPE
How to measure process compliance
IEC 62443-2-4
Improving
Defined
(Practiced)
Managed
Initial
Source: http://en.wikipedia.org/wiki/Capability_Maturity_Model_Integration
42 PCIC EUROPE
Tutorial Agenda
Agenda
Realization Approaches
43 PCIC EUROPE
How to address IEC 62443-3-3
• The specification does not limit realization options. It describes what is required,
but does not describe (or limit) how this can be achieved.
44 PCIC EUROPE
Example: Substation Automation
Untrusted network
Station level
Router
Service HMI
PC Station controller
PC
Switch
Field level
Switch Switch
IEDs
Protection and
field devices
45 PCIC EUROPE
Network Segmentation in IEC 62443-3-3
46 PCIC EUROPE
Security Zones with Protection at Zone Borders
Untrusted network
HMI
Service Station controller
PC
PC
Switch
Field level Trusted zone Switch Switch
IEDs
Protection and
field devices
47 PCIC EUROPE
Authentication in IEC 62443-3-3
48 PCIC EUROPE
Places for User Authentication
Remote Access
Infrastructure
Untrusted network
Switch
Field level Trusted zone Switch Switch
IEDs
Protection and
field devices
49 PCIC EUROPE
Centralized User Authentication
Remote Access
Infrastructure
Untrusted network
Switch
Field level Trusted zone Switch Switch
IEDs
Protection and
field devices
Agenda
Realization Approaches
51 PCIC EUROPE
Summary and Outlook
• Appropriate realizations vary based on the actual system and its operational
environment. However, they need to consider the state-of-the-art. Hence,
appropriate realizations will evolve over time.
52 PCIC EUROPE
Sources for further information
53 PCIC EUROPE
Sources for further information
• Bulletin d’Information d’ISA France, ISA FLASU no. 62, Patrice Bock et al, “A forensic analysis of the cyber-attack on
the Ukrainian power”, December 2016.
• German IT security law, BSI Information (German language only):
• https://www.bsi.bund.de/DE/Themen/Industrie_KRITIS/IT-SiG/it_sig_node.html
• A. Polyakov, M. Geli, “SAP Cybersecurity for Oil and Gas”, ERPScan Whitepaper presented at Blackhat Europe,
Nov. 2015
54 PCIC EUROPE
Authors
• Dirk Kroeselberg received a diploma degree in Mathematics and Computer Science from the University of Giessen,
Germany, in 1997. He worked for Siemens and Nokia Siemens Networks on a broad range of security topics and
technologies, including smartcards, and mobile telecommunication networks. Joining Siemens Corporate Technology
in 2011, he currently works as principal key expert in the field of security in industrial environments, critical
infrastructures, and energy automation.
dirk.kroeselberg@siemens.com
• Frederic Buchi received an engineer degree in Communication Engineering from ESSTIN (Ecole Supérieure des
Sciences et Technologies de l'Ingénieur de Nancy/France) in 2000. Following a first position at Alcatel, his
involvement with power utilities started in 2003 as a Technical Project Manager for turn-key communication networks
at Alstom. Since 2008 he works at Siemens' HQ in Germany in the areas of product lifecycle management, business
development and is currently responsible for Siemens Cyber Security solutions for protection and control system in
Digital Grids Systems, where he passionately addresses this dynamic topic, both within Siemens and customers,
especially focusing on defining and implementing challenging cyber security measures on the OT side to comply with
international and industry standards..
frederic.buchi@siemens.com
• Hans Meulenbroek graduated in 1985 from the HTS Hilversum, the Netherlands with a bachelor degree (Ing.) in
Electrical Engineering. From 1987 he worked for Rossmark Water Treatment as process automation engineer and
manager process automation department. In 1997, he joined Eaton Electric in the role of application
engineer/SCADA specialist, followed by Product Manager responsible for LV Switchgear & MCC, Motor
Management Systems and Smart Grid Automation solutions. In 2014 he joined Siemens as Proposal Expert Energy
Automation.
hans.meulenbroek@siemens.com
55 PCIC EUROPE