hazmat signs for industrial software
play

Hazmat Signs for Industrial Software if they existed, what would - PowerPoint PPT Presentation

Hazmat Signs for Industrial Software if they existed, what would they look like? Bryan Owen PE, OSIsoft LLC cred-c.org | 1 Most Industrial Software is Toxic cred-c.org | 2 Toxicity The degree to which a chemical substance can damage


  1. Hazmat Signs for Industrial Software … if they existed, what would they look like? Bryan Owen PE, OSIsoft LLC cred-c.org | 1

  2. Most Industrial Software is ‘Toxic’ cred-c.org | 2

  3. Toxicity The degree to which a chemical substance can damage an organism • Whole organism • Organs, • Tissue, • Or even cellular damage. cred-c.org | 3

  4. Toxin Categories Biological Corrosive Physical Non-Ionizing Hazard Hazard Hazard Radiation Hazard cred-c.org | 4

  5. “Cyber” – Bio Hazard Abuse of legitimate ICS functionality • Stuxnet • Crashoverride / Industroyer • Eg Protocols: IEC101, IEC104, and Biological IEC61850 Hazard cred-c.org | 5

  6. “Cyber” – Corrosive Hazard Non-ICS specific Ransomware & Wipers • Brickerbot • Not Petya / WannaCry • Shamoon Corrosive • Eg Protocols: SMB, Telnet Hazard cred-c.org | 6

  7. “Cyber” – Physical Hazard Enlistment in bots • Carna • Mirai • Reaper • And many other similar threats Physical Hazard cred-c.org | 7

  8. “Cyber” – Radio Hazards Recent malware targeting radios • BadBIOS • BlueBorne • WPA2 Krack Non-Ionizing Radiation Hazard cred-c.org | 8

  9. Chemical Hazard Labels – NFPA Diamond 0 4 FLAMABILITY Least Most Serious Serious HEALTH REACTIVITY 0 Will Not Burn SPECIAL HAZARDS Shock and Heat 3 May Detonate cred-c.org | 9

  10. Cyber Hazard Labels: “C-I-A Triad Model” Remote, Anonymous, Default 4 Configuration, Root Access INTEGRITY Remote, Anonymous, Default 3 Configuration, User Access Remote, Authenticated, Default 2 CONFIDENTIALITY AVAILABILITY Configuration, Root Access Remote, Authenticated, Custom 1 Configuration, Write Access SPECIAL Remote, Authenticated, Read 0 HAZARDS Access cred-c.org | 10

  11. Cyber Hazard Labels: “V-A-T Model (OSSTMM)” 1/2 VISIBILITY 4 ACCESS Remote management endpoints 3 Remote write access endpoints VISIBILITY TRUST 2 Remote read access endpoints 1 SPECIAL Device broadcasts HAZARDS 0 No targets visible remotely cred-c.org | 11

  12. Cyber Hazard Labels: “V-A-T Model (OSSTMM)” 2/2 TRUST Unmanaged 3P components, 3P 4 ACCESS managed trust infrastructure 3 Unmanaged 3P components VISIBILITY TRUST 2 3P managed trust infrastructure Self-managed 3P components, 1 SPECIAL trust infrastructure HAZARDS Trusted foundry with 0 transparency cred-c.org | 12

  13. Cyber Hazard Labels: Cornell “SoS” Blueprint Blueprint for a science of cybersecurity Safety The Next Wave Vol. 19 No. 2 | 2012 Fred B. Schneider • No ‘bad thing’ happens ISOLATION Liveness • Some ‘good thing’ happens OBFUSCATION MONITORING SPECIAL HAZARDS cred-c.org | 13

  14. Special Cyber Hazards: “Observables” • Digital signature or unique hash • Documentation of third party components • Important dates (creation, last modified) • Memory safe frameworks and languages • User mode vs kernel or root A badness-omemter can’t tell you that you’re secure. • Execution flags (ASLR, CFG, DEP, NX, etc…) It can only tell you that • Network protocol safety you’re not. • Software update mechanism Badness-ometers are good. Do you own one? by Gary McGraw https://www.synopsys.com/blogs/software-security/badness-ometers-are-good-do-you-own-one cred-c.org | 14

  15. Idea: Safety Data Sheets cred-c.org | 15

  16. Cyber Security Data Sheets Cyber Security Technical Assessment Methodology: Vulnerability Identification and Mitigation 3002008023 Final Report, October 2016 Michael Thow – EPRI Steve Hagan – Fisher Valves Dan Griffin – JW Secure John Connelly – Exelon Inman – Lanier – Fisher Valves Justin Kosar – Assoc. Electric Cooperative Manu Sharma – Exelon Mike Hagen – Fisher Valves Andrew Dettmer – Assoc. Electric Cooperative Kenneth Levandoski – Exelon Andrew Clark – Sandia National Laboratory Steve Ricker – East Kentucky Power Cooperative Brad Yeates – Southern Company Matthew Coulter – Duke Energy Phillip Turner – Sandia National Laboratory Scott Junkin – Southern Company Susan Ritter – Duke Energy Tim Wheeler – Sandia National Laboratory Richard Atkinson – Arizona Public Service Mark Denton – Duke Energy Alice Muna – Sandia National Laboratory Sandra Bittner – Arizona Public Service Norman Geddes – Southern Eng. Services Christine Lai – Sandia National Laboratory cred-c.org | 16

  17. EPRI TAM Overview cred-c.org | 17

  18. EPRI TAM – Attack Surface Characterization cred-c.org | 18

  19. Reference Cyber Security Data Sheets A key part of the Supply Chain • Step 1 & 2 by EPRI, Vendors, and Big Idea: other Stakeholders You can create a • Starting point for tailored CSDS CSDS too! Cyber Security Technical Assessment Methodology: Vulnerability Identification and Mitigation 3002008023 cred-c.org | 19

  20. http://cred-c.org @credcresearch facebook.com/credcresearch/ Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend