Jan 16, 2013 ... Page 1 ... detection measures to protect the integrity of a system ... September 27/
28, 2012 | Slide 12 ... Symantec Endpoint Protection.
Tomas Lindström Cyber Security Manager BU Control Technologies 2013-01-16
Cyber Security for System 800xA The SD3+C framework
3BSE072454
Security – Not just a technical solution …
Process Control Security
Compliance
© ABB Group September 27/28, 2012 | Slide 3
There is no single solution that is effective for all organizations and applications
Security is a continuous process, not a once and for all technology solution
Security begins and ends with human behavior
100% security is not feasible
Personnel
Organization
Physical Security
Access Control
Administration & Maintenance
Security is ultimately the user’s responsibility
Proper implementation, configuration, operation, and maintenance of security procedures and equipment is the responsibility of the user of the automation system However …
Effective security solutions require the joint efforts of
User’s IT and Process Control organizations
Control System vendors
Teams for Commissioning and Maintenance
Vendor support needed in complete System Lifecycle
System Capabilities (from Product organization, main focus for this presentation)
© ABB Group September 27/28, 2012 | Slide 4
SAT & Commissioning
Maintenance & Support
Good Security Practices Implement a Security Management System
© ABB Group September 27/28, 2012 | Slide 5
Use standards e.g. as guidelines: IEC 27000, ISA/IEC62443 (ISA99)
Do a risk assessment
Develop a security policy and define clear organizational responsibilities
Select security countermeasures as an “risk insurance”: Balance Value for me Value for X Mitigation cost:
Who should use the system for what
Protect the system
Detect problems
Manage system resource availability
Plan for incident response and disaster recovery
Audit security systems and procedures for compliance with the security policy
Defense in depth Perimeter Defenses
The coordinated use of multiple lines of prevention and detection measures to protect the integrity of a system
Examples
Network Defenses Host Defenses Application Defenses Data Defenses Physical Security Policies and Procedures
© ABB Group September 27/28, 2012 | Slide 6
Security policy and procedures
Perimeter firewalls
Network segregation with Security zones Resources in the same zone: same minimum security level Access between zones only through secure conduits
Intrusion detection
Host based firewalls
Host hardening
Malware protection
User authentication and authorization
Data encryption
Secure application development
…
Security for System 800xA The SD3 + C Security Framework Secure by Design Secure by Default Secure in Deployment
Security in the Product Development Process: Requirements, Design, Implementation, Verification
Default installation with minimal attack surface Defense in Depth Least privileges used
Communication
© ABB Group September 27/28, 2012 | Slide 7
Product support for Secure Configuration, Operation, Maintenance Support for system updating Openly and responsibly communicate with users about detected security flaws: Implications, corrections and/or workarounds
Secure by Design Security in the Product Development Process
© ABB Group September 27/28, 2012 | Slide 8
Security integrated in the Quality Management System
Security check points at Project Gates
Threat modeling
On existing products Finding Vulnerabilities?
For new products Identifying Requirements
Secure coding guidelines
Design and code reviews with checklists with security checkpoints and tool support
Aligning with Microsoft’s SDL
Testing (next slide)
Secure by Design Testing in Product Development
Requirement verification by R&D
Functional and non functional
Security Testing in R&D Projects (more next slide) 1) by R&D
Some tools
Scope: Single products and the whole system
2) by Device Security Assurance Center More tools Scope: Devices
© ABB Group September 27/28, 2012 | Slide 9
3rd party testing
Achilles Communications Certification by Wurldtech
MUSIC certification by Mu Dynamics
Secure by Design ABB’s Device Security Assurance Center
Product independent center for Device Robustness Testing
Controllers, Communication Interfaces, Field Devices, …
Assisting R&D Projects e.g. Improving methods
State-of-the-art security testing tools (commercial and open source): Mu8000, Achilles Satellite Unit, Nessus,…
Multi-test method approach with defined policies
Profiling Tools to determine vulnerable services
Check for well-known flaws
Resource Starvation Testing (DoS attacks)
Robustness testing (protocol fuzzing)
© ABB Group September 27/28, 2012 | Slide 10
Systematically subjecting the target to a set of invalid packets that violate the protocol’s specification
More than Achilles/MUSIC Certification!
Secure by Default Secure Default settings out of the box
Automated installation with System Installer
© ABB Group September 27/28, 2012 | Slide 11
Consistent and repeatable
Secure default settings and hardening
Unnecessary services disabled or not installed
Windows Firewall Enabled and Configured for used functions
Secure default settings for user privileges
Embedded OS with only needed features
Secure by Default, Defense in Depth Network Defenses
Network Redundancy with Dual Separated Networks
Client-Server communication protected with IPSec
IPSec Configuration Tool in SV 5.1 Rev A
For installed systems with SV 5.1 or later
For new systems
Storm protection in Network Switches (Recommended 3rd party addition)
Redundancy with Separated networks
© ABB Group September 27/28, 2012 | Slide 12
IPSec protection
Secure by Default, Defense in Depth Host Defenses
Windows Firewall in Servers and Workstations
Network filter in Controllers and Communication Modules
Blocks unsupported traffic
Network Storm protection
RNRP’s Network Loop Protection in Servers and Workstations
System supervision
Controller self supervision
PNSM (PC Network and Software Monitoring) Storm/Loop protection action: Disable affected network. Communication survives Network Loops/Storms Thanks to Architecture with Separated Networks!
© ABB Group September 27/28, 2012 | Slide 13
Secure by Default, Defense in Depth User Authentication and Access Control
Product features designed to meet regulatory requirements
User Authentication based on Windows
© ABB Group September 27/28, 2012 | Slide 15
Active Directory or Workgroup
800xA Access Control
Based on User, Role, and Location
Set on Structure, Object and Attribute level
Special Authentication functions
Re-authentication, Double authentication
Log over
Audit trail of user actions
Digital signatures
Secure in Deployment Product Organization Support overview
© ABB Group September 27/28, 2012 | Slide 17
Primarily a task for Project/Support organizations.
Supported from product organization:
User manuals, guidelines and system functions
Recommendations for Secure Architectures
Backup/Restore solutions
Malware Protection solutions
Patch Management solutions
Security Event Management solutions
Asset Inventory/Management solutions
Product Support organization
Secure in Deployment Secure Architecture: Security Zones Security Zones: Multiple Network layers
© ABB Group September 27/28, 2012 | Slide 18
Secure in Deployment Patch Management, Security Updates
© ABB Group September 27/28, 2012 | Slide 24
Validation of Microsoft security updates
All relevant updates are tested for compatibility
At least every month
Dedicated Security Test Lab covering all supported 800xA system versions
Result published typically within 3 – 7 days
Available through ABB Automation Sentinel
Other 3rd party SW (e.g. Adobe Reader)
Released from SW vendor without schedule
Verified with next Microsoft Security Update
Secure in Deployment Patch Management, Deployment solutions
800xA System Revisions
The System Update Tool
Microsoft Security Updates
The System 800xA Qualified Security Updates
for node by node deployment
Security Updates delivered from ABB
WSUS for centralized management (Recommended 3rd party additions)
© ABB Group September 27/28, 2012 | Slide 25
Secure in Deployment Malware Protection solutions (Qualified 3
McAfee VirusScan® Enterprise and Symantec Endpoint Protection
Configuration guidelines
Verified in system tests
Node based or centralized management
‘Daily’ verification of Definition files
© ABB Group September 27/28, 2012 | Slide 26
party additions)
Accreditation of Anti-virus SW
rd
Update production systems with 48h delay
Application Whitelisting
SE46: To be released with FP4 Q1 2013
Industrial Defender HIPS: Under testing
Communication Cyber security response, Reporting
© ABB Group September 27/28, 2012 | Slide 31
Cyber security response system to handle security vulnerabilities and incidents (issues)
Customers and other stakeholders are encouraged to use the “Contact us” feature on ABB’s Cyber security webpage http://www.abb.com/cybersecurity to report any security issue
Communication Cyber security response, Issue handling
When reporting Provide contact information with short message (without details of the security issue)
ABB Cyber security response team
© ABB Group September 27/28, 2012 | Slide 32
Contacts the user to get details of the issue and provide responses via a protected communication method.
Analyses the issue involving security and product experts and provides mitigation measures.
Product responsible provide final mitigation solution and/or product correction.
Communication Cyber security response, Vulnerability disclosure When mitigation solution or product correction exists:
© ABB Group September 27/28, 2012 | Slide 33
Confidentially reported or internally found vulnerability Disclosure to ABB and customers
Publically announced vulnerability Public disclosure on www.abb.com and ICS-CERT
Communication Vulnerability disclosure for Customers
To all customers known to ABB regardless of maintenance contracts
Security Bulletin Security related Product defect or problem not related to safety My Control System planned to be used
Safety Report Product defect or problem which has the potential to cause a loss of safety in the use of the product
Product Alert Product defect that may result in, although not directly cause or create, a safety issue or a process misbehavior.
© ABB Group September 27/28, 2012 | Slide 34
A security problem which is or may result in a safety problem will be announced as Safety Report or Product Alert
Communication Security via ABB Automation Sentinel
© ABB Group September 27/28, 2012 | Slide 35
Product Bulletins with Security Validation status
Microsoft Security Updates (monthly update)
Virus Definition files (after each update, almost daily)
3rd party SW (after each update)
E-mail notification service on updates
Product Updates
What do I get from where? Solutions from ABB
System 800xA
ABB Automation Sentinel
Configuration compliance management service
E163 – Cyber Security for System 800xA
© ABB Group September 27/28, 2012 | Slide 37
Keeps you up to date
ABB’s Cyber Security Fingerprint
Covering your essential needs/The good start…
Expert Workshop training
What do I get from where? Solutions from ABB’s partners
© ABB Group September 27/28, 2012 | Slide 38
Malware protection: AntiVirus
Anti Virus Enterprise and ePO Server from McAfee
Symantec Endpoint Protection
Malware protection: Application Whitelisting
SE46 from Cryptzone (Q1 2013)
…
Security Event Monitoring
Industrial Defender Monitor
…
Configuration compliance management (24*7)
Industrial Defender Manage (Q1 2013)
…
SD3 + C for System 800xA For current solutions and future improvements Secure by Design Secure by Default
Project gates, Threat modeling, Static Code analysis, Reviews, Testing
Automated installation Default settings and hardening Host defenses, Network defenses
Architecture recommendations Malware protection, Patch Management Centralized security monitoring
Cyber Security Response
Vulnerability disclosure ABB Automation Sentinel
Secure in Deployment
Communication
© ABB Group September 27/28, 2012 | Slide 39
© ABB Group September 27/28, 2012 | Slide 40