virtualization and nerc-cip - utc

29
utc.org Virtualization and NERC-CIP Presented by: Cisco Systems Inc., Deloitte & Touche LLP, NIPSCO

Upload: others

Post on 07-Jan-2022

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Virtualization and NERC-CIP - UTC

utc.org

Virtualization and NERC-CIP

Presented by:

Cisco Systems Inc., Deloitte & Touche LLP, NIPSCO

Page 2: Virtualization and NERC-CIP - UTC

utc.org

UTC is a global trade association dedicated to serving critical

infrastructure providers, such as electric, gas and water utilities. Through

advocacy, education and collaboration, UTC creates a favorable business, regulatory and technology environment for our members who own

or operate Information and Communication Technology (ICT) systems

in support of their core business.

Page 3: Virtualization and NERC-CIP - UTC

Virtualization and NERC-CIP

Page 4: Virtualization and NERC-CIP - UTC

Agenda

• Introduction - UTC

• Value of Virtualization – Cisco

• Virtualization and NERC-CIP – Deloitte

• Virtualization Applied – NIPSCO

• Q&A - Panel

Page 5: Virtualization and NERC-CIP - UTC

• . John Reno IoT Product and Solutions Marketing

Cisco Systems, Inc.

Tom Alrich Manager Cyber Risk Services

Deloitte & Touche, LLP

Steven Sumichrast

Lead System Engineer

NIPSCO

Joe Andrews Manager Cyber Risk Services

Deloitte & Touche, LLP

Session Participants

Panelists

Bob Lockhart VP, Cybersecurity, Technology,

and Research

UTC

Moderator

Page 6: Virtualization and NERC-CIP - UTC

The Value of Virtualization

Page 7: Virtualization and NERC-CIP - UTC

Cloud

Physical

Virtual

Simplicity

Efficiency

Agility

Unified Data

Center

Compute

Network

Storage

Management

Security

Virtualization Scope

Page 8: Virtualization and NERC-CIP - UTC

Architect Design Where

Can We

Put It?

Procure Install Configure Secure Is It

Ready?

Manual

Cisco Experience – Status Quo

Page 9: Virtualization and NERC-CIP - UTC

Automated

Self-Service

Provisioning

Architect Design

Capacity

On-Demand

Policy-Based

Provisioning

Built-In

Governance

Design to Production Now:

From Weeks To Minutes

Page 10: Virtualization and NERC-CIP - UTC

Cisco Digital Network Architecture

Cloud Service Management

Open & Programmable | Standards-Based

Open APIs | Developers Environment

Policy | Orchestration

Automation

Abstraction & Policy Control from

Core to Edge

Virtualization

Compute | Network | Storage

Analytics

Network Data,

Contextual Insights

Network-enabled Applications

Cloud-enabled | Software-delivered

Insights & Experience

Automation & Assurance

Security & Compliance

Faster Innovation

Reduce Costs & Complexity

Lower Risk

Page 11: Virtualization and NERC-CIP - UTC

Utility Customer Example Operational Efficiency

Challenge

• Lower cost in operations and infrastructure,

especially for remote locations

• Slow and expensive service rollout that

requires service calls

Solution

• One standard platform for all locations

• Services: Routing, Firewall, Wireless LAN

Controller, WAN Optimization

Benefits

• Lower cost by utilizing x86 servers with

Cisco® NFVIS

• Keep current operational standards with

best-of-breed services

• Agile service deployment and monitoring

with Cisco ESA

Page 12: Virtualization and NERC-CIP - UTC

Virtualization and NERC CIPTom Alrich and Joe AndrewsDeloitte & Touche LLP

Page 13: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

Introduction

Virtualization provides a lot of benefits….But CIP is silent on it. Is it allowed? Not allowed?Can you do it at all? If you can, can you also remain compliant?Many NERC entities have decided not to virtualize….But some have gone ahead anyway…..

Page 14: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

A fundamental problem

Cyber Assets are “Programmable electronic devices”! VMs aren’t devices.Can you virtualize without worrying about CIP? No….So do you treat all VMs as BES Cyber Systems? Leads to other problems….Then maybe we should forget about virtualization!This solves the CIP problem, but…

Page 15: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

What is a solution?

A solution is to rewrite CIP!

The SDT is on the case, but…

Meanwhile, back at the ranch….

How is the NERC ERO approaching virtualization? Here’s…Joe!

Page 16: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

NERC ERO initial concerns & discussions

• Mixed trust environmentso Managing VM Cyber Assets (disparate trust levels)o Mixed trust authentication

• For layered virtual architectures o Applicable Standards (i.e., CIP-002, 005, 007, 010, &

CIP-011)o Enforcement of logging?o Enforcement of monitoring?o Enforcement of access controls?o Baseline snapshots (previous state VM instances)

Page 17: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

Audit approach regarding virtualization

• Virtualization is allowed (with important caveats!)o No mixed-trust environments

Medium & High BES Cyber Assets cannot coexist

o High watermark concept enforced

Lowest impact rated Cyber Asset inherits highest rating

o Host (hypervisor) and VM Cyber Assets protection

o All VMs, including Host (hypervisor) should be

inventoried

Page 18: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

Successful virtualization adoption recommendations

• Don’t be deterred

• ERO actually supports innovation

• Work closely with virtualization vendor support

Communicate compliance concerns and

requirements

Ensure your compliance staff are involved

Incorporate best practice virtualization security

controls

• Inform the ERO ahead of time

Page 19: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

Page 20: Virtualization and NERC-CIP - UTC

Copyright © 2016 Deloitte Development LLC. All rights reserved.

Contact Us

Steve LivingstonPrincipal, Cyber Risk ServicesDeloitte & Touche LLP+1 206 716 [email protected]

Joe AndrewsManager, Cyber Risk ServicesDeloitte & Touche LLP+1 248 231 [email protected]

Tom AlrichManager, Cyber Risk ServicesDeloitte & Touche LLP+1 312 515 [email protected]

Page 21: Virtualization and NERC-CIP - UTC

This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.

Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.

About Deloitte

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a detailed description of DTTL and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

Copyright © 2016 Deloitte Development LLC. All rights reserved.

Page 22: Virtualization and NERC-CIP - UTC
Page 23: Virtualization and NERC-CIP - UTC

Planning, Planning, Planning

• Virtualization team may not be same team operating BU

applications.

• Work with BU to understand the applications.

• Design requirements for CIP clusters may not fit the normal

virtualization mold.

• Primary driving factor is operational and security benefits.

• Consolidation great; not the primary driver, though.

• Consider operational cost efficiencies.

• Backup, Change Control, security controls for CIP-005/CIP-007.

Page 24: Virtualization and NERC-CIP - UTC

Know Your Environment

• Baseline the performance of the environments.

• Baseline the configuration of the environments.

• Diagrams are key for discussion points.

• Single line diagrams for logical network topologies.

• Component diagrams for physical topologies.

• Involve Network & Security teams.

• They need to know what to expect from hypervisor traffic (storage,

virtual machine migrations, etc).

Page 25: Virtualization and NERC-CIP - UTC

Consider everything

• Management consoles must be at least considered for CIP-002

inclusion.

• Often provide interactive remote access that cannot be restricted by

IP Address sources.

• Two factor considerations for management consoles listed as

EACMS w/ Interactive Remote Access.

• Follow vendor best practices.

• Individualized Access.

• Log Everything centrally.

• Use Hardware monitoring to control unauthorized changes (TPMs).

Page 26: Virtualization and NERC-CIP - UTC

Secure it!

• Follow vendor best practices.

• Isolate all hypervisor management ports. VM escape technologies

all rely on exploitation of hypervisor.

• Minimize keys to the kingdom – Only let key personnel have access

to hypervisors. Least privilege is key, not only for CIP but for your

security sanity! Not everyone needs access to the Hypervisor.

• Use Layer 2 VLANs to protect networks for the infrastructure; don’t

be tempted to add that SVI – keep the networks islanded within your

ESP infrastructure.

• Use automation tools to help with CIP-010.

• Scripted tasks to snapshot; increase or decrease capacity; block changes to

network or hosts settings.

Page 27: Virtualization and NERC-CIP - UTC

Test it!

• SCADA applications are old; they do not always get along with

the new kid on the block.

• Make sure technologies in use do not cause operational issues.

• Live migrations (e.g. VMware vMotion) often introduce VM “stun”

operations.

• Stuns may cause clocks to jump forward.

• Be mean to the environment.

• Pull cables; Introduce disk latency; introduce network latency; do

things you’d never do in production.

• Know what’s going to happen before it hits production floor.

Page 28: Virtualization and NERC-CIP - UTC

Defend it!

• Be prepared for ERO to ask for evidence showing where the

VMs live.

• Strongly advise mapping VMs to Clusters, and Clusters to Hosts.

• Develop scripts that generate audit-ready evidence for the audit team to

prove your High Impact VMs are stuck on High Impact hypervisors.

• Use vendor-provided tools to check the configuration of hosts frequently.

• Log everything – including the management console events.

• Know your virtualization technology inside and out.

• Knowing your version numbers or where configuration is in the GUI is great;

know how that vendor is controlling module loading, what traffic to expect,

how does that live migration technology actually work.

• Confidence portrayed in knowing not only your system but the technology is

incredibly important.

Page 29: Virtualization and NERC-CIP - UTC

utc.org

Questions?