in a G&T Coop Andrew Wright, CTO November 7, 2014 -dimension - - PowerPoint PPT Presentation

in a g t coop
SMART_READER_LITE
LIVE PREVIEW

in a G&T Coop Andrew Wright, CTO November 7, 2014 -dimension - - PowerPoint PPT Presentation

Experience with Implementing Cybersecurity in a G&T Coop Andrew Wright, CTO November 7, 2014 -dimension solutions G&T Coop 1 Primary Control Center 2000 MW combined peak load 1 Backup Control Center residential


slide-1
SLIDE 1
  • dimension

solutions

Andrew Wright, CTO November 7, 2014

Experience with Implementing Cybersecurity in a G&T Coop

slide-2
SLIDE 2
  • dimension

solutions

G&T Coop

  • 1 Primary Control Center
  • 1 Backup Control Center
  • dozens of Member COOPs

– some with SCADA hosts – some with dual SCADA hosts – some with only RTUs – most with AMI

  • several gas power plants
  • several wind farms
  • 1 Transmission provider
  • 1 Power Provider
  • 1 Power Market Purchaser
  • 1 Hosted AMI Service
  • 2000 MW combined peak load

– residential – commercial – agricultural

  • no critical assets per NERC CIP
  • primary function of G&T is

energy trading to provide members best possible rate

slide-3
SLIDE 3
  • dimension

solutions

G&T Operations Technology (OT)

  • SCADA

– load data collected from members

  • AMI

– aggregate member usage information – provide hosted AMI functions to members

  • OsiSoft PI

– data historian for power plant data – historical analysis, forecasting

slide-4
SLIDE 4
  • dimension

solutions

G&T Interconnect

x dozens x many

64kbps to 1Mbps

slide-5
SLIDE 5
  • dimension

solutions

Security Goals

  • protect OT

– G&T from attack through members, plants, 3rd parties – plants, members from attack through members, plants, 3rd parties – all from private WAN compromise

  • monitor for intrusions

– G&T OT – plant OT – member OT

slide-6
SLIDE 6
  • dimension

solutions

Reliability Goals

  • improve resilience against cyber threats
  • improve reliability of communications
  • ensure

– availability, integrity, and confidentiality – of load and plant data – to enable market trading $$$

slide-7
SLIDE 7
  • dimension

solutions

N-Dimension Network Security

  • n-Platform Unified Threat Management

– UTMs provide a variety of security functions

  • perimeter and interior security for operations systems
  • passive and active security functions
  • Control DMZs segregating control from enterprise
  • encryption over private WAN, Internet, Radio

– several dozen UTMs deployed in this soln

  • n-Central Log & Event Management

– one system providing central log & event mgmt

slide-8
SLIDE 8
  • dimension

solutions

Security Deployment

  • Secure Interconnect

– secure communications – restrict protocols

  • Operations / Corporate Segregation

– via Control DMZs

  • Monitor

– detect potential intrusions – log events for forensic analysis

slide-9
SLIDE 9
  • dimension

solutions

Secure Interconnect

slide-10
SLIDE 10
  • dimension

solutions

Secure Interconnect

  • SSL Site-to-Site VPNs between

– over MPLS, Internet, Radio

  • IPSEC Site-to-Site VPNs

– for 3rd parties

  • Stateful Firewall

– to restrict protocols between sites

  • OSPF Dynamic Routing

– to improve availability

  • Active / Standby Failover of UTMs

– to improve availability

slide-11
SLIDE 11
  • dimension

solutions

Segregation via Control DMZs

slide-12
SLIDE 12
  • dimension

solutions

Control DMZ Security

  • Firewall limits inbound and outbound traffic

– most traffic makes a stop at a “jump box”

  • Remote access VPN authenticates connections

– two-factor authentication

  • IDS, scheduled port scanning, scheduled vuln

scanning monitors DMZ servers

  • Host anti-virus / whitelisting on DMZ servers
  • Operations AD server providing centralized AAA

for operations systems access

slide-13
SLIDE 13
  • dimension

solutions

Monitoring OT Systems

slide-14
SLIDE 14
  • dimension

solutions

Monitoring OT Systems

  • Intrusion Detection System

– signature based with SCADA signatures

  • Port Scanning

– scheduled

  • Vulnerability Scanning

– manually initiated

  • System & Service Monitoring

– cpu load, disk utilization, network utilization – service availability

slide-15
SLIDE 15
  • dimension

solutions

Central Log & Event Monitoring

slide-16
SLIDE 16
  • dimension

solutions

Central Log & Event Monitoring

  • events and logs collected by n-Central

– all n-Platforms – certain Windows servers

  • critical events forwarded to email addresses

and thereby mobile phones

  • summary security status displayed on SCADA
slide-17
SLIDE 17
  • dimension

solutions

Experiences

slide-18
SLIDE 18
  • dimension

solutions

Status

  • “fully deployed” for more than a year
  • “full deployment” took several years
  • several questionable cyber events detected, but

none directly identified as attacks

– corporate network not monitored – firewalls may have blocked attacks – G&T may not have told N-Dimension of attacks

  • significant improvement in communications

availability due to dynamic routing

slide-19
SLIDE 19
  • dimension

solutions

IP is Interoperability

  • real world environments are heterogeneous

– OT: ICCP, DNP3, Modbus – proprietary SCADA, AMI, etc. – IT: RDP, HTTP, HTTPS, FTP, etc. – many custom built devices, applications

  • IP is the interoperability framework

– only 2 serial links in this G&T

  • IP network layer security protects IT & OT

– VPN, firewall, IDS, VLAN, OSPF

slide-20
SLIDE 20
  • dimension

solutions

Politics

  • we desired to implement

– network segregation within members – monitoring of member OT networks – secure remote access to member networks

  • but ownership issues intruded!

– members won’t provide details of their networks – members do not want G&T to see their traffic – G&T does not want to own/control equipment in member’s systems

slide-21
SLIDE 21
  • dimension

solutions

PCI Compliance

  • in several cases members refused Internet

connections as backup links

– these would need to be addressed in their PCI compliance requirements – poor segregation of billing functions from control functions?

slide-22
SLIDE 22
  • dimension

solutions

Geography

  • many sites are fairly remote, making any
  • nsite work require at least a full day
slide-23
SLIDE 23
  • dimension

solutions

Weather

  • adverse weather can disrupt your plans
slide-24
SLIDE 24
  • dimension

solutions

Scheduling

  • outage windows may

need to be coordinated weeks in advance

  • last minute events may

throw all those plans

  • ut the window
slide-25
SLIDE 25
  • dimension

solutions

Coordination with Third Parties

  • change windows may need to be

coordinated with 2 or 3 third parties

slide-26
SLIDE 26
  • dimension

solutions

Can’t Touch This

  • significant periods, even whole seasons, of no

changes allowed (it is critical infrastructure)

slide-27
SLIDE 27
  • dimension

solutions

Complexity

  • There are no detailed

complete up-to-date network diagrams

  • You can’t understand

everything before you start

slide-28
SLIDE 28
  • dimension

solutions

Don’t Screw Up!

have backup plans for your backup plans

slide-29
SLIDE 29
  • dimension

solutions

Safety Briefings

  • pay attention, things DO blow up

If everyone else is running you better catch up!

slide-30
SLIDE 30
  • dimension

solutions

Questions?

Thank you!