SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Executive summary
Federal agencies are moving their industrial control
systems (ICS) from operational business networks to
separate, dedicated networks in order to enhance
security. However, without a system to test the new
equipment and software coming into these separate
networks, security risks will persist. This paper
explores the impact on security of instituting a
sanctioned ICS test lab and recommends best
practices for setting up and operating these labs.
by Pat Combs
998-2095-05-05-14AR0
How Test Labs Reduce Cyber Security Threats to Industrial Control Systems
Schneider Electric White Paper Revision 0 Page 2
According to the Ponemon Institute’s 2013 Cost of Cyber Crime Study, the average
annualized cost of cyber crime was $11.6 Million in 2013 with an average time to resolve an
attack of 65 days.
1
In the case of federal government agencies such as DOD, DOE, NNSA
and DHS, the influence of cyber crime can also be measured in terms of lives when
considering the critical nature of the infrastructure they support and manage. Industrial
Control Systems (ICS) are essential to the operations of federal facilities and therefore play
an important role in mitigating security risks to the networks.
The biggest threats to industrial control system (ICS) security are malware, inside actors, web
attacks, SQL injection, and accidental failures. According to the ICS Cyber Emergency
Response Team (ICS-CERT), a program of the Department of Homeland Security, 257 cyber
incidents were reported in 2013 from across the 16 critical infrastructure sectors they support.
This represents an increase of 30% vs. 2012
2
.
Many federal agencies today recognize the threat and are beginning to secure their industrial
control systems. Some are moving their control systems from the operational business
networks into separate, dedicated ICS networks. Oftentimes these networks handle utility
functions and business sensitive services. While such an approach represents a major step in
the right direction, new security challenges based on operational business demands need to
be addressed. A process for how vendors and employees receive approval to maintain and
upgrade the control and management systems needs to be defined.
1
Ponemon Institute, “2013 Cost of Cyber Crime Study: United States”, Ponemon Institute Research
Report, page 2, 2013
2
Industrial Control Systems Cyber Emergency Response Team, “ICS-CERT Year in Review 2013”,
Page 16, Table 2, 2014
Introduction
Figure 1
The average annualized cost
of cyber crime varies by
industry segment (courtesy
of the Ponemon Institute)
How Test Labs Reduce Cyber Security Threats to Industrial Control Systems
Schneider Electric White Paper Revision 0 Page 3
This paper examines one important approach for maintaining a secure ICS operational
environment: the deployment of DOD-accredited ICS labs for testing the equipment and
software destined to reside in a dedicated ICS network. Such testing labs will assist network
managers and operators in understanding how new hardware and software components
behave in the network and to identify any inherent security threats. Test results can then
allow management to make sound and secure business decisions and to approve or deny
network access to the new hardware or software.
The purpose of an ICS lab is to test all elements of the business SCADA environment in
order to:
1. Ensure that programmable logic controllers (PLCs), direct load controllers (DLCs),
software, servers, and workstations are properly secured.
2. Prevent the ICS network from being used as an attack vehicle against the business
network.
A typical ICS Lab requires approximately $150,000 of upfront capital investment. That cost
needs to be weighed against the elevated risk of losing millions of dollars as the result of a
cyber attack and also the potential threat to human lives.
Test labs are built for multiple reasons. In pharmaceutical labs, tests expose how a drug
reacts to a multitude of scenarios to better determine the side effects and potential benefits.
In software labs, tests are conducted to identify errors and code behaviors when subjected to
human interaction, multiple computer scenarios, or network architectures. An ICS Lab, tracks
anomalies between quality assurance goals and vendor hardware / software products.
The ICS lab should be designed to identify the highest number of manufacturer defects in the
shortest amount of time. Then, with each defect flagged, the type and level of risk for each
defect should be identified. Note that fixing the defect is not within the scope or purpose of
the ICS lab.
Therefore the viability of each product that is considered as a potential candidate for
integration into the ICS operational network is determined by how the following questions are
answered:
 Does the product perform as intended?
 What does the product connect to?
 What type of testing is to occur? (Product, system, and / or enterprise?)
 What system interconnections occur between the product’s management system and
others?
 Is this product critical to the ongoing function of the business?
 Do these systems rely on other control systems?
By answering these questions through the audit process, the ICS lab allows test engineers to
reach factual conclusions based on firm data-driven results. Thus, any doubts as to whether
the manufacturer’s product poses a risk or threat to the ICS operational network or whether it
performs as stated are addressed.
Hardware and software audits
Industrial control system audits are performed on both hardware and on the software
controlling the hardware (management software or firmware). Since industrial systems link
many different components, it is critical to understand the application for which the
technology is built. For example, some facilities use steam to heat buildings whereas others
use steam to produce electricity. Other specialized facilities incorporate radiation detection
Methodology
“By simulating the existing
ICS topology, regression
and stress testing can be
performed to identify
known and unknown
faults or defects.”
How Test Labs Reduce Cyber Security Threats to Industrial Control Systems
Schneider Electric White Paper Revision 0 Page 4
devices into their buildings while others use them as part of a campus-wide security system.
Understanding the targeted application helps in better sanitizing the control systems
equipment. The network topology is also an important consideration when designing the
audit. Hardware and software audits should test using the same topology as found in the
“live” ICS network, or as close as possible.
Software audits require a different set of hardware equipment to conduct the software tests.
For example, test plans for the firmware residing inside of industry equipment are specifically
for the firmware software and not the Energy Management System (EMS) software. Firmware
software performs specific operations, receives specific analog and digital data points, and
then passes it on to the EMS. The EMS system itself, on the other hand, is a server exposed
to multiple threats because of its numerous hardware components and robust operation
compared to a PLC’s more simple hardware.
Software audits require the use of a server equipped with the operating system currently
being used in the “live” ICS network. Equipment must be as similar to existing operational
equipment as possible. By simulating the existing ICS topology, regression and stress testing
can be performed to identify known and unknown faults or defects which, in turn, can identify
unknown hazards.
Management software is used to configure, implement, and maintain both the controllers and
the sensors that reside downstream of the controllers. It is important to understand that not
all EMS software operates the same way. HVAC system audits, for example, require the
auditor to understand which controllers interact with the management software and which
interact with the operating system (under which the management software resides).
Careful scrutiny and caution is needed during the preliminary analysis due to differences in
how each EMS application functions. Firmware, for example, is not built for security but for
bolstering a vendor’s product ease of use. This design approach results in vulnerabilities that
leave applications open to cyber attacks.
The audit should be conducted multiple times to understand how software processes are
impacted, how other controllers in close proximity are affected, and whether network
congestion occurs. For example, a vendor’s meter firmware upgrade can be tested to identify
potential data discrepancies or malfunctions prior to propagation across an ICS network of
hundreds of identical meter models.
Reporting
A formal report should be produced once each item is fully tested. The process for the testing
should be outlined and results from regression and stress tests should be posted. The report
should include a series of recommendations and a final outcome statement that
communicates whether or not the product is safe to deploy in the new dedicated network.
“Firmware is not built for
security but for bolstering
a vendor’s product ease
of use. This design
approach results in
vulnerabilities that leave
applications open to cyber
attacks.”
How Test Labs Reduce Cyber Security Threats to Industrial Control Systems
Schneider Electric White Paper Revision 0 Page 5
Over the past five years, ICS cyber attacks have escalated at a rate faster than many security
analysts had expected. In fiscal year 2012, the ICS Cyber Emergency Response Team
reported 193 known cyber incidents. By June of 2013 over 200 cyber incidents had been
reported and the ICS Cyber Emergency Response Team had forecasted a doubling of
incidents by the end of the year. The total for all of 2012 had already been surpassed by June
of 2013. The amount of attacks increased 112% in just two years. Hackers are always
gravitating towards the easiest systems to exploit and industrial control systems are now
among the most popular hacking attack targets.
Stakeholders across manufacturing and governmental domains need to be aware of the
security threats to their systems and of the solutions that are available in order to reduce
those threats. If the internal Energy Management System (EMS) mechanisms are not tested
and verified, there is no way of knowing how secure the EMS infrastructure really is.
Systematic analysis of the system and its components will have to be performed. Otherwise,
the system owners will be open to attacks on their industrial control system infrastructure.
©2014SchneiderElectric.Allrightsreserved.
Pat Combs is a 23-year veteran in the Industrial Control and cyber security industries. He
has held numerous engineering and management positions throughout the US Federal
Government and civilian industry and is currently the Schneider Electric U.S. Federal
Government Solutions Architect. He has written multiple whitepapers, speaks at conferences
on cyber security and Industrial Controls (IC) and is an active member of several industry
associations, including SAME, EFCOG, US CERT ISJWG, SANS, ISC2, ISC West, and
Energy Gov. He holds a BBA in Information Systems from James Madison University and a
MS from University of Phoenix and is a certified CISSP, CGEIT, DAU Certified Level II in
Program Management.
About the author
Conclusion

Mais conteúdo relacionado

Mais procurados

Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?Schneider Electric
 
Advantages of a modern DCS in coal handling
Advantages of a modern DCS in coal handlingAdvantages of a modern DCS in coal handling
Advantages of a modern DCS in coal handlingSchneider Electric
 
Types of Prefabricated Modular Data Centers
Types of Prefabricated Modular Data CentersTypes of Prefabricated Modular Data Centers
Types of Prefabricated Modular Data CentersSchneider Electric
 
Understanding Open Protocols in Building Automation
Understanding Open Protocols in Building AutomationUnderstanding Open Protocols in Building Automation
Understanding Open Protocols in Building AutomationSchneider Electric
 
[Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management [Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management Schneider Electric
 
Industrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerIndustrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerSchneider Electric
 
Getting Started with Advanced Network Operations
Getting Started with Advanced Network OperationsGetting Started with Advanced Network Operations
Getting Started with Advanced Network OperationsSchneider Electric
 
The Mine Central Control Room: From Concept to Reality
The Mine Central Control Room: From Concept to Reality The Mine Central Control Room: From Concept to Reality
The Mine Central Control Room: From Concept to Reality Schneider Electric
 
Industrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover MesseIndustrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover MesseSchneider Electric
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performanceSchneider Electric
 
Schneider Electric Smart City Success Stories (Worldwide)
Schneider Electric Smart City  Success Stories (Worldwide)Schneider Electric Smart City  Success Stories (Worldwide)
Schneider Electric Smart City Success Stories (Worldwide)Schneider Electric India
 
Process Automation - The Future
Process Automation  - The FutureProcess Automation  - The Future
Process Automation - The FutureSchneider Electric
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
 
Basic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemBasic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemSchneider Electric
 
Integrating efficiency into healthcare - a life cycle approach
Integrating efficiency into healthcare  - a life cycle approachIntegrating efficiency into healthcare  - a life cycle approach
Integrating efficiency into healthcare - a life cycle approachSchneider Electric
 
A framework for converting hotel guestroom energy management into ROI
A framework for converting hotel guestroom energy management into ROIA framework for converting hotel guestroom energy management into ROI
A framework for converting hotel guestroom energy management into ROISchneider Electric
 
The Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersThe Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersSchneider Electric
 

Mais procurados (20)

Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?
 
Advantages of a modern DCS in coal handling
Advantages of a modern DCS in coal handlingAdvantages of a modern DCS in coal handling
Advantages of a modern DCS in coal handling
 
Types of Prefabricated Modular Data Centers
Types of Prefabricated Modular Data CentersTypes of Prefabricated Modular Data Centers
Types of Prefabricated Modular Data Centers
 
Understanding Open Protocols in Building Automation
Understanding Open Protocols in Building AutomationUnderstanding Open Protocols in Building Automation
Understanding Open Protocols in Building Automation
 
[Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management [Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management
 
Smart Alarming Management
Smart Alarming ManagementSmart Alarming Management
Smart Alarming Management
 
Industrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerIndustrial sawmill solution Wood Mizer
Industrial sawmill solution Wood Mizer
 
Getting Started with Advanced Network Operations
Getting Started with Advanced Network OperationsGetting Started with Advanced Network Operations
Getting Started with Advanced Network Operations
 
The Mine Central Control Room: From Concept to Reality
The Mine Central Control Room: From Concept to Reality The Mine Central Control Room: From Concept to Reality
The Mine Central Control Room: From Concept to Reality
 
Industrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover MesseIndustrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover Messe
 
SCADA of the Future
SCADA of the FutureSCADA of the Future
SCADA of the Future
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performance
 
Schneider Electric Smart City Success Stories (Worldwide)
Schneider Electric Smart City  Success Stories (Worldwide)Schneider Electric Smart City  Success Stories (Worldwide)
Schneider Electric Smart City Success Stories (Worldwide)
 
Process Automation - The Future
Process Automation  - The FutureProcess Automation  - The Future
Process Automation - The Future
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
 
Basic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemBasic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control System
 
Integrating efficiency into healthcare - a life cycle approach
Integrating efficiency into healthcare  - a life cycle approachIntegrating efficiency into healthcare  - a life cycle approach
Integrating efficiency into healthcare - a life cycle approach
 
A framework for converting hotel guestroom energy management into ROI
A framework for converting hotel guestroom energy management into ROIA framework for converting hotel guestroom energy management into ROI
A framework for converting hotel guestroom energy management into ROI
 
The Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersThe Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data Centers
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
 

Semelhante a How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cyber security threats in industrial control systems

Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCourtney Brock Rabon, MBA
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfglan Glandeva
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automationjohnnywess
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfPrabaKaran649935
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Business Logic Monitoring Primer
Business Logic Monitoring PrimerBusiness Logic Monitoring Primer
Business Logic Monitoring PrimerRocco Magnotta
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesNetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesCoreTrace Corporation
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSIJMIT JOURNAL
 

Semelhante a How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cyber security threats in industrial control systems (20)

Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdf
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automation
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdf
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Power station monitoring and cyber security
Power station monitoring and cyber securityPower station monitoring and cyber security
Power station monitoring and cyber security
 
Business Logic Monitoring Primer
Business Logic Monitoring PrimerBusiness Logic Monitoring Primer
Business Logic Monitoring Primer
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesNetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 

Mais de Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design ConsiderationsSchneider Electric
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsSchneider Electric
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing Schneider Electric
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsSchneider Electric
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service ProvidersSchneider Electric
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingSchneider Electric
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSchneider Electric
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingSchneider Electric
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingSchneider Electric
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Schneider Electric
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesSchneider Electric
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Schneider Electric
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.Schneider Electric
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580Schneider Electric
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...Schneider Electric
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTSchneider Electric
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingSchneider Electric
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingSchneider Electric
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingSchneider Electric
 

Mais de Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cyber security threats in industrial control systems

  • 1. Executive summary Federal agencies are moving their industrial control systems (ICS) from operational business networks to separate, dedicated networks in order to enhance security. However, without a system to test the new equipment and software coming into these separate networks, security risks will persist. This paper explores the impact on security of instituting a sanctioned ICS test lab and recommends best practices for setting up and operating these labs. by Pat Combs 998-2095-05-05-14AR0
  • 2. How Test Labs Reduce Cyber Security Threats to Industrial Control Systems Schneider Electric White Paper Revision 0 Page 2 According to the Ponemon Institute’s 2013 Cost of Cyber Crime Study, the average annualized cost of cyber crime was $11.6 Million in 2013 with an average time to resolve an attack of 65 days. 1 In the case of federal government agencies such as DOD, DOE, NNSA and DHS, the influence of cyber crime can also be measured in terms of lives when considering the critical nature of the infrastructure they support and manage. Industrial Control Systems (ICS) are essential to the operations of federal facilities and therefore play an important role in mitigating security risks to the networks. The biggest threats to industrial control system (ICS) security are malware, inside actors, web attacks, SQL injection, and accidental failures. According to the ICS Cyber Emergency Response Team (ICS-CERT), a program of the Department of Homeland Security, 257 cyber incidents were reported in 2013 from across the 16 critical infrastructure sectors they support. This represents an increase of 30% vs. 2012 2 . Many federal agencies today recognize the threat and are beginning to secure their industrial control systems. Some are moving their control systems from the operational business networks into separate, dedicated ICS networks. Oftentimes these networks handle utility functions and business sensitive services. While such an approach represents a major step in the right direction, new security challenges based on operational business demands need to be addressed. A process for how vendors and employees receive approval to maintain and upgrade the control and management systems needs to be defined. 1 Ponemon Institute, “2013 Cost of Cyber Crime Study: United States”, Ponemon Institute Research Report, page 2, 2013 2 Industrial Control Systems Cyber Emergency Response Team, “ICS-CERT Year in Review 2013”, Page 16, Table 2, 2014 Introduction Figure 1 The average annualized cost of cyber crime varies by industry segment (courtesy of the Ponemon Institute)
  • 3. How Test Labs Reduce Cyber Security Threats to Industrial Control Systems Schneider Electric White Paper Revision 0 Page 3 This paper examines one important approach for maintaining a secure ICS operational environment: the deployment of DOD-accredited ICS labs for testing the equipment and software destined to reside in a dedicated ICS network. Such testing labs will assist network managers and operators in understanding how new hardware and software components behave in the network and to identify any inherent security threats. Test results can then allow management to make sound and secure business decisions and to approve or deny network access to the new hardware or software. The purpose of an ICS lab is to test all elements of the business SCADA environment in order to: 1. Ensure that programmable logic controllers (PLCs), direct load controllers (DLCs), software, servers, and workstations are properly secured. 2. Prevent the ICS network from being used as an attack vehicle against the business network. A typical ICS Lab requires approximately $150,000 of upfront capital investment. That cost needs to be weighed against the elevated risk of losing millions of dollars as the result of a cyber attack and also the potential threat to human lives. Test labs are built for multiple reasons. In pharmaceutical labs, tests expose how a drug reacts to a multitude of scenarios to better determine the side effects and potential benefits. In software labs, tests are conducted to identify errors and code behaviors when subjected to human interaction, multiple computer scenarios, or network architectures. An ICS Lab, tracks anomalies between quality assurance goals and vendor hardware / software products. The ICS lab should be designed to identify the highest number of manufacturer defects in the shortest amount of time. Then, with each defect flagged, the type and level of risk for each defect should be identified. Note that fixing the defect is not within the scope or purpose of the ICS lab. Therefore the viability of each product that is considered as a potential candidate for integration into the ICS operational network is determined by how the following questions are answered:  Does the product perform as intended?  What does the product connect to?  What type of testing is to occur? (Product, system, and / or enterprise?)  What system interconnections occur between the product’s management system and others?  Is this product critical to the ongoing function of the business?  Do these systems rely on other control systems? By answering these questions through the audit process, the ICS lab allows test engineers to reach factual conclusions based on firm data-driven results. Thus, any doubts as to whether the manufacturer’s product poses a risk or threat to the ICS operational network or whether it performs as stated are addressed. Hardware and software audits Industrial control system audits are performed on both hardware and on the software controlling the hardware (management software or firmware). Since industrial systems link many different components, it is critical to understand the application for which the technology is built. For example, some facilities use steam to heat buildings whereas others use steam to produce electricity. Other specialized facilities incorporate radiation detection Methodology “By simulating the existing ICS topology, regression and stress testing can be performed to identify known and unknown faults or defects.”
  • 4. How Test Labs Reduce Cyber Security Threats to Industrial Control Systems Schneider Electric White Paper Revision 0 Page 4 devices into their buildings while others use them as part of a campus-wide security system. Understanding the targeted application helps in better sanitizing the control systems equipment. The network topology is also an important consideration when designing the audit. Hardware and software audits should test using the same topology as found in the “live” ICS network, or as close as possible. Software audits require a different set of hardware equipment to conduct the software tests. For example, test plans for the firmware residing inside of industry equipment are specifically for the firmware software and not the Energy Management System (EMS) software. Firmware software performs specific operations, receives specific analog and digital data points, and then passes it on to the EMS. The EMS system itself, on the other hand, is a server exposed to multiple threats because of its numerous hardware components and robust operation compared to a PLC’s more simple hardware. Software audits require the use of a server equipped with the operating system currently being used in the “live” ICS network. Equipment must be as similar to existing operational equipment as possible. By simulating the existing ICS topology, regression and stress testing can be performed to identify known and unknown faults or defects which, in turn, can identify unknown hazards. Management software is used to configure, implement, and maintain both the controllers and the sensors that reside downstream of the controllers. It is important to understand that not all EMS software operates the same way. HVAC system audits, for example, require the auditor to understand which controllers interact with the management software and which interact with the operating system (under which the management software resides). Careful scrutiny and caution is needed during the preliminary analysis due to differences in how each EMS application functions. Firmware, for example, is not built for security but for bolstering a vendor’s product ease of use. This design approach results in vulnerabilities that leave applications open to cyber attacks. The audit should be conducted multiple times to understand how software processes are impacted, how other controllers in close proximity are affected, and whether network congestion occurs. For example, a vendor’s meter firmware upgrade can be tested to identify potential data discrepancies or malfunctions prior to propagation across an ICS network of hundreds of identical meter models. Reporting A formal report should be produced once each item is fully tested. The process for the testing should be outlined and results from regression and stress tests should be posted. The report should include a series of recommendations and a final outcome statement that communicates whether or not the product is safe to deploy in the new dedicated network. “Firmware is not built for security but for bolstering a vendor’s product ease of use. This design approach results in vulnerabilities that leave applications open to cyber attacks.”
  • 5. How Test Labs Reduce Cyber Security Threats to Industrial Control Systems Schneider Electric White Paper Revision 0 Page 5 Over the past five years, ICS cyber attacks have escalated at a rate faster than many security analysts had expected. In fiscal year 2012, the ICS Cyber Emergency Response Team reported 193 known cyber incidents. By June of 2013 over 200 cyber incidents had been reported and the ICS Cyber Emergency Response Team had forecasted a doubling of incidents by the end of the year. The total for all of 2012 had already been surpassed by June of 2013. The amount of attacks increased 112% in just two years. Hackers are always gravitating towards the easiest systems to exploit and industrial control systems are now among the most popular hacking attack targets. Stakeholders across manufacturing and governmental domains need to be aware of the security threats to their systems and of the solutions that are available in order to reduce those threats. If the internal Energy Management System (EMS) mechanisms are not tested and verified, there is no way of knowing how secure the EMS infrastructure really is. Systematic analysis of the system and its components will have to be performed. Otherwise, the system owners will be open to attacks on their industrial control system infrastructure. ©2014SchneiderElectric.Allrightsreserved. Pat Combs is a 23-year veteran in the Industrial Control and cyber security industries. He has held numerous engineering and management positions throughout the US Federal Government and civilian industry and is currently the Schneider Electric U.S. Federal Government Solutions Architect. He has written multiple whitepapers, speaks at conferences on cyber security and Industrial Controls (IC) and is an active member of several industry associations, including SAME, EFCOG, US CERT ISJWG, SANS, ISC2, ISC West, and Energy Gov. He holds a BBA in Information Systems from James Madison University and a MS from University of Phoenix and is a certified CISSP, CGEIT, DAU Certified Level II in Program Management. About the author Conclusion