National Institute of Standards and Technology
1
NISTs Industrial Control System (ICS) Security Project Presented at - - PowerPoint PPT Presentation
NISTs Industrial Control System (ICS) Security Project Presented at the: Secure Manufacturing in the Age of Globalization Workshop November 28, 2007 Stuart Katzke and Keith Stouffer National Institute of Standards and Technology
National Institute of Standards and Technology
1
National Institute of Standards and Technology
2
National Institute of Standards and Technology
3
National Institute of Standards and Technology
4
National Institute of Standards and Technology
5
National Institute of Standards and Technology
6
* Publications currently under revision.
** Publications currently under development.
National Institute of Standards and Technology
7
Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements)
SP 800-53A
ASSESS
Security Controls
Continuously track changes to the information system that may affect security controls and reassess control effectiveness
SP 800-37 / SP 800-53A
MONITOR
Security Controls
Document in the security plan, the security requirements for the information system and the security controls planned or in place
SP 800-18
DOCUMENT
Security Controls
SP 800-37
AUTHORIZE
Information System
Determine risk to agency operations, agency assets, or individuals and, if acceptable, authorize information system operation
SP 800-53 / SP 800-30
SUPPLEMENT
Security Controls
Use risk assessment results to supplement the tailored security control baseline as needed to ensure adequate security and due diligence
FIPS 200 / SP 800-53
SELECT
Security Controls
Select baseline (minimum) security controls to protect the information system; apply tailoring guidance as appropriate Implement security controls; apply security configuration settings
IMPLEMENT
Security Controls
SP 800-70
Define criticality /sensitivity of information system according to potential impact of loss
FIPS 199 / SP 800-60
CATEGORIZE
Information System
Starting Point
Security ty L Life fe C Cycle
SP 800-39
National Institute of Standards and Technology
8
Civil, D , Defe fense, In , Inte telligence C Community ty C Collaborati tion
The G Generalized M Model
Common Information Security Requirements Unique Information Security Requirements The “Delta” Foundational Set of Information Security Standards and Guidance
Intelligence Community Department of Defense Federal Civil Agencies
Nati tional s security ty a and n non n nati tional s security ty i info formati tion s syste tems
National Institute of Standards and Technology
9
An E Ente terprise P Perspecti tive
National Institute of Standards and Technology
10
National Institute of Standards and Technology
11
National Institute of Standards and Technology
12
National Institute of Standards and Technology
13
National Institute of Standards and Technology
14
Supply C Chain R Risks § Enterprises are becoming increasingly reliant on information system services and information provided by external providers to carry out important missions and business functions. § External service provider relationships are established in a variety
National Institute of Standards and Technology
15
National Institute of Standards and Technology
16
National Institute of Standards and Technology
17
§ Security-related functions or features of the system, for example, identification and authentication mechanisms, access control mechanisms, auditing mechanisms, and encryption mechanisms.
§ Degree to which the functionality is correct, always invoked, non bypassable, and resistant to tampering. § Well-defined security policy models, structured, disciplined, and rigorous hardware and software development techniques, and good system/security engineering principles and concepts.
§ Grounds for confidence that the claims made about the functionality and quality of the system are being met. § Evidence brought forward regarding the design and implementation of the system and the results of independent assessments.
National Institute of Standards and Technology
18
§ Identifying the common g goals a and o
tives for the provision of services or information sharing; § Agreeing upon the risk risk associated with the provision of such services
§ Agreeing upon the degree of tr trustw tworth thiness needed to adequately mitigate the risk; § Determining if the information systems are worth thy o
f being tr truste ted to
§ Providing ongoing monito toring a and o
relationship is being maintained.
National Institute of Standards and Technology
19
Security ty V Visibility ty A Among B Business/M /Mission P Partn tners
Determining risk to the enterprise’s
acceptability of such risk. The objective is to achieve visibility into prospective business/mission partners information security programs…establishing a trust relationship based on the trustworthiness of information systems.
Enterprise One INFORMATION SYSTEM
Plan of Action and Milestones Security Assessment Report System Security Plan Business / Mission Information Flow Security Information Plan of Action and Milestones Security Assessment Report System Security Plan
Enterprise Two INFORMATION SYSTEM
Determining risk to the enterprise’s
acceptability of such risk.
National Institute of Standards and Technology
20
§
Managing Risk at the Enterprise Level
Coordinate ted r risk and s security ty- relate ted a acti tiviti ties; ; ente terprise-wide view s supporti ting mission/b /business fu functi tions.
Mission / Business Processes Mission / Business Processes
Information system-specific considerations
Information system Information system Information system Information system
§ Ente terprise i info formati tion s security ty p prioriti ties; a ; allocati tion o
f resources. . § S Syste temic w weaknesses a and d defi ficiencies a addressed a and c correcte ted. . § G Guidance o
tailoring a acti tiviti ties. . § O Oversight o t of s f security ty c cate tegorizati tions. . § C Common s security ty c contr trols i identi tifi fied a and a assignment o t of r f responsibiliti ties. . § C Common s security ty c contr trol i inherita tance d defi fined fo for i info formati tion s syste tems. . § M Mandato tory s security ty c confi figurati tion s setti ttings e esta tablished a and a applied. .
National Institute of Standards and Technology
21
Defe fense-in B Breadth th
National Institute of Standards and Technology
22
Defe fense-in B Breadth th
National Institute of Standards and Technology
23
National Institute of Standards and Technology
24
National Institute of Standards and Technology
25
(CIP) standards
National Institute of Standards and Technology
26
National Institute of Standards and Technology
27
– CSD: IT security expertise – ISD: ICS experience & ICS community recognition
convergence of approaches/ standards in government & private sectors
ITL ITL: In : Info formati tion Te Technology L Laborato tory MEL: M : Manufa factu turing E Engineering L Laborato tory
National Institute of Standards and Technology
28
to federally owned/operated ICSs.
holders and case studies (e.g., Bellingham Cyber Incident)
*In In a anti ticipati tion o
f possible Fe Federal E Energy R Regulato tory C Commission’s ( (FE FERC) adopti tion o
f the N North th A American E Electr tric R Reliability ty C Corporati tion ‘ ‘s ( (NERC) Criti tical In Infr frastr tructu ture P Prote tecti tion S Sta tandards ( (CIP IPs)
National Institute of Standards and Technology
29
National Institute of Standards and Technology
30
National Institute of Standards and Technology
31
– Definition of critical asset vague – Non-critical assets not really addressed
– applies to all information and the information system – Considers impact to the organization, potential impacts to other
Security Presidential Directives, potential national-level impacts – Confidentiality, availability, and integrity evaluated separately – Possible outcomes are low, moderate, and high – Highest outcome applies to system (High Water Mark)
National Institute of Standards and Technology
32
R1.
Critical A Asset I Identification R2.
Critical A Asset I Identification R3.
Critical Cy Cyber A Asset I Identification R4.
Annual A Approval R1.
Cyber S Security P Policy R2.
Leadership R3.
Exceptions R4.
Information P Protection R5.
Access Co Control R6.
Change Co Control a and Co Confgn Mg Mgmt R1.
Awareness R2.
Training R3.
Personnel Ri Risk A Assessment R4.
Access R1.
Electronic S Security P Perimeter R2.
Electronic A Access Co Controls R3.
Monitoring E Electronic A Access R4.
Cyber V Vulnerability A Assessment R5.
Documentation Re Review a and R1.
Physical S Security P Plan R2.
Physical A Access Co Controls R3.
Monitoring P Physical A Access R4. R4.Logging P Physical A Access R5.
Access L Log Re Retention R6.
Maintenance a and Te Testing R1.
Test P Procedures R2.
Ports a and S Services R3.
Security P Patch Ma Management R4.
Malicious S Software P Prevention R5.
Account Ma Management R6.
Security S Status Mo Monitoring R7. R7. Di Disposal o
Redeployment R8.
Cyber V Vulnerability A Assessment R9.
Documentation Re Review a and R1.
Cyber S Security I Incident Re Response R2.
Cyber S Security I Incident R1.
Recovery P Plans R2.
Exercises R3.
Change Co Control R4.
Backup a and Re Restore R5.
Testing B Backup Me Media 2 3 2 11 11 2 2, 2, 7 2 18 18 12 12 19 19 ,2 ,2 21 21 21 21 23 23 Co Count 1 2 2 2 5 3 1 1 2 AC- C-1 Access Co Control P P & & P P 4 8 8 13 13 13 13 AC- C-2 Account Ma Management 3 13 13 17 17 13 13 AC- C-3 Access E Enforcement AC- C-4 In Information Fl Flow E Enforcement AC- C-5 Separation o
Duties AC- C-6 Least P Privilege 3 17 17 13 13 13 13 AC- C-7 Un Unsuccessful L Logon A Attempts AC- C-8 System Us Use No Notification 1 8 AC- C-9 Previous L Logon No Notification AC- C-10 Co Concurrent S Session Co Control AC- C-11 Session L Lock AC- C-12 Session Te Termination AC- C-13 Supervision a and Re Review—A —A C C AC- C-14 Permitted A Actions w without I I o
A AC- C-15 Automated Ma Marking AC- C-16 Automated L Labeling AC- C-17 Rem Remote A Access 3 12 12 9 8 AC- C-18 Wireless A Access Re Restrictions 3 7 17 17 17 17 AC- C-19 Access Co Control f for P Portable a and Mobile S Systems 2 17 17 17 17 AC- C-20 Personally O Owned I Information Sy Systems Access Co Control CIP CIP-00
CIP CIP-00
CIP CIP-00
CIP CIP-00
CIP CIP-00
CIP CIP-00
CIP CIP-00
CIP CIP-00
NERC CIP NERC CIP FINA FINAL Ot Other - No
SP 8 800-53
Rev. . 1 Co Controls 22 22
LEGEND High baseline (no shading) Moderate baseline (12.5% grey shading) Low baseline (25% grey shading) Not in baseline (50% grey shading)
Codes
8 NERC req ≅ SP
800-53 controls
9 NERC more
specific than SP 800-53 control
13 NERC ⊂ SP
800-53 control
17 NERC less
specific than SP 800-53 control
National Institute of Standards and Technology
33
National Institute of Standards and Technology
34
National Institute of Standards and Technology
35
National Institute of Standards and Technology
36
– Provide guidance for establishing secure SCADA and ICS, including the security of legacy systems
– Overview of ICS – ICS Characteristics, Threats and Vulnerabilities – ICS Security Program Development and Deployment – Network Architecture – ICS Security Controls – Appendixes
National Institute of Standards and Technology
37
National Institute of Standards and Technology
38
National Institute of Standards and Technology
39
Project L t Leaders Keith th S Sto touffe ffer
. Stu tu K Katz tzke (301) 9 975-3877 (301) 9 975-4768 keith th.s .sto touffe ffer@n @nist.g t.gov skatz tzke@n @nist.g t.gov sec-ics@n @nist.g t.gov Web P Pages Fe Federal In Info formati tion S Security ty M Management A t Act ( t (FIS FISMA) Im Implementa tati tion P Project http ttp://c ://csrc.n .nist.g t.gov/s /sec-cert NIS IST IC T ICS S Security ty P Project http ttp://c ://csrc.n .nist.g t.gov/s /sec-cert/i t/ics
National Institute of Standards and Technology
40