Architecture Intégrée | Sécurité et protection de la propriété
Transcription
Architecture Intégrée | Sécurité et protection de la propriété
AUP28 - Implementing Security and IP Protection Features in the Integrated Architecture Mads Laier DK Commercial Engineer – Logix & Networks PUBLIC INFORMATION Rev 5058-CO900E Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Agenda Why IACS Security Now! Defense in depth Key Takeaways – Design Considerations Additional Information PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 2 The threat is real! PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Industrial Market Drivers Improve Asset Utilization Maximize return on your automation investment Drive Speed & Innovation Innovation Speed time to market; manage brand equity Reduce Energy usage Contextualize Data into Information Manage Risk Implement systems and procedures to address market dynamics and regulatory requirements PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 4 Cyber Security in the News? First there was Stuxnet PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved.Copyri5 Cyber Security in the News In 2015 the game changed. Cyber security issues caused the CEO of a large US company to resign This showed highlighted that Manufacturing is the new back door. PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 6 Hackers have found “Remote Access is an easy way to get into the Industrial network New Havex malware variants target industrial control system and SCADA users PUBLIC INFORMATION During the spring, attackers began distributing new versions of a remote access Trojan (RAT) program the discovery the Stuxnet called Havex by hackingFollowing into the websites of industrialofcontrol system (ICS) manufacturers and poisoning industrial sabotage malware in 2010, which their legitimate software downloads is believed to have destroyed up to 1,000 F-Secure did not name the affected vendors, but said that two of them develop ICS remote management uranium enrichment centrifuges in Iran, software and the third supplies high-precision industrial cameras and related software. According to the security researchers sounded the alarm security firm, the vendors are based in Germany, Switzerland and Belgium. about the insecurity of industrial control The attackers modifiedsystems the legitimate installers to dropthey and execute and software the ease with which can an additional file on computers. The file is called mbcheck.dll is actuallyDespite the Havex malware. be targeted by and attackers. those concerns, malware attacksHavex component whose purpose That conclusion is also supported bywidespread the existence of a new malicious against andthat SCADA never is to scan local area networks forICS devices respondsystems to OPC (Open Platform Communications) became a reality, making the new Havex requests. campaigns a rare occurrence, but possibly The Havex component leverages the OPC standard to gather information about industrial control devices an indication of things to come. and then sends that information back to its command-and-control (C&C) server for the attackers to analyze, the F-Secure researchers said. “It appears that this component is used as a tool for intelligence gathering. So far, we have not seen any payloads that attempt to control the connected hardware.” Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 7 Hackers damage Steel Plant. Hackers infiltrated a German steel mill and made it impossible to safely shut down a furnace, according to a German security report quietly published before the new year. The breach, which caused “massive” damage, marks just the second time a digital attack caused physical damage, highlighting growing fears that cyberwarfare will soon impact more than computers and networks. PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 8 It is becoming the LAW Many countries are enacting laws to protect their Critical Infrastructure PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 9 Industrial Network Security Trends Established Industrial Security Standards International Society of Automation ISO/IEC-62443 (Formerly ISA-99) Industrial Automation and Control Systems (IACS) Security Defense-in-Depth IDMZ Deployment National Institute of Standards and Technology NIST 800-82 Industrial Control System (ICS) Security Defense-in-Depth IDMZ Deployment Department of Homeland Security / Idaho National Lab DHS INL/EXT-06-11478 Control Systems Cyber Security: Defense-in-Depth Strategies Defense-in-Depth IDMZ Deployment A secure application depends on multiple layers of protection. Industrial security must be implemented as a system. PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 10 Agenda Why ISC Security Now! Defense in depth Key Takeaways – Design Considerations Additional Information PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 11 What Risk Copyright © 2015 Rockwell Automation, Inc. All rights reserved. 12 From Who? Security Threat Actors Human System PUBLIC INFORMATION • Malicious • Ignorant • Misconfiguration • Lack of Privilege Control Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 13 Rockwell Automation Focus on Industrial Cyber Security Reduce risks to safe and reliable operation …Control system architecture with layered security to help maintain operational integrity under threat Protect assets & information …Product and system features to help control access, tamper-proof and limit information exposure Government and Standards Alignment …Responsible disclosure with control system solutions that follow global standards and help fulfill independent & regulatory security requirements PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 14 Defense-in-Depth No single product, technology or methodology can fully secure Industrial Automation and Control System (IACS) applications. Protecting IACS assets requires a defense-in-depth security approach, which addresses internal and external security threats. This approach utilizes multiple layers of defense (physical, procedural and electronic) at separate IACS levels by applying policies and procedures that address different types of threats. PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 15 Recommendations for Defending ICS Separate control network from enterprise network Harden connection to enterprise network Protect all points of entry with strong authentication Make reconnaissance difficult from outside Harden interior of control network Make reconnaissance difficult from inside Avoid single points of vulnerability Frustrate opportunities to expand a compromise Harden field sites and partner connections Mutual distrust Monitor both perimeter and inside events Periodically scan for changes in security posture Copyright © 2015 Rockwell Automation, Inc. All rights reserved. Two Critical Elements to Industrial Cyber Security • A balanced Security Program must address both Technical and NonTechnical Risks and Controls NonTechnical Technical • Technical Controls (firewalls, layer-3 ACLs, etc.)… …provide restrictive measures for… • Non-technical Controls (rules for environments, i.e. policy, procedure, etc.) PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 17 Defense-in-Depth Industrial Security Policies Drive Technical Controls Physical – limit physical access to authorized personnel Cells/Areas, control panels, devices, cabling, and control room Network – security framework – e.g. firewall policies, access control list (ACL) policies for switches and routers, AAA, intrusion detection and prevention systems (IDS/IPS) Computer Hardening – patch management, Anti-X software, removal of unused applications/ protocols/services, closing unnecessary logical ports, protecting physical ports Application – authentication, authorization, and accounting (AAA) software Device Hardening – change management, communication encryption, and restrictive access PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 18 Defense-in-Depth Application Security - Examples • FactoryTalk® Security – Centralized authentication & access control – Verifies user identity before granting system access – Grants or denies requests to perform actions • FactoryTalk® AssetCentre – Centralized storage of audit records – Limits access to product and system data – Offers back-up and archive of application files PUBLIC INFORMATION • Studio 5000™ Programming Software – Control access to routines and AOIs with source protection – Control access to tags with Data Access Control – Detect unauthorized modification with Change Detection 19 Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved.Funda Defense in depth Controller Hardening Physical Procedure Physical procedure: PUBLIC INFORMATION Restrict Industrial Automation and Control System (IACS) access to authorized personnel only Control panels, devices, cabling, and control room Locks, gates, key cards Video Surveillance Other Authentication Devices (biometric, keypad, etc.). Switch the Logix Controller key to “RUN” Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 20 Defense in Depth. Controller Hardening Electronic Design Protect the Source Embedded Change Log FactoryTalk Security Data Access Control PUBLIC INFORMATION Trusted Slot with Embedded VPN Module Copyright © 2011 Rockwell Automation, Inc. All rights reserved. Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 21 Defense-in-Depth Computer Hardening - Examples Security Patch Management: establish and document a security patch management program for tracking, evaluating, testing, and installing applicable cyber security software patches Keep computers up-to-date on service packs and hot fixes Disable automatic updates Check software vendor website Test patches before implementing Schedule patching during downtime Deploy and maintain Anti-X (antivirus, antispyware, etc.) and malware detection software Disable automatic updates and automatic scanning Test definition updates before implementing Schedule manually initiated scanning during downtime Uninstall unused Windows components Protocols and Services Protect unused or infrequently used USB, parallel or serial interfaces PUBLIC INFORMATION 22 Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved.Funda Industrial Network Security Industrial vs. Enterprise Network Requirements Industrial Requirements Switches Managed and Unmanaged Layer 2 is predominant Traffic types Information, control, safety, motion, time synchronization, energy management Performance Low Latency, Low Jitter Data Prioritization – QoS – Layer 2 & 3 IP Addressing Static Security Industrial security policies are inconsistently deployed Open by default, must close by configuration and architecture Enterprise Requirements Switches Managed Layer 2 and Layer 3 Traffic types Voice, Video, Data Performance Low Latency, Low Jitter Data Prioritization – QoS – Layer 3 IP Addressing Dynamic Security Similarities and Pervasive differences? Strong policies Copyright © 2015 Rockwell Automation, Inc. All rights reserved. 23 Industrial Network Security Trends Industrial vs. Enterprise Network Requirements Convergence Operation Technology(OT) with Information Technology (IT) PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 24 Industrial Network Security Collaboration of Partners Wireless, Security, Switching/Routing Leader in Industrial Network Infrastructure The Established #1 Industrial Ethernet Physical Layer Network Infrastructure Application Layer Reduce Risk PUBLIC INFORMATION Simplify Design Speed Deployment Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 25 The Purdue Model and Rockwell Automation Rockwell Automation and CISCO Systems have defined a manufacturing framework to created a foundation for network segmentation, management and policy enforcement maximising the seamless of the Industrial Cyber Security Technical Countermeasures and minimising the risks to be assumed by our customers: PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 26 Network Security Framework Industrial Demilitarized Zone Enterprise Network Level 5 Level 4 E-Mail, Intranet, etc. Site Business Planning and Logistics Network Remote Gateway Services Patch Management Application Mirror Enterprise Security Zone Firewall AV Server Web Services Operations Web E-Mail CIP Application Server Industrial DMZ Firewall Level 3 Level 2 FactoryTalk Application Server FactoryTalk Directory Engineering Workstation Remote Access Server Site Operations and Control Area Supervisory Control Operator Interface FactoryTalk Client FactoryTalk Client Operator Interface Engineering Workstation Basic Control Level 1 Level 0 Batch Control Sensors Discrete Control Drive Control Drives Continuous Process Control Actuators Industrial Security Zone Safety Control Robots Cell/Area Zone Process Logical Model – Industrial Automation and Control System (IACS) Converged Multi-discipline Industrial Network No Direct Traffic Flow between Enterprise and Industrial Zone PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 27 Network Security Framework Industrial Demilitarized Zone (IDMZ) All network traffic from either side of the IDMZ terminates in the IDMZ; network traffic does not directly traverse the IDMZ Only path between zones No common protocols in each logical firewall No control traffic into the IDMZ, CIP stays home Trusted? Untrusted? No primary services are permanently housed Enterprise in the IDMZ Disconnect Point Security Zone IDMZ shall not permanently house data Application data mirror to move data into and Replicated IDMZ out of the Industrial Zone Services Limit outbound connections from the IDMZ Be prepared to “turn-off” access via the firewall No Direct Traffic Disconnect Point Industrial Security Zone Trusted PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 28 Scalable Network Security Framework One Size Does Not Fit All Enterprise-wide Network Enterprise-wide Network Enterprise-wide Network Enterprise-wide Network Switch with VLANs Plant-wide Network Plant-wide Network Plant-wide Network Figure 1 Figure 2 Plant-wide Network Figure 3 Figure 4 Not Recommended Recommended – Depends …. based on customer standards, security policies and procedures, risk tolerance, and alignment with IACS Security Standards Enterprise-wide Network Enterprise-wide Network IDMZ Firewall Router (Zone Based FW) Plant-wide Network Plant-wide Network Plant-wide Network Good Better Best Figure 5 PUBLIC INFORMATION Enterprise-wide Network Figure 6 Figure 7 Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 29 Network Security Framework Converged Plant-wide Ethernet (CPwE) Reference Architectures Structured and Hardened IACS Network Infrastructure Enterprise Zone Levels 4-5 Industrial security policy Industrial Demilitarized Zone (IDMZ) Pervasive security, not a bolt-on component Security framework utilizing defense-indepth approach Industrial DMZ implementation Remote partner access policy, with robust & secure implementation Standard DMZ Design Best Practices Enterprise WAN VLANs Physical or Virtualized Servers • • • • Cisco ASA 5500 Patch Management Remote Gateway Services Application Mirror AV Server Firewall (Standby) Firewall (Active) Plant Firewall: Inter-zone traffic segmentation ACLs, IPS and IDS VPN Services Portal and Terminal Server proxy Network Status and Monitoring AAA - Application Catalyst 6500/4500 Authentication Server, Active Directory (AD), AAA - Network Network Device Resiliency Remote Access Server Catalyst 3750 StackWise Switch Stack Level 3 – Site Operations Network Infrastructure Access Control and Hardening FactoryTalk Client Client Hardening Level 2 – Area Supervisory Control HMI VLANs, Segmenting Domains of Trust Controllers, I/O, Drives Physical Port Security Unified Threat Management (UTM) Controller Hardening, Physical Security Network Security Services Must Not Compromise Operations of the IACS PUBLIC INFORMATION Controller Hardening, Encrypted Communications I/O Controller Level 1 - Controller Drive Controller Level 0 - Process MCC Soft Starter Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 30 Secure Remote Access CPwE - Solution Remote Engineer or Partner Cisco VPN Client Internet Enterprise Zone Levels 4 and 5 Enterprise Zone Levels 4 and 5 Demilitarized Zone (DMZ) Demilitarized Zone (DMZ) Industrial Zone Site Operations and Control Level 3 Cell/Area Zones Levels 0–2 PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Secure Remote Access CPwE - Solution Remote Engineer or Partner Enterprise Data Center IPSEC VPN 1. Remote engineer or partner establishes VPN to corporate network; access is restricted to IP address of plant DMZ firewall Cisco VPN Client Internet Enterprise Edge Firewall Enterprise Zone Levels 4 and 5 Enterprise WAN Enterprise Zone Levels 4 and 5 Demilitarized Zone (DMZ) Demilitarized Zone (DMZ) Industrial Zone Site Operations and Control Level 3 Cell/Area Zones Levels 0–2 PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Secure Remote Access CPwE - Solution 1. Remote engineer or partner establishes VPN to corporate network; access is restricted to IP address of plant DMZ firewall 2. Portal on plant firewall enables access to industrial application data and files Intrusion protection system (IPS) on plant firewall detects and protects against attacks from remote host IPSEC VPN Enterprise Data Center SSL VPN Remote Engineer or Partner Cisco VPN Client Internet Enterprise Zone Levels 4 and 5 Enterprise Edge Firewall Enterprise Connected Engineer Enterprise WAN HTTPS Enterprise Zone Levels 4 and 5 Patch Management Terminal Services Application Mirror AV Server Demilitarized Zone (DMZ) Gbps Link Failover Detection Cisco ASA 5500 Firewall (Standby) Firewall (Active) Demilitarized Zone (DMZ) Industrial Zone Site Operations and Control Level 3 Cell/Area Zones Levels 0–2 PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Secure Remote Access CPwE - Solution 1. Remote engineer or partner establishes VPN to corporate network; access is restricted to IP address of plant DMZ firewall 2. Portal on plant firewall enables access to industrial application data and files Intrusion protection system (IPS) on plant firewall detects and protects against attacks from remote host 3. Firewall proxies a client session to remote access server IPSEC VPN Enterprise Data Center SSL VPN Remote Engineer or Partner Cisco VPN Client Internet Enterprise Zone Levels 4 and 5 Enterprise Edge Firewall Enterprise Connected Engineer Enterprise WAN HTTPS Enterprise Zone Levels 4 and 5 Patch Management Terminal Services Application Mirror AV Server Demilitarized Zone (DMZ) Gbps Link Failover Detection Cisco ASA 5500 Firewall (Standby) Catalyst 6500/4500 Remote Desktop Protocol (RDP) Firewall (Active) Demilitarized Zone (DMZ) Remote Access Server Industrial Zone Site Operations and Control Level 3 Cell/Area Zones Levels 0–2 PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Secure Remote Access CPwE - Solution 1. Remote engineer or partner establishes VPN to corporate network; access is restricted to IP address of plant DMZ firewall 2. Portal on plant firewall enables access to industrial application data and files Intrusion protection system (IPS) on plant firewall detects and protects against attacks from remote host 3. Firewall proxies a client session to remote access server 4. Access to applications on remote access server is restricted to specified plant floor resources through industrial application security IPSEC VPN Enterprise Data Center Cisco VPN Client Internet Enterprise Connected Engineer Enterprise WAN HTTPS Enterprise Zone Levels 4 and 5 Patch Management Terminal Services Application Mirror AV Server Demilitarized Zone (DMZ) Gbps Link Failover Detection Cisco ASA 5500 Remote Desktop Protocol (RDP) Firewall (Active) Firewall (Standby) Demilitarized Zone (DMZ) FactoryTalk Application Servers • • • • View Historian AssetCentre Transaction Manager FactoryTalk Services Platform • Directory • Security/Audit Data Servers Remote Access Server Catalyst 6500/4500 • RSLogix 5000 • FactoryTalk View Studio Catalyst 3750 StackWise Switch Stack EtherNet/IP PUBLIC INFORMATION Enterprise Zone Levels 4 and 5 Enterprise Edge Firewall SSL VPN Remote Engineer or Partner Industrial Zone Site Operations and Control Level 3 Cell/Area Zones Levels 0–2 Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Network Security Framework Stratix 5900 Unified Threat Management (UTM) Enterprise-wide Business Systems Levels 4 & 5 – Data Center Enterprise Zone Level 3.5 - IDMZ Plant-wide Site-wide Operation Systems Site-to-Site Connection Physical or Virtualized Servers • • • • • Level 3 - Site Operations Industrial Zone FactoryTalk Application Servers & Services Platform Network Services – e.g. DNS, AD, DHCP, AAA Remote Access Server (RAS) Call Manager Storage Array Levels 0-2 Cell/Area Zones Stratix 5900 2) Cell/Area Zone Firewall Stratix 5900 1) Site-to-Site Connection Stratix 5900 3) OEM Integration UTM UTM UTM Remote Site #1 Local Cell/Area Zone #1 Local OEM Skid / Machine #1 PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 36 Network Security Framework Physical Port Security Keyed solutions for copper and fiber Lock-in, Blockout products secure connections Data Access Port (keyed cable and jack) PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 37 IACS Security EtherNet/IP Industrial Automation & Control System Network Open by default to allow both technology coexistence and device interoperability for Industrial Automation and Control System (IACS) Networks Secured by configuration: PUBLIC INFORMATION Protect the network - Electronic Security Perimeter Defend the edge - Industrial DMZ (IDMZ) Defense-in-Depth – Multiple layers of security Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 38 Network & Security Services: Life Cycle Approach to Services and Solutions ASSESS PUBLIC INFORMATION DESIGN IMPLEMENT VALIDATE MANAGE Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 39 IACS Security Design and Implementation Considerations Align with Industrial Automation and Control System Security Standards DHS External Report # INL/EXT-06-11478, NIST 800-82, ISO/IEC-62443 (Formerly ISA99) Implement Defense-in-Depth approach: no single product, methodology, nor technology fully secures IACS networks Establish an open dialog between Industrial Automation and IT groups Establish an industrial security policy Establish an IDMZ between the Enterprise and Industrial Zones Work with trusted partners knowledgeable in automation & security "Good enough" security now, is better than "perfect" security ...never. (Tom West, Data General) PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 40 Additional Material Industrial Security Resources Security Resources Assessment Services Security Advisory Index Security Technology Security FAQ MS Patch Qualification Security Services Reference Architectures Assessment Services Leadership & Standards secure@ra.rockwell.com http://rockwellautomation.com/security PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 41 Additional Material Websites Reference Architectures Design Guides Converged Plant-wide Ethernet (CPwE) CPwE Resilient Ethernet Protocol (REP) Application Guides Fiber Optic Infrastructure Application Guide Wireless Design Considerations for Industrial Applications Whitepapers Top 10 Recommendations for Plant-wide EtherNet/IP Deployments Securing Manufacturing Computer and Controller Assets Production Software within Manufacturing Reference Architectures Achieving Secure Remote Access to plant-floor Applications and Data Design Considerations for Securing Industrial Automation and Control System Networks PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 42 Additional Material A new ‘go-to’ resource for educational, technical and thought leadership information about industrial communications Standard Internet Protocol (IP) for Industrial Applications Coalition of like-minded companies www.industrial-ip.org PUBLIC INFORMATION Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. 43 Thank you for participating! Please remember to tidy up your work area for the next session. We want your feedback! Please complete the session survey! PUBLIC INFORMATION Follow ROKAutomation on Facebook & Twitter. Connect with us on LinkedIn. www.rockwellautomation.com Rev 5058-CO900F 44 Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved.