SlideShare uma empresa Scribd logo
1 de 16
1 Copyright © 2014, FireEye, Inc. All rights reserved.
Case StudiesIndustrial Control Systems
Dan Scali, Manager – Industrial Control Systems
Mandiant Security Consulting Services
2 Copyright © 2014, FireEye, Inc. All rights reserved.
ICS security threats
Enterprise/IT
Plant DMZ
SCADA/ICS
Control
SCADA HistorianHMI
PLCs, Controllers, RTUs, PACs
Threat vector:
Attacks on the enterprise
Threat vector:
Attacks on ICS/SCADA systems
and devices
3 Copyright © 2014, FireEye, Inc. All rights reserved.
Case studies
 Building a comprehensive program:
How an ICS operator used Mandiant Security Consulting
Services to build an IT/OT cyber security program
 Defending the SCADA & field-level devices:
How an ICS operator used passive network monitoring to
identify SCADA network configuration flaws
4 Copyright © 2014, FireEye, Inc. All rights reserved.
Case Study
Building a cyber security program
5 Copyright © 2014, FireEye, Inc. All rights reserved.
The challenges
Maintain
compliance
Resist targeted
attacks
Support
reliability
Business imperative Implications
• 10-20k serial assets coming into
scope for NERC CIP
• Requires coordination across OT & IT
Transition from NERC CIP
v3 to NERC CIP v5
Detect, respond to, and
contain incidents
impacting grid assets
IT/OT convergence and
next-generation grid
• Integrated SOC will need visibility into
grid assets
• IR processes and technologies must
be adapted for control system
environment
• Legacy control systems technology
will be replaced
• Connectivity & exposure of power
systems will increase
6 Copyright © 2014, FireEye, Inc. All rights reserved.
FireEye’s solution: Program strategy
Mission:
To support the reliable operation of the bulk electric system in accordance with legal and
regulatory responsibilities by preventing, detecting, and responding to cybersecurity
incidents.
Governance Technology Operations
Stakeholders:
Transmission & Distribution – Cybersecurity – Power Systems IT
• Policy
• Compliance
• Training
• Asset inventory
• Metrics
• New projects
• Technical standards
• Evaluation &
Procurement
• External working groups
• Maintenance
• Incident Response
• Vulnerability & Patch
Management
Key functions & activities
7 Copyright © 2014, FireEye, Inc. All rights reserved.
Sample roadmap
8 Copyright © 2014, FireEye, Inc. All rights reserved.
Sample heatmap
9 Copyright © 2014, FireEye, Inc. All rights reserved.
Sample project plan
10 Copyright © 2014, FireEye, Inc. All rights reserved.
Case Study
Protecting the SCADA
11 Copyright © 2014, FireEye, Inc. All rights reserved.
The challenge
 Customer had invested heavily in a network segmentation
and firewall configuration effort
 Needed a way to validate that:
– No connections were possible directly from the business network
to the SCADA network
– SCADA was not able to communicate with the internet
12 Copyright © 2014, FireEye, Inc. All rights reserved.
The Solution: FireEye PX
 Ultrafast packet capture up to 20Gbps sustained
in single appliance allows for aggregation and cost
savings
 Internal or external storage options (FC or SAS)
 Ultrafast search
 patented tiered indexing system (search TBs
in seconds)
 Session Analysis
 full reconstruction of web, email, DNS, & ftp
traffic
 File extraction
 User extensible
 Industry standard PCAP format for capture data
 Export of index data in Netflow v9 or IPFIX format
13 Copyright © 2014, FireEye, Inc. All rights reserved.
PX deployment options
Firewall/DMZ
Switch
ICS
Router
Firewall/DMZ
Switch
ICS
Router Tap
(OOB)
SPAN
NX
PX
Pivot2Pcap
TAP
NX
PX
Pivot2Pcap
Router
Firewall/DMZ
ICS
Tap
(Inline)
Switch
NX
PX
Pivot2PcapTap
Enterprise Network Enterprise Network Enterprise Network
14 Copyright © 2014, FireEye, Inc. All rights reserved.
Results
15 minutes of network traffic capture data revealed:
 Traffic direct from business network to SCADA zone
 External DNS requests
 Potential multi-homed devices
 Limited segmentation between SCADA zones
15 Copyright © 2014, FireEye, Inc. All rights reserved.
Incident response workflow
FireEye threat prevention
platform (NX, EX, FX, or AX)
detects threat and generates
alert with detailed OS change
report.
Detect
A A
A
A
A
Contain
OS change report is sent to HX
appliance which then generates
indicator and pushes to
endpoint agent.
Operator can contain & isolate
the compromised endpoint by
blocking all
A A
A
A
A
traffic with single click
workflow while continuing with
the investigation.
Analyst can view detailed
exploit timeline from the
endpoint to better understand
the attack.
Validate & Contain
HX HX
PX
Analyst pivots to PX with IP
address and time of infection to
reconstruct kill chain before,
during and after to determine the
scope and impact of a threat via
captured packets.
Forensics Analysis
16 Copyright © 2014, FireEye, Inc. All rights reserved.
Questions?

Mais conteúdo relacionado

Mais procurados

Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Network Performance Channel GmbH
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
 

Mais procurados (20)

RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
CTAP
CTAPCTAP
CTAP
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
ATP
ATPATP
ATP
 
Sandboxing
SandboxingSandboxing
Sandboxing
 

Destaque

Case study of nestle training and development
Case study of nestle training and developmentCase study of nestle training and development
Case study of nestle training and development
Sachin Kharecha
 

Destaque (7)

Remote Control Automobiles at ESCAR US 2015
Remote Control Automobiles at ESCAR US 2015Remote Control Automobiles at ESCAR US 2015
Remote Control Automobiles at ESCAR US 2015
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
training and development at infosys
training and development at infosystraining and development at infosys
training and development at infosys
 
Hrm case study
Hrm case studyHrm case study
Hrm case study
 
Case study of nestle training and development
Case study of nestle training and developmentCase study of nestle training and development
Case study of nestle training and development
 

Semelhante a ICS case studies v2

Laying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezLaying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir Erez
Cloud Native Day Tel Aviv
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
Belsoft
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
team-WIBU
 

Semelhante a ICS case studies v2 (20)

[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Laying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezLaying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir Erez
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 

Último

Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
ahmedjiabur940
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
ehyxf
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
wpkuukw
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
wpkuukw
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
oopacde
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
ehyxf
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
uodye
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
uodye
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
wpkuukw
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Priya Reddy
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
Rishabh332761
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
uodye
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
tufbav
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
uodye
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
Abortion pills in Riyadh +966572737505 get cytotec
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
ougvy
 

Último (20)

Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptx
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 

ICS case studies v2

  • 1. 1 Copyright © 2014, FireEye, Inc. All rights reserved. Case StudiesIndustrial Control Systems Dan Scali, Manager – Industrial Control Systems Mandiant Security Consulting Services
  • 2. 2 Copyright © 2014, FireEye, Inc. All rights reserved. ICS security threats Enterprise/IT Plant DMZ SCADA/ICS Control SCADA HistorianHMI PLCs, Controllers, RTUs, PACs Threat vector: Attacks on the enterprise Threat vector: Attacks on ICS/SCADA systems and devices
  • 3. 3 Copyright © 2014, FireEye, Inc. All rights reserved. Case studies  Building a comprehensive program: How an ICS operator used Mandiant Security Consulting Services to build an IT/OT cyber security program  Defending the SCADA & field-level devices: How an ICS operator used passive network monitoring to identify SCADA network configuration flaws
  • 4. 4 Copyright © 2014, FireEye, Inc. All rights reserved. Case Study Building a cyber security program
  • 5. 5 Copyright © 2014, FireEye, Inc. All rights reserved. The challenges Maintain compliance Resist targeted attacks Support reliability Business imperative Implications • 10-20k serial assets coming into scope for NERC CIP • Requires coordination across OT & IT Transition from NERC CIP v3 to NERC CIP v5 Detect, respond to, and contain incidents impacting grid assets IT/OT convergence and next-generation grid • Integrated SOC will need visibility into grid assets • IR processes and technologies must be adapted for control system environment • Legacy control systems technology will be replaced • Connectivity & exposure of power systems will increase
  • 6. 6 Copyright © 2014, FireEye, Inc. All rights reserved. FireEye’s solution: Program strategy Mission: To support the reliable operation of the bulk electric system in accordance with legal and regulatory responsibilities by preventing, detecting, and responding to cybersecurity incidents. Governance Technology Operations Stakeholders: Transmission & Distribution – Cybersecurity – Power Systems IT • Policy • Compliance • Training • Asset inventory • Metrics • New projects • Technical standards • Evaluation & Procurement • External working groups • Maintenance • Incident Response • Vulnerability & Patch Management Key functions & activities
  • 7. 7 Copyright © 2014, FireEye, Inc. All rights reserved. Sample roadmap
  • 8. 8 Copyright © 2014, FireEye, Inc. All rights reserved. Sample heatmap
  • 9. 9 Copyright © 2014, FireEye, Inc. All rights reserved. Sample project plan
  • 10. 10 Copyright © 2014, FireEye, Inc. All rights reserved. Case Study Protecting the SCADA
  • 11. 11 Copyright © 2014, FireEye, Inc. All rights reserved. The challenge  Customer had invested heavily in a network segmentation and firewall configuration effort  Needed a way to validate that: – No connections were possible directly from the business network to the SCADA network – SCADA was not able to communicate with the internet
  • 12. 12 Copyright © 2014, FireEye, Inc. All rights reserved. The Solution: FireEye PX  Ultrafast packet capture up to 20Gbps sustained in single appliance allows for aggregation and cost savings  Internal or external storage options (FC or SAS)  Ultrafast search  patented tiered indexing system (search TBs in seconds)  Session Analysis  full reconstruction of web, email, DNS, & ftp traffic  File extraction  User extensible  Industry standard PCAP format for capture data  Export of index data in Netflow v9 or IPFIX format
  • 13. 13 Copyright © 2014, FireEye, Inc. All rights reserved. PX deployment options Firewall/DMZ Switch ICS Router Firewall/DMZ Switch ICS Router Tap (OOB) SPAN NX PX Pivot2Pcap TAP NX PX Pivot2Pcap Router Firewall/DMZ ICS Tap (Inline) Switch NX PX Pivot2PcapTap Enterprise Network Enterprise Network Enterprise Network
  • 14. 14 Copyright © 2014, FireEye, Inc. All rights reserved. Results 15 minutes of network traffic capture data revealed:  Traffic direct from business network to SCADA zone  External DNS requests  Potential multi-homed devices  Limited segmentation between SCADA zones
  • 15. 15 Copyright © 2014, FireEye, Inc. All rights reserved. Incident response workflow FireEye threat prevention platform (NX, EX, FX, or AX) detects threat and generates alert with detailed OS change report. Detect A A A A A Contain OS change report is sent to HX appliance which then generates indicator and pushes to endpoint agent. Operator can contain & isolate the compromised endpoint by blocking all A A A A A traffic with single click workflow while continuing with the investigation. Analyst can view detailed exploit timeline from the endpoint to better understand the attack. Validate & Contain HX HX PX Analyst pivots to PX with IP address and time of infection to reconstruct kill chain before, during and after to determine the scope and impact of a threat via captured packets. Forensics Analysis
  • 16. 16 Copyright © 2014, FireEye, Inc. All rights reserved. Questions?