Why Security Fails in Federated Systems

Similar documents
Google on BeyondCorp: Empowering employees with security for the cloud era

Firewalls (IDS and IPS) MIS 5214 Week 6

The Challenges of Risk Assessment for Smart Grid

AMI: Communications and Integration Options

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

Resilient Smart Grids

Questions for Decision Makers

App Gateway Deployment Guide

Expanding Cyber Security Management for Critical Infrastructure

Smart Grid Automation in a Cyber-Physical Context

Sheltered Harbor protects public confidence in the financial system if a catastrophic event like a cyber attack causes your critical systems,

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG

Secure Access & SWIFT Customer Security Controls Framework

CIS Top 20 #13 Data Protection. Lisa Niles: CISSP, Director of Solutions Integration

Beyond Firewalls: The Future Of Network Security

DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS

ARC BRIEF. Software-defined Industrial Networks Deliver Cybersecurity Breakthroughs. Keywords. Summary. By Harry Forbes

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Sichere Applikations- dienste

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Secure by design: An approach for a virtual power plant

Juniper Sky Advanced Threat Prevention

Software, Security, and Resiliency. Paul Nielsen SEI Director and CEO

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

Cyber Security of Power Grids

PALANTIR CYBERMESH INTRODUCTION

Service Mesh and Microservices Networking

Summary of Cyber Security Issues in the Electric Power Sector

Security Considerations for Cloud Readiness

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Regulatory Impacts on Research Topics. Jennifer T. Sterling Director, Exelon NERC Compliance Program

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

BUILDING A SMARTER SMART GRID: COUNTERACTING CYBER-THREATS IN ENERGY DISTRIBUTION

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Next Generation Privilege Identity Management

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

the Corba/Java Firewall

EMC Strategy Overview: Journey To The Private Cloud

Title: Planning AWS Platform Security Assessment?

Identity-Based Cyber Defense. March 2017

A Domestic Model to Counter the Cyberspace Threats in Iran

TAKING THE MODULAR VIEW

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Media Kit. California Cybersecurity Institute

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

MASP Chapter on Safety and Security

Green California Summit. Paul Clanon Executive Director California Public Utilities Commission April 19, 2011

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities

Maintaining Trust: Visa Inc. Payment Security Strategy

Smart Grid and Cyber Security

1. VPC and Subnet Layout

Software-Defined Secure Networks. Sergei Gotchev April 2016

CASE STUDY INSIGHTS: MICRO-SEGMENTATION TRANSFORMS SECURITY. How Organizations Around the World Are Protecting Critical Data

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Accelerate Your Enterprise Private Cloud Initiative

Rethinking Security: The Need For A Security Delivery Platform

Advanced Systems Security: Putting It Together Systems

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Using Distributed Intelligence to Aid MicroGrid and Distribution Technology Deployment

Verizon Software Defined Perimeter (SDP).

WHITE PAPER. Vericlave The Kemuri Water Company Hack

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

Information Systems Security

Smart Attacks require Smart Defence Moving Target Defence

Secure Partitioning (s-par) for Enterprise-Class Consolidation

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Smart Grid Vision DRAFT FOR DISCUSSION PURPOSES ONLY

No compromises for secure SCADA Communications even over 3rd Party Networks

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Secure & Unified Identity

What You Should Know About Communication Systems: Business Strategies and Options

Use Case Brief BORDERLESS DATACENTERS

Cyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Potential for Technology Innovation within the Internet2 Community: A Five-Year View

BILLING CODE P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission. [Docket No. RM ] Cyber Systems in Control Centers

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management

DUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION. Don Schneider GM, Smart Grid Field Deployment May 24, 2012

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

Illinois Conduit to Grid Modernization SADZI M. OLIVA, ACTING COMMISSIONER ILLINOIS COMMERCE COMMISSION

Internet Inter-Domain Traffic. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, F. Jahanian, Proc. of SIGCOMM 2010

Chapter X Security Performance Metrics

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

The Smart Grid Security Innovation Alliance. John Reynolds October 26, 2011 Cambridge, Massachusetts

Emerging Issues: Cybersecurity. Directors College 2015

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Internet Security: Firewall

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crash course in Azure Active Directory

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

Supporting Strategic Customers Needs

Transcription:

Why Security Fails in Federated Systems Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University of Southern California CSSE Research Review University of Southern California 7 March 2012

Securing the Uncontrollable Security is About Boundaries We must understand the boundaries Containment of compromise is based on those boundaries Federated Systems Cross Boundaries Federation is about control And the lack of central coordinated control By definition, we can t control parts of the system. Protecting such systems requires constraints at the boundaries.

Federated Systems The Power Grid Utilities, Operators, Customers with differing objectives. Cloud Computing Companies, providers, users The Financial System Each financial firm must protect itself The Internet Numerous independent domains of control.

How Federation Fails Traditional Security It s about protecting the perimeter. Imposing policy on ability to access protected resources. In Federated Systems The adversary is within the perimeter. There are conflicting policies. The failure lies in not defining the perimeter Or more precisely, in choosing the wrong one Allowing the boundaries to change Not implementing correct containment at the boundary

The Correct Perimeters Systems can be secure for a particular function We need to define perimeters for particular functions In the Power Grid Billing and Business operations are one function SCADA and infrastructure control are another. In the smart grid, customer access and HAN control a third In the Banking System Each bank has its own perimeter Inter-bank and transaction systems have their own Interactions with customers are all in individual protection domains

Changing Boundaries Federated systems change over time They evolve with new kinds of participants E.g. Power grid Smart Grid Now the customer is part of the control loop New peers join the federation Not all my be as trusted An adversary could acquire an existing participant Mis-guided public policy could require expansion of protection domains. This is why a monolithic security domain will not work.

Containment Containment techniques must be appropriate to the boundary and the function to be protected. Firewalls, Application Proxies, Tunnels (VPN s) suitable in the Cyber Domain. Cyber-Physical boundaries require different techniques. We must understand cyber and physical paths We must understand the coupled systems of systems impact of faults originating in single domain. We must understand the C-P impact of Cyber attack automation We need to group similar, yet distinct protection domains.

Cyber-Physical Threat Propagation Cyber-Cyber Automation and amplification, Mitigated by traditional security techniques Cyber-Physical PLC s, example, control of Electric Vehicles, Mitigate with policy and contain at next level. Physical-Cyber Coordinated Destruction, Mitigate through redundancy Physical-Physical Cascading Failures, Mitigate through physical means, e.g. circuit breakers Transitive Combinations Unexpected interactions, e.g. i-phone, leaf.

Secure Application Architecture Understanding and enforcing the goals of a system Systems Engineering High level coarse-grained security goals/policy need to be specified as part of system requirements. These need to be captured as defined protection domains or fault containment regions. Some of these can be enforced by the network, O/S, and middleware of the system. Separate from the fine-grained discretionary policies.

Summary Today s large systems are federated Understanding these systems requires proper definition of security boundaries (Protection Domains) System-of-System interactions must be understood and controlled. Failures occur when the boundaries do not match requirements. System engineering must define protection domains and fault containment regions to protect the mission requirements. Development and deployment environments should be developed that can enforce protections at these boundaries based on high level system specifications.

For More Information For updates and related information http://clifford.neuman.name/presentations/2011220120307-neuman-csse/ http://www.realmofsecurity.org/topic/failures/ http://clifford.neuman.name/publications/2011/2011-neuman-tan-mediating-cp-threat-propagation/ http://clifford.neuman.name/ http://ccss.usc.edu/