t24 - rockwell automation · pdf filenew tools: emergence of global standards – iso, iec...

33
PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 1 T24 - Safe and Secure Help Mitigate Your Risk through Services and Technology

Upload: ngonhan

Post on 12-Feb-2018

219 views

Category:

Documents


1 download

TRANSCRIPT

PUBLIC

Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 1

T24 - Safe and SecureHelp Mitigate Your Risk through Services and Technology

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 2

Agenda

Risk Reduction Strategies

People Safety Risk Reduction Methods

Cyber Security Approach

Risk Landscape

The Problem

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 3

What Is Risk?

Vulnerability = Attack Vector * Difficulty to Exploit

Threat = Intent * Opportunity * Capabilities

Consequence = Criticality or Impact to People Safety, Environment etc.

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 4

What Is Risk?

Vulnerability = Attack Vector * Difficulty to Exploit

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 5

IT/OT Convergence

Lack of comprehensive asset inventory

Integration of new technologies

Integrate: customer demand, supply chain and industrial processes

Inflexibility

Low adoption of risk management processes

Shadow/stealth IT Lack of tools to manage

infrastructure Too much data, lack of

actionable information

Skills Gap Assets

Security is an afterthought Aging industrial control

systems and protocols Lack of proper policies and

procedures Evolving industrial security

standards

Dearth of qualified personnel 1

Achieving productivity goals

Lack of staffing to expand operations 2

(1) ARC Supplier Provided Automation Services(2) Aberdeen Group

VULNERABILITIES

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 6

ICS ATTACK VECTORS

DMZ

Email, Intranet, Business Planning & Logistics Network

IT Network

OT Network

ICS Supply Chain

wwwSIEM/SOC Servers

Remote Maintenance

SCADAServer HistorianHMI

PLC

Pump

EngineeringStation

OperatorWorkstation

Insider Threat

PLC

Actuator

PLC

Valve

PLC

Sensor

On-site Maintenance

Direct Attackon Plant Network

Direct Attack viaIT Network

USBIndirect Attack

(Compromised VPN) (Compromised Device)

VPN Device

ExternalAdversaries

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 7

What Is Risk?

Threat = Intent * Opportunity * Capabilities

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 8

Insiders Cyber CriminalsHacktivistsNation States Terrorists

THREAT LANDSCAPE

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 9

20172010 2011 2012 2013 2014

STUXNETWorm Targeting

SCADA and Modifying PLCs

OPERATION AURORA

APT Cyber Attack on 20+ High Tech,

Security & Defense Companies

NIGHT DRAGON

Advanced Persistent Threat Targeting Global Energy

SHAMOONVirus Targeting Energy

Sector LargestWipe Attack

RED OCTOBERCyber-Espionage Malware Targeting Government and

Research Organizations

FLAMEVirus use for

Targeted Cyber Espionage in the

Middle East

DUQUWorm Targeting ICS

Information Gathering

and StealingGAUSS

Information Stealer Malware

HAVEXIndustrial Control System Remote Access Trojan &

Information Stealer

HEARTBLEEDSecurity Bug and

Vulnerability Exploited

by Attackers

2015 2016

BLACKENERGYMalware Injected into

Ukrainian Power Company Network, Cut Power to the Affected Region

OP GHOULSpear-phishing

Campaign Targeting Middle East Industrial

Organizations

140197

257 245295

BLACKENERGYMalware Injected into

Power Company Network, Attackers Cut Power to the Affected

Region

290

ICS CERT INCIDENT COUNT**Only Reported Incidents in U.S.

NOTPETYARansomware Malware

BasedOn Stolen NSA

Exploits that Impacted ICS Systems

290TBD

WANNACRY

THREAT LANDSCAPE

Ransomware Malware Based

On Stolen NSAExploits that Impacted

ICS Systems

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 10

What Is Risk?

Consequence = Criticality or Impact to People Safety, Environment etc.

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 11

Consequences

Robert M. Lee and Michael Assante, SANS Institute, The Industrial Control System Cyber Kill Chain

Results In

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 12

Out of date, unpatchedinfrastructure

INDUSTRIAL CYBER RISK EQUATION

Impact to:Achieving Business Objectives

Unplanned Production LossEnvironmental Impact

Human Health & Safety

Countermeasures

Threats

Spillover from Nation State CampaignsWiper/Ransomware

Unknown asset inventory

Vulnerabilities Consequences

Basic Industrial Cyber Hygiene Advanced Countermeasures

Lack of skilled resources

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 13

Changes in Current and Future Risk

Implementation Progress Changes in Assets, Vulnerability and Threat Target Profile

Implementation

Priorities, Risk Toleranceand Budgets

Risk Management

Notional Information and Decision Flow within an Organization: NIST Cybersecurity Framework

Business/Process LevelFocus: Critical Infrastructure Risk ManagementActions: Selects Profile, Allocates Budget

Executive LevelFocus: Business RisksActions: Risk Decisions and Priorities

Focus: Securing InfrastructureActions: Implement Profile

Implementation/Operations Level

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 14

Strategic

ICS Security Methodology:Strategic vs. Tactical

Securing your operations networks with a risk-based approach

Tactical

Understand Risk Tolerance and Business

Impact

Assess Security Posture,

Threats, VulnerabilitiesDevelop / Iterate Security Profile

Implement Prioritized Action Plan

Manage, Monitor, and Respond

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 15

Strategic Help develop an OT cyber security

program Adopt an industry framework Understand customer business

drivers and risk tolerances to drive target profiles

Conduct assessments to develop an understanding of gaps

Create an improvement plan to drive the tactical approach

Tactical Execute on filling gaps as defined and

prioritized in the strategic approach Use validated designs and

architectures Implement pre-engineered

infrastructure and software solutions to achieve targets

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 16

DURINGBEFORE AFTER

Attack Continuum

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 17

Out of date, unpatchedinfrastructure

INDUSTRIAL CYBER RISK EQUATION

Impact to:Achieving Business Objectives

Unplanned Production LossEnvironmental Impact

Human Health & Safety

Countermeasures

Threats

Spillover from Nation State CampaignsWiper/Ransomware

Unknown asset inventory

Vulnerabilities Consequences

Basic Industrial Cyber Hygiene Advanced Countermeasures

Lack of skilled resources

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 18

ASSET INVENTORY SERVICES:How Does It Work?

A Rockwell Automation®

Installed Base Evaluation™ (IBE) collects

both connected and non-routable, isolated, or disconnected assets

through a manual walkthrough approach.

With context built from other inventory methods, a

disciplined Active Approach can be used to fill gaps in

attributes collected.

A continuous Passive Approach collects asset inventory by using Deep

Packet Inspection technology that understands both IT and OT protocols to enumerate asset identifiers,

including communication flow maps.

A Rockwell AutomationSoftware Inventory Evaluation acquires

Windows-based attributes to understand vulnerability footprint and remediation

steps required.

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 19

Microsoft Rockwell Automation

Release Patch Rollups:• Security fix• Quality fix

PatchQual Lab Tests Patch Rollups:• Qualification levels

(fully, partially, etc)

Remote Support Services

Stage Patches in an Azure-based WSUS:• Fully qualified patches to

match customer’s OS/applications revision

Your Infrastructure

Remote Support Services

Managed: Using vSphere HA and WSUS, we work with your team to remotely test, verify and apply patches based on standard/best practice procedures that meet your production workflows.

Customer

Fully Patched and secure ICS infrastructure

Self Service: You have the patches you need specifically for your environment and may update them as you see fit.

or

How Does It Work?

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 20

Out of Date, unpatchedInfrastructure

INDUSTRIAL CYBER RISK EQUATION

Impact to:Achieving Business Objectives

Unplanned Production LossEnvironmental Impact

Human Health & Safety

Countermeasures

Threats

Spillover from Nation State CampaignsWiper/Ransomware

Unknown Asset Inventory

Vulnerabilities Consequences

Basic Industrial Cyber Hygiene Advanced Countermeasures

Lack of skilled resources

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 21

Plan, Design, and Implement

Individually Managed Site ApplianceOT Assets

IT AssetsDeep Packet

Inspection (DPI) on IT and OT Data Streams

Alerts & Events

Managed Service Provider with OT Knowledge

Centralized Self Management (IT SOC)

And / Or

Respond, Recover

- Review infrastructure and documentation - Appliance implementation- Definition of asset criticality- Review and sterilization of baseline results for immediate remediation

Manage, Monitor and Detect

- Response and recovery plan development and review- Containment, eradication and recovery workflows- Characterize and scope potential impact- Set course of action and incident reporting

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 22

ROCKWELL AUTOMATION MANAGED SERVICES

INDIVIDUALLY MANAGED

SITE APPLIANCE

OT ASSETS IT ASSEST

CAPABILITIES BENEFITS Continuous passive and

vendor agnostic asset discovery and identification

Automated detection of operational and security anomalies

Self managed or managed by Rockwell Automation

Improve visibility of ALL connected plant floor assets

Improve cyber defense capabilities for the OT environment across the cyber attack continuum

THREAT DETECTION SERVICES

Powered by

INDUSTRIAL CONTROL SYSTEMS

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 23

Out of date, unpatchedinfrastructure

INDUSTRIAL CYBER RISK EQUATION

Impact to:

Human Health & Safety

Countermeasures

Threats

Spillover from Nation State CampaignsWiper/Ransomware

Unknown Asset Inventory

Vulnerabilities Consequences

Basic Industrial Cyber Hygiene Advanced Countermeasures

Lack of skilled resources

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 24

Focus on Consequence to Improve People Safety

Vulnerability = Attack Vector * Difficulty to Exploit

Threat = Intent * Opportunity * Capabilities

Consequence = Criticality or Impact to People Safety, Environment etc.

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 25

How Do We Define Impact to People Safety?

Industry Standards: OSHA, ISO, IEC, ANSI, NFPA Common Industry Practice is to follow Hazard Risk Number (HRN)

Degree of Possible Harm (DPH) Likelihood of Occurrence (LO) Frequency of Exposure (FE) Number of People at Risk (NP)

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 26

Target Ways to Reduce the Impact Degree of Possible Harm (DPH)

Frequency of Exposure (FE)

Likelihood of Occurrence (LO)

Number of People at Risk (NP)

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 27

27

Analogy: Bicycle Helmet Safety

27

perf

orm

ance

Functionally Safe! Comfortable Light Cool

pres

ent Functionally Safe! Comfortable (pads) Light (foam or

composite) Cool (ventilation)

past

Functionally Safe! Uncomfortable Heavy Hot

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 28

perf

orm

ance

pres

ent

past

Technological Safety Components

28

Functionally Safe!

Easy to apply Safety Rated

Products Local Diagnostics

Functionally Safe!

Cumbersome Difficult to apply Difficult to use Often Bypassed

Functionally Safe!

Flexible Task Oriented

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 29

Go from Risk to Results

Evaluate Hazards. Prioritize Improvements.

SAFETY LIFECYCLESAFETY FUNCTIONAL REQUIREMENTS SPECIFICATION (SFRS)

1 ASSESSMENT

2DESIGN & VERIFICATION3INSTALLATION & VALIDATION4MAINTAIN & IMPROVE5

Comply with Standards

Optimize Production

Reduce Risk

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 30

Solution

Task

Team

Hazard

Task and Team Based Risk Assessment

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 31

Technology to Help Reduce Risk Software for Task Based Design

QR Code Instant Access to Safety

Safety Lifecycle Progression Tools

Machine Interaction Tracking

Facility Location

Machine Group

IdentifierMachine Assessment

Functional Design

DesignCircuit/Design

ReviewInstallation Validation SOPs ADP LOTO

Confined Space

Annual Procedure Validation

% Complete 100% 78% 39% 35% 30% 26% 57% 78% 78% 13% 0%

Main Line 2 Air Cleaner YES YES NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED N/A In ScanESCMain Line 2 Bottle Div ider YES YES YES YES NEEDED NEEDED NEEDED NEEDED NEEDED N/A In ScanESCMain Line 2 Bottle Line Conv ey or YES YES NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED N/A In ScanESCMain Line 2 Cap Elev ator YES YES YES YES YES YES YES YES YES N/A In ScanESCMain Line 2 Capper YES YES YES YES YES YES YES YES YES N/A In ScanESCMain Line 2 Case Packer YES YES YES YES YES YES YES YES YES N/A In ScanESCMain Line 2 Case X-Ray YES N/A N/A N/A N/A N/A YES YES YES N/A In ScanESCMain Line 2 Decaser YES YES YES NEEDED NEEDED NEEDED YES YES YES N/A In ScanESCMain Line 2 Depalletizer YES YES YES NEEDED NEEDED NEEDED YES YES YES N/A In ScanESCMain Line 2 Filler YES YES YES NEEDED NEEDED NEEDED YES YES YES YES In ScanESCMain Line 2 Full Case Conv ey or YES N/A N/A N/A N/A N/A YES YES YES N/A In ScanESCMain Line 2 Heat Tunnel #1 YES YES NEEDED YES YES YES YES YES YES YES In ScanESCMain Line 2 Heat Tunnel #2 YES YES NEEDED YES YES YES YES YES YES YES In ScanESCMain Line 2 Hot Melt #1 YES YES NEEDED YES YES YES YES YES YES N/A In ScanESCMain Line 2 Hot Melt #2 YES N/A N/A N/A N/A N/A YES YES YES N/A In ScanESCMain Line 2 Labeler YES NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED YES YES N/A In ScanESCMain Line 2 M.T. Bottle Conv ey or YES NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED YES YES N/A In ScanESCMain Line 2 Neckbander YES YES YES YES YES NEEDED YES YES YES N/A In ScanESCMain Line 2 Ov erhead Case Conv ey or YES YES NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED N/A In ScanESCMain Line 2 Palletizer YES YES YES NEEDED NEEDED NEEDED NEEDED NEEDED NEEDED N/A In ScanESCMain Line 2 Sealer YES YES NEEDED NEEDED NEEDED NEEDED NEEDED YES YES N/A In ScanESCMain Line 2 Spiral Conv ey or YES YES NEEDED NEEDED NEEDED NEEDED NEEDED YES YES N/A In ScanESCMain Line 2 Unscrambler YES YES NEEDED NEEDED NEEDED NEEDED NEEDED YES YES N/A In ScanESC

58%

Machine Safety Lifecycle Progress

PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 32

Services to Help Reduce Risk Risk Assessments with Production Focus

Safety Program Development & Management

Site Safety Prioritization Planning

www.rockwellautomation.com

PUBLIC

Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 33

Thank You!