SAF SAFEGUAR ARDING ING CIV IVIL ILIZ IZATIO ION FORGING A - - PowerPoint PPT Presentation

saf safeguar arding ing civ ivil iliz izatio ion
SMART_READER_LITE
LIVE PREVIEW

SAF SAFEGUAR ARDING ING CIV IVIL ILIZ IZATIO ION FORGING A - - PowerPoint PPT Presentation

I N I N D U S T R I A I A L C O N T R O L S Y S T E M E M S C Y B E R E R S E C E C U R I T Y SAF SAFEGUAR ARDING ING CIV IVIL ILIZ IZATIO ION FORGING A CYBERSECURITY DEFENSE FO FO FOR UTILITIES JASON D. CHRISTOPHER INDUSTRIAL


slide-1
SLIDE 1

FO FORGING A CYBERSECURITY DEFENSE FO FOR UTILITIES JASON D. CHRISTOPHER

I N I N D U S T R I A I A L C O N T R O L S Y S T E M E M S C Y B E R E R S E C E C U R I T Y

SAF SAFEGUAR ARDING ING CIV IVIL ILIZ IZATIO ION

slide-2
SLIDE 2

3

Focused on processes that impact the real world, using industrial control systems (ICS) and operational technology (OT)

INDUSTRIAL

TECHNOLOGIES

24 x 7 10-30 16

  • perations

year lifecycle critical infrastructure sectors

slide-3
SLIDE 3

What ar are industrial control systems?

When a 0 or 1 impacts the physical world. Devices and systems include:

Sensors Controllers Motors Generators Safety Systems I/O Devices Field Devices IEDs Human- Machine Interface 4

slide-4
SLIDE 4

Evolution of Operational Technology (OT)

3rd Industrial Revolution Automation of Production by Electronics DCS | Distributed Control System SCADA | Supervisory Control & Data Acquisition 4th Industrial Revolution Smart Connected Systems “Industry 4.0” // “Industrial IoT”

STAND-ALONE LOOSELY CONNECTED HIGHLY CONNECTED

s t a n d a r d i z a t i o n

5

slide-5
SLIDE 5

Traditional IT Security Issues in OT

En Endpoint Ag Agents EN ENCRYPTION VU VULNERABILITY Y SC SCANNING AN ANTI- VI VIRUS PA PATCHING

6

slide-6
SLIDE 6

Real-world cyber-based industrial-impacts

7

AG AGAIN

Think physical processes…

2009: Centrifuge Failure 2012: Telvent Espionage 2001: Sewage Spill 2014: Furnace Loss of Control 2015 & 2016: Power Outages 2017: (un)Safety System

slide-7
SLIDE 7

STAGE 1 STAGE 2

Stage 1 and Stage 2 work together to impact industrial processes, stretching across both IT and OT networks

INDUSTRIAL ATTACKS: IT and OT

Corporate IT Plant OT

slide-8
SLIDE 8

Industrial Process Impacts

For ICS-specific capabilities, the impact would be focused on

  • perational

impacts.

9

slide-9
SLIDE 9

ICS Attack Difficulty

The knowledge involved in ICS attacks, with physical impact, includes:

  • IT security
  • OT security
  • OT-specific protocols
  • Engineering processes
  • Incident response
  • Disaster recovery

10

slide-10
SLIDE 10

WannaCry

230+ companies 150+ countries

11

Animated map from New York Times, accessed 2020-03-30: https://www.nytimes.com/interactive/2017/05/12/world/europe/wannacry-ransomware-map.html

slide-11
SLIDE 11

12

“Wiper disguised as ransomware,” with increased collateral damage beyond any initial targets.

NotPetya… Not Ransomware

+$10B 2M +65

in estimated damages computers impacted in 2HRs countries involved in response

slide-12
SLIDE 12

13

Th The I ICS Se S Securit ity C Crucible ible

slide-13
SLIDE 13

14

cr cru·ci· ci·ble le /ˈkro͞os

  • səb(ə)l

)l/

noun: a ceramic or metal container in which metals or other substances may be melted or subjected to very high temperatures. a situation of severe trial, or in which different elements interact, leading to the creation of something new.

Very high temperatures

These programs need tons of energy to achieve success.

Situation of severe trial

Managing competing interests and resources across operations

Creating something new

A sustainable, business-oriented & goal-busting ICS security program

slide-14
SLIDE 14

Forging an ICS Security Program

15

Metals Weapons & Armor

slide-15
SLIDE 15

starting with

BRONZE

strengthen using

IRON

further refine with

STEEL

Initial defenses may be resource-constrained No documentation, no lessons learned Loss of “lotto winners” could cripple the program Moving beyond ”oral history” to written law Partnered with multiple stakeholders Resources are less scarce People are trained, ready, and exercised Executives are active participants in ICS security Capabilities are “double- checked” and reviewed

slide-16
SLIDE 16

17

TH THE CYBER R ARS RSENA NAL

The The metals s desc scribe reso sour urces s and nd re resilience acro ross your r pro rogram, wh whereas the weapons are how w utilit ilitie ies ca can defend th themselves from atta ttack ckers.

Assess criticality

Link ICS security to critical processes, systems, and devices

Segments & Zones

Invest in strong perimeters around the crown jewels

Hunt evil…

Log and monitor across both IT & OT environments

Incident Response

Build and train incident response and recovery teams

"Your enemy cares not that the maintainer of an Internet- connected server left 10 years ago." @Su SunTzuCyber

slide-17
SLIDE 17

Assess where you are Roadmap where you are headed Build organically

§ Map back to criticality and impacts. § Talk in terms of business risk. § Roadmaps help address current gaps and build budgets. § Be honest. Brutally so. § Think about processes, people, and technology § Include discussions about things like “the lotto winner” or executive engagement. § Do you have a champion? § Can you scale a team? § Can you effectively use your tools?

What metal is right for your program?

slide-18
SLIDE 18

What metal is right for your program?

slide-19
SLIDE 19

What metal is right for your program?

slide-20
SLIDE 20

What metal is right for your program?

slide-21
SLIDE 21

What standard is right for your program? ID IDENT NTIF IFY PR PROT OTECT DE DETECT CT RE RESPOND RE RECO COVER

slide-22
SLIDE 22

HOW...?

WE U WE USED ED A A MA MATU TURITY ITY MO MODEL EL

23

slide-23
SLIDE 23

24

The ICS Security Crucible is applying standards & maturity models across business units, with executive support. …so how do we get there?

slide-24
SLIDE 24

And start with literally any standard

26

National Institue of Standards and Technology U.S. Department of Commerce
slide-25
SLIDE 25

27

SO WE C SO WE CAN AN USE USE TH THE R E RIGHT T T TOOL OOLS

AWESOME.

slide-26
SLIDE 26

28

cr cru·ci· ci·ble le /ˈkro͞os

  • səb(ə)l

)l/

noun: A plan to create and sustain an ICS security program, with governance and executive support, based on industry-accepted standards.

Roadmap the destination

Make an honest evaluation of where you are & where you are headed

Find (or be) a champion

Management, IT, OT, legal, HR– you are not alone.

Adopt ICS standards

ICS security needs to be “how we do business,” not “that weird thing

  • ver in the corner.”
slide-27
SLIDE 27

PREVENTION IS IDEAL. DETECTION IS A MUST.*

*detection without response, however, is of little value

slide-28
SLIDE 28

Dragos’ Year in Review provides insights and lessons learned from

  • ur team’s first-hand experience

hunting, combatting, and responding to ICS adversaries throughout the year.

Provides an analysis of ICS-specific vulnerabilities and discusses impacts, risks, and mitigation options for defenders

IC ICS VULNER ERABIL ILIT ITIES IES REP EPORT

Provides insights on the state of ICS cybersecurity, the latest trends and observations

  • f ICS-specific adversaries, and proactive

defensive recommendations.

IC ICS THREA EAT LANDSCAPE E REP EPORT

Provides a synopsis of trends observed within the industry and lessons learned from Dragos’ proactive and responsive service engagements

LE LESSONS LE LEARNED FROM TH THE F E FRONT L T LINES ES R REP EPORT

30

slide-29
SLIDE 29

THANK YOU

@jdchristopher linkedin.com/in/jdchristopher