Logical Ports and Services
David Sopata 4/14/2016
Logical Ports and Services David Sopata 4/14/2016 Agenda High - - PowerPoint PPT Presentation
Logical Ports and Services David Sopata 4/14/2016 Agenda High level methodology and tips from a recovering CIP Auditor on how to: Identify Ports and Services for BES Cyber Systems and/or Assets CIP-007-6 Justifying the use of Ports
David Sopata 4/14/2016
Forward Together • ReliabilityFirst
Agenda
2
recovering CIP Auditor on how to:
Assets CIP-007-6
Forward Together • ReliabilityFirst
A little bit about me…
3
Forward Together • ReliabilityFirst
WARNING!!!!
be the next maturity step towards good practice.
4
Forward Together • ReliabilityFirst
CIP-007-6 Part 1.1
5
Asset Level Requirement, High and Medium Impact
Forward Together • ReliabilityFirst
CIP-007-6 R1.1
6
‒ All enabled logical ports that are generally associated with “layer 4” of the OSI Network model
‒ “windows services” for Windows environments or PID for the “*nix” type environments.
something different.
Forward Together • ReliabilityFirst
CIP-007-6 R1.2
7
and FAQs
‒ Disabling all unnecessary input/output ports on BES Cyber Assets i.e. (Ethernet, Serial, USB, and/or other common/proprietary ports) ‒ This is to try to prevent plugging in unauthorized removable storage, and/or transient devices
physical means of disabling the ports and through signage.
Forward Together • ReliabilityFirst
8
Forward Together • ReliabilityFirst
CIP-007-6 R1.1 Evidence/Audit Approach
9
disabling or restricting ports
included in your High and Medium BES Cyber Systems.
a baseline of ports that are used and what services they are tied to for ALL Cyber Assets included in your High and Medium BES Cyber Systems.
‒ Command Line output such as “netstat –boan” for Windows or “netstat – pault” for *nix ‒ Configuration files ‒ Vendor/third-party device configuration/policy management tools and reports
program/PID that are listening/active, and justified!
Forward Together • ReliabilityFirst
CIP-007-6 R1.1 Evidence/Audit Approach
10
enforced for ALL BES Cyber Assets.
‒ Vendor/third-party device configuration/policy management tools ‒ Device-level/host-based firewalls systems/tools
Asset can not enforce/restricts these ports and services, TFEs may be required.
vendor for guidance.
Forward Together • ReliabilityFirst
11
Forward Together • ReliabilityFirst
Need to start at our foundation!!!
12
BES Cyber Systems
‒ It may be found that there could be some better logical grouping of assets.
System assets however they see fit. It can even be different between standards and requirements. *
* In order to survive CIP-010-2 baselines, it has to get down to the Cyber Asset Level.
start digging around and start poking cyber assets right?...
Forward Together • ReliabilityFirst
13
Forward Together • ReliabilityFirst
Sources to start the search
14
documentation for your BES Cyber System and specific BES Cyber Assets i.e. EMS, DCS, ICS, SCADA systems
may need to do some technical device
Forward Together • ReliabilityFirst
Sources to start the search cont.
15
and/or technical manuals that show capabilities, what ports and protocols are available, and even example configurations and/or configuration options.
suggested best practice baselines such as
‒ NIST Special Publications (NIST-SP-800-XXX) (some are device specific, but most are more general best practice) ‒ SANS Institute (some are device specific, but most are more general best practice) ‒ Center for Internet Security (CIS)* baselines and benchmarks (device specific, line-by- line configuration)
baselines to meet your environment!!!!
Forward Together • ReliabilityFirst
Sources to start the search cont.
16
can’t be found in these sources or the vendor site is not easy to navigate?
Forward Together • ReliabilityFirst
Search Engine Hacking
17
and information, and even vulnerabilities! Aka... Open- source Intelligence (OSTIN)
site:www.url.com –ext:pdf
ending in .pdf. https://www.ethicalhacker.net/features/book-reviews/google- hacking-ten-simple-security-searches-that-work Google Hacking for Pentesters 3rd Addition, by Johnny Long
Forward Together • ReliabilityFirst
Search Engine Hacking cont.
18
previously cached webpages from back in the past
someone can find problem and/or answers to issues found with different devices.
with malicious intent search these sites too!
Forward Together • ReliabilityFirst
How do I find Ports and Protocols?
19
Registry
numbers/service-names-port-numbers.xhtml
‒ System Ports (0-1023) assigned by IETF ‒ User Ports (1024-49151) assigned by IETF ‒ Dynamic and/or Private Ports (49152 – 65535) assigned by IANA using the IETF review process ‒ Transport Protocol used (udp/tcp) ‒ RFCXXXX reference of known protocols
HTML, Plain Text)
protocols and do not follow protocols as they were defined in the RFCs.
through some of the RFCs (Don’t operate heavy machinery while reading.)
Forward Together • ReliabilityFirst
Quiz Time…
20
protocols commonly found in ESPs?
Forward Together • ReliabilityFirst
I found it, now what do I do with it?
21
system of your BES Cyber System Assets and
would you want to go hunting for it again? Why make someone else hunt for it?
develop your baselines for CIP-010-2, monitoring rules for the SIEM, help new hires understand your systems. etc.
Forward Together • ReliabilityFirst
Who’s talking to whom? Why?
22
assets/devices/appliances
assets/devices that are unknown where we would need to do additional technical interrogation.
starting point telling us some port ranges.
Forward Together • ReliabilityFirst
Who’s talking to whom? Why? Cont.
23
‒ Vulnerability Tools (OpenVAS, Nessus, etc.) Authenticated Scans generally are better if possible ‒ End-Point-Protection system (HIPS/HIDS systems) ‒ Netstat ‒ Process Hacker (third-party application shows the same info as NetStat and more, in real-time)
‒ Vulnerability Tools (OpenVAS, NMAP, Nessus, etc.) unauthenticated scans ‒ Network Analyzers (Wireshark, etc.) ‒ Software Information Event Managers (SIEM) (SecurityOnion, Logrhythm, NetIQ, Qradar, McAfee, AlienVault, Secure IQ, Splunk etc… )
Ensure to use these types of tools in the Lab environment before ever using them in production!
Forward Together • ReliabilityFirst
Large Range of Dynamic Ports
24
wide range of ports?
‒ Even though it might be a wide range of ports, if we identify
‒ It’s better than not documenting it!
monitoring and building alerts.
=
and monitor.
will complete for ranges in the Dynamic Ports. (i.e. another increase factor)
can and automate monitoring as much as we to keep up with threats within the environment!
Forward Together • ReliabilityFirst
CIP 010-2, R1
25
Forward Together • ReliabilityFirst
Baselines by “individual or by group”
develop less baselines
showing that they are configured the same and are managed the
‒ i.e. malware detection/prevention, group policy settings, same ports and services are enabled/disabled same system accounts… etc.
harder to show an audit team that a group of Cyber Assets should be treated as one baseline.
there is consistency
26
Forward Together • ReliabilityFirst
Baselining Best Practices
Policy
control systems
development and maintenance of baseline configurations
27
Forward Together • ReliabilityFirst
CIP 010-2, R1.2
from the existing baseline configuration
28
Forward Together • ReliabilityFirst
CIP 010-2, R1.2 – Best Practices
tracked
29
Forward Together • ReliabilityFirst
CIP 010-2, R1.2 – Best Practices
the change
and monitoring processes (as defined in CIP- 007-6, CIP-008-5, and CIP-010-6) and going beyond for monitoring changes to baselines.
30
Forward Together • ReliabilityFirst
CIP 010-2, R1.2 – Best Practices Cont.
practice for log and monitoring?
Monitoring (FIM) logs (to detect unauthorized changes to systems)
indication of someone/something trying to evade anti-malware detection)
and services and cyber assets. (NetFlow, rule hits stats on the firewall)
…etc…
31
Forward Together • ReliabilityFirst
CIP 010-2, R1.2 – Best Practices Cont.
32
Forward Together • ReliabilityFirst
CIP 010-2, R1.2 – Best Practices Cont.
we not talk and coordinate with Network Operations/Security Operations/ NOC/SOC/ISOC team and let them know?
the NOC and see who answers.
33
Forward Together • ReliabilityFirst
CIP 010-2, R1.3
34
Forward Together • ReliabilityFirst
CIP 010-2, R1.3 – Best Practices
changes to configuration baselines
35
Forward Together • ReliabilityFirst
CIP 010-2, R1.4
to security controls in CIP-005 and CIP-007
36
Forward Together • ReliabilityFirst
CIP 010-2, R1.4
cyber security controls that could be impacted by the change
not adversely affected
37
Forward Together • ReliabilityFirst
CIP 010-2, R1.4 – Best Practice
what controls could be impacted
etc., to ensure consistency
environment to watch for changes? Could be used to also help improve log and monitoring tools in production.
38
Forward Together • ReliabilityFirst
CIP 010-2, R1.5
39
Forward Together • ReliabilityFirst
CIP 010-2, R1.5
005-5 and CIP-007-6)
environment
environment
40
Forward Together • ReliabilityFirst
CIP 010-2, R1.5 – Best Practices
testing all controls
and procedures
Systems, not just High
41
Forward Together • ReliabilityFirst
Conclusion…..
42
Forward Together • ReliabilityFirst
Reference
reviews/google-hacking-ten-simple-security- searches-that-work
database/
Johnny Long
43
Forward Together • ReliabilityFirst
Forward Together ReliabilityFirst
44