Presentation by Derek Manky, Real-Time Threat Protection in a ...

31
Fortinet Confidential Real-Time Threat Protection in a SCADA Environment Derek Manky Cyber Security & Threat Research, FortiGuard Cyber Security for Energy and Communications September 29th, 2009

description

 

Transcript of Presentation by Derek Manky, Real-Time Threat Protection in a ...

Page 1: Presentation by Derek Manky, Real-Time Threat Protection in a ...

Fortinet Confidential

Real-Time Threat Protection in a SCADA Environment

Derek MankyCyber Security & Threat Research, FortiGuard

Cyber Security for Energy and Communications September 29th, 2009

Page 2: Presentation by Derek Manky, Real-Time Threat Protection in a ...

2

Presentation Overview

• FortiGuard services• Research

• SCADA threats

• Elements of SCADA• Compliances

• Real-time threat protection• Mitigation solutions

• Visibility & monitoring

• Management

2

Page 3: Presentation by Derek Manky, Real-Time Threat Protection in a ...

3

FortiGuard Distribution Network System

3 Fortinet Confidential

Vancouver15 Servers

Singapore2 Servers

Beijing2 Servers

Tokyo4 Servers

Ottawa3 Servers

San Francisco4 Servers

New Jersey6 Servers

London2 Servers

Frankfurt5 Servers

40+ servers in 9 strategic locations balance traffic loads and provide the

highest quality of service with redundancy

• Up to date scanning with signature database

Antivirus - hourly IPS True zero-day protection Application control Database Vulnerability management

• Real time queries AV Query Webfiltering Antispam

• Real time queries AV Query Webfiltering Antispam

Page 4: Presentation by Derek Manky, Real-Time Threat Protection in a ...

4

FortiGuard Intelligence Systems

4 Fortinet Confidential

FortiGuard Intelligence Systems

High capacity intelligence systems Automated signatures Stays in stride with arms race Consolidated Intelligence

Frequent daily updates to all devicesImmediate hot updates for breaking threats

Page 5: Presentation by Derek Manky, Real-Time Threat Protection in a ...

5

FortiGuard Research

• Responsible disclosure• Worldwide team• 69 zero-days discovered since 2008

• NVC: 588 critical (March 2008) / 178 exploited

• Proactive Detection• MS09-043 office Web components:

1 year advanced protection

• Microsoft MAPP partner• Breaking updates

5

Page 6: Presentation by Derek Manky, Real-Time Threat Protection in a ...

6

History of SCADA Security Threats

• 1998: Government penetration tests on US grid hack questioned• “Highly decentralized structure of the power plants”[1]

• 2000: Unknown intruders hijacked an electric company's FTP servers• Access through power company's servers by exploiting a

vulnerability in the company's file storage service• "The intruders used the hacked FTP site to store and play

interactive games that consumed 95 percent of the organization's Internet bandwidth… "The compromised bandwidth threatened the (company's) ability to conduct bulk power transactions.“

• 2003: The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant, disabling a safety monitoring system for nearly five hours

6

[1] Wired: http://www.wired.com/science/discoveries/news/1998/06/12746

Page 7: Presentation by Derek Manky, Real-Time Threat Protection in a ...

7

History of SCADA Security Threats

• 2008: Hackers shut off power in multiple regions outside USA, demand payments• CIA official: “All involved intrusions through the Internet”[1]

• April 7, 2009: NERC releases public warning on Cyber Asset Identification• Reports surfaced of China/Russia infiltrating US electrical

grid, malware left behind[1]

• 2009: DHS official on SCADA intrusions• “..They are growing”, “There were a lot last year.”[2]

7

[1] Wired: http://www.wired.com/dangerroom/2008/01/hackers-take-do/[2] Wall Street Journal: http://online.wsj.com/article/SB123914805204099085.html

Page 8: Presentation by Derek Manky, Real-Time Threat Protection in a ...

8

Real-Time Threat Protection?

• Unique solutions for each threat• Require multiple security point

products

• Limited to no product interoperability

• Costly to own – costly to operate• High capital and operational

expense

• Disparate management consoles

• No central threat dashboard

• Not flexible• No deployment flexibility

• Limited product offering

• No Support for DNPV3

8

Need Cost-Effective, All-in-One Security Solutions

UsersUsers

ServersServers

SSL VPNSSL VPN

IPSIPS

FirewallFirewall

AntivirusAntivirus

AntispamAntispam

URL FiltersURL Filters

IPSEC VPNIPSEC VPN

AntiSpywareAntiSpyware

Page 9: Presentation by Derek Manky, Real-Time Threat Protection in a ...

9

Consolidated Intelligence: FortiGuard

Solution AAntiVirus

PublicPublic

Solution DAntiSpam

FortiGuardSolution

Solution BWCF

Solution CIPS

FreshWeb

0-Day Exploit

Variant #2Hosted

Variant #1 Attached

Mass Mail

12

3

4

5

1

1 2 3 4 5

2 5

3

4

Page 10: Presentation by Derek Manky, Real-Time Threat Protection in a ...

10

Elements of a SCADA System

• A Human – Machine Interface• HMI is the apparatus which presents process data to a human

operator, and through this, the human operator, monitors and controls the process

• A supervisory system• A computer gathering/acquiring data on the process and

sending commands (control) to the process

• Remote Terminal Units• RTUs connect to sensors in the process, converting sensor

signals to digital data and sending digital data to the supervisory system

• Communications Infrastructure• Connect the supervisory system to the RTU’s

Page 11: Presentation by Derek Manky, Real-Time Threat Protection in a ...

11

Elements of a SCADA System

Page 12: Presentation by Derek Manky, Real-Time Threat Protection in a ...

12

SCADA Application & Function

HMI

DNP V3

ICCP

Wireless 3G/WIFI connectivity to RTU stations

Database Systems

Application Function Security Technology

Secured AP technology that includes AV, IPS, and

application control

Distributed control systems control systems integration to

EMS systems

IPS protection from protocol anomalies and systems

attacks

SCADA Main to SCADA remote RTU

Application control for TCP/IP DNP protocol control, IPS for buffer, header and network

attacks

RTU control TerminalAV/IPS to secure against

Threats to terminal (no AV allowed on HMI Terminals)

Data storage for HMI and RTU systems

Database security control with schema, table auditing

and control

Page 13: Presentation by Derek Manky, Real-Time Threat Protection in a ...

13

SCADA Compliance and Certifications

Fortinet Confidential

HIPAAHealthcare

Baseline ISO 17799, 27001FW, AV, IPS, DB controls, Visibility, Audit

Encryption in Transport

NERC CIPElectrical

PCIRetail

SOX, Multilateral Instruments

52-109, 52-111Corporations

Baseline ISO 17799, 27001FW, AV, IPS – visibility, audit

security perimeter for all cyber assetsnetwork segmentation, authentication

Baseline ISO 17799, 27001FW, AV, IPS, Database controls, Visibility,

Audit, Network Segmentation, Authentication, Encryption in Transport

Baseline ISO 17799, 27001FW, AV, IPS, IM Controls, Database controls,

Visibility, Audit, Network Segmentation, Authentication

Fortigate – FW, VPN, AV, IPSFortiManager, FortiAnalyzer,

FortiDBForticlient

FortiGate – FW, VPN, AV, IPS,network segmentation, app.authentication, FortiManager

FortiAnalyzer, FortiDB

Fortigate – FW, VPN, AV, IPSNetwork Segmentation

Authentication, FortiManagerFortiAnalyzer, FortiDB, Forticlient

Fortigate – FW, VPN, AV, IPSIM Controls, Fortimail, Network Segmentation

Authentication, FortiManagerFortiAnalyzer, FortiDB, Forticlient

Compliance Requirements Fortinet Solution

Page 14: Presentation by Derek Manky, Real-Time Threat Protection in a ...

14

Key NERC Requirements

• Cyber-asset identification• Professional services to help identify• Built in scanning tools (Fortinet)

• Security management controls• Role/group based user management• FortiGate policy enforcement

• Personnel & training• Professional services/training• FortiGuard advisories/analysis/reports & blog (RSS)

• Electronic security perimeter(s)• FortiGate solution with AV/IPS and role based policy enforcement

• Physical security of critical cyber assets• Segmentation of network with FortiGate• Role based security policies

• Systems security management• Change management with the FortiManager

• Incident reporting and response management• FortiAnalyzer will fill this role easily

Page 15: Presentation by Derek Manky, Real-Time Threat Protection in a ...

15

Where are the Threats Coming From?

• External Sources• SCADA systems are normally interconnected to other SCADA

systems and their own RTU’s/MGMT stations via public networks• Software as a Service (SaaS)• Internal sources• Virus’ brought into SCADA network via portable devices• Corporate espionage• Third party applications• File sharing, P2P and social networks

• HMI terminals do not have or are not allowed to install an AV solution

• Wireless sources• SCADA network often employ WiFi or 3G based wireless

connectivity to RTU’s.• Rogue AP set up as original equipment SSID• Host of encryption exploits• No host based security features on RTU’s

Page 16: Presentation by Derek Manky, Real-Time Threat Protection in a ...

16

How You can Protect your SCADA Environment

• Control application/ communication into/out of the network• Control application/ communication inside the network• Includes ICCP and DNPV3

• Control what/who can interface with SCADA systems• Monitor the network for virus/ attacks and be able to

react to those events quickly

Page 17: Presentation by Derek Manky, Real-Time Threat Protection in a ...

17

How Fortinet Can Help

• External firewall security• IPS SCADA signatures available today

• Modbus, DNP3, etc• IPS anomaly/DDoS mitigation• Application control for DNPv3 and ICCP• Firewall rules, user access control, endpoint control

• Internal firewall security• IPS, AV, application control• User Access control, DLP

• Wireless/3G• Rogue AP detection• Multiple security methods

• MAC address, WEP, WPA, WPA2 Enterprise• Role based security rules at RTU Access point

• Restrict to RTU and MGMT IP’s• IPSec VPN from AP to CTU/MGMT station

Page 18: Presentation by Derek Manky, Real-Time Threat Protection in a ...

18

Protection from the Outside (ingress)

• Firewall. Inspects content in network packets to ensure no unauthorized traffic passes into or out of the intranet. With adequate performance, a firewall can be deployed in-line for real-time protection.

• Intrusion Detection and Prevention. Stops attacks at network perimeter by analyzing traffic for worms, viruses and exploits. Analysis techniques include behavior-based learning and heuristics in addition to signatures defining known hazards.

• VPN. Enables secure communications tunnels across the public Internet between computing devices. With adequate performance, a VPN can authenticate users, encrypt data and manage sessions.

• Antispam. Eliminates entry to the intranet of junk email, file attachments and web access of blacklisted websites, domains and key words.

Page 19: Presentation by Derek Manky, Real-Time Threat Protection in a ...

19

Protection from the Outside (ingress)

• Web-based Content Filtering. Processes all Web content to block inappropriate material and malicious scripts from Java Applet, Cookies and ActiveX scripts entering the intranet. Assures improved productivity by minimizing time wasted on non-business use of the network.

• Vulnerability Scanning. This automated process checks network devices and applications to identify and rank the severity level of known vulnerabilities caused by unpatched software, mis-configurations and other causes. Scan reports provide a blueprint to remove vulnerabilities for stronger security.

• All these security applications can and should be installed at every SCADA network endpoint. The biggest challenge is operational – how to deploy them and manage their use in a cost-effective manner.

Page 20: Presentation by Derek Manky, Real-Time Threat Protection in a ...

20

Protection from the Inside

• Once an intruder is on the inside of a network, the SCADA system is vulnerable from several points, the HMI (Human-Machine Interface) and RTU (Remote Terminal Units). The HMI is a direct interface to the databases that the RTU sends and receives commands from. For example a HMI user working at a fuel tank farm, can manage the flow of fuel from a pipeline into various storage tanks and then into a piping system into delivery trucks or another pipeline. The HMI sends commands to the RTU to open/close valves, turn on pumps, record the amount of fuel/temp/water content of a storage tank, all real time. If the HMI interface were to be exploited, either by a bot, worm, or a known exploit that gives command/control access to an external user, what could happen?

Page 21: Presentation by Derek Manky, Real-Time Threat Protection in a ...

21

Protection from the Inside

• Secure (encrypted) communications to/from RTU’s• Firewall policies that restrict users/IP’s to only operational

personnel• Antivirus/IPS profiles within network• Secure database communications• FortiDB• DLP• Application control to limit unwanted or potentially

dangerous applications from being installed within SCADA network

Page 22: Presentation by Derek Manky, Real-Time Threat Protection in a ...

22

Wireless Protection

• WiFi• Use non-broadcast SSID

• Use WPA-PSK 128 or better encryption

• WPA2 Enterprise (RADIUS)

• Lock wireless access to known MAC/IP addresses

• VPN to CTU or DB

• 3G Based Wireless• Static IP devices

• MPLS to SCADA network

• VPN into SCADA network

• Restrict VPN to know IP addresses

Page 23: Presentation by Derek Manky, Real-Time Threat Protection in a ...

23

Enterprise Security Tools

Firewalls, VPN

AAA, Anti Virus

AAA, IDS,

Encryption

Application

Security

Database Security

AuthorizedUser

External

Internal

Network

PC, Printers

Server Domain

HMI Applications

SCADA Databases

Da

tab

as

e S

ec

uri

ty

UT

M

Page 24: Presentation by Derek Manky, Real-Time Threat Protection in a ...

24

The Solution:A Defense-in-Depth Security Strategy

• A Defense-in-depth strategy deploys application security at both the host RTU and the network level• Deploy security systems that offer tightly integrated

multiple detection mechanisms:• IPS• Antivirus• Antispam• Application control• Web filtering• DB• Stateful firewall• VPN

• Automated processes to update AV and IPS signature databases• Known SCADA Exploits already in AV/IPS databases

Page 25: Presentation by Derek Manky, Real-Time Threat Protection in a ...

25

Protection of the HMI Database

• Vulnerability assessment• Centralize signature/policy management• Separation of duties• Create custom signatures/policies• Implement expert-level remediation advice• Analyze database security trends• Supports well known DB systems

• Audit control – monitoring/audit• Unauthorized access/change of data circumventing application

controls• Segregation of duties - database security/audit should be external to

the database• Control on rules for who, when, where makes a change in the database

without authorization  • Change control on schemas • User privilege changes• Failed logins and failed actions • Data integrity of critical data

Page 26: Presentation by Derek Manky, Real-Time Threat Protection in a ...

26

Vulnerability Assessment

Key Features• Assesses and provides industry standard remediation

advice that strengthens the integrity and security of databases. This helps with eliminating weaknesses in passwords, access, privileges, configuration settings, and more. • Automatically discover all databases• Accelerate security & compliance best practices (PCI,

SOX, HIPAA)• Centralize signature/policy management• Separation of duties• Easily create custom signatures/policies• Brand reports for easy identification• Implement expert-level remediation advice• Analyze database security trends• Supports (Oracle, SQL, DB2 UDB and Sybase)

Page 27: Presentation by Derek Manky, Real-Time Threat Protection in a ...

27

Audit Control – Monitoring/Audit

•Reduces the risk of information theft / leak / fraudulent update; automates compliance processes• Automation of IT internal controls (database specific)• Unauthorized access/change of data circumventing

application controls• Segregation of duties - database security/audit should be

external to the database• Power user activities• Control on rules on who when where makes a change in

the database without authorization  • Change control on schemas • User privilege changes• Failed logins and failed actions • Data integrity of critical data

Page 28: Presentation by Derek Manky, Real-Time Threat Protection in a ...

28

Reporting and Analysis of SCADA

• More than 300 different report templates available• Report configuration wizard• Reports are completely customizable• Example reports• Events/attacks by:• Sensor • Source• Category• Threat• Protocol

• Mail Usage• ICCP, DNP usage• Bandwidth usage• Protocol usage

Page 29: Presentation by Derek Manky, Real-Time Threat Protection in a ...

29

Management in a SCADA Environment

INTERNET

Back BoneSwitching

Out of Band

Management w/Centralized Logging and Reporting

RTU A RTU B

RTU C

RTU F

RTU DRTU B

SCADA DB System

Internet Access

Page 30: Presentation by Derek Manky, Real-Time Threat Protection in a ...

30

Multi-Threat Security with Fortinet

• Fortinet advantages• Provides comprehensive security approach• Minimizes down-time from individual threats (FortiGuard)• Reduces number of vendors and appliances• Simplifies security management• Coordinates security alerting, logging, and reporting• Improves detection capabilities

IPSIPS

HMI HMI

FirewallFirewall

Core DBCore DB

AntivirusAntivirusAntispamAntispam

URL FiltersURL FiltersVPNVPN

Page 31: Presentation by Derek Manky, Real-Time Threat Protection in a ...

31