Applying F(I)MEA-technique for SCADA-based Industrial Control Systems Dependability Assessment and Ensuring

Similar documents
Cyber Security of FPGA-Based NPP I&C Systems: Challenges and Solutions

Securing Industrial Control Systems

ISO/IEC TR TECHNICAL REPORT

CIS 5373 Systems Security

Cyber Security of Industrial Control Systems (ICSs)

Distributed Control Systems (DCS)

Security Audit What Why

University of Pittsburgh Security Assessment Questionnaire (v1.7)

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

IoT & SCADA Cyber Security Services

Critical Systems. Objectives. Topics covered. Critical Systems. System dependability. Importance of dependability

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Continuous protection to reduce risk and maintain production availability

Dependability tree 1

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Information Security in Corporation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Guide to Network Defense and Countermeasures Second Edition. Chapter 2 Security Policy Design: Risk Analysis

Cyber Security and Substation Equipment Overview

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

A Strategic Approach to Industrial CyberSecurity. Kaspersky Industrial CyberSecurity

Protecting Smart Buildings

NEN The Education Network

Chapter 4. Network Security. Part I

High performance monitoring & Control ACE3600 Remote Terminal Unit

SCADA and Smart Grid Security Tests

Information Security Controls Policy

NW NATURAL CYBER SECURITY 2016.JUNE.16

Education Network Security

COMPUTER NETWORK SECURITY

Procurement Language for Supply Chain Cyber Assurance

Protecting Critical Infrastructure. SCADA Network Security Monitoring

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

Solutions for Energy Storage Systems

Connectivity 101 for Remote Monitoring Systems

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017

Best Practices in ICS Security for System Operators

Just How Vulnerable is Your Safety System?

Using Defense in Depth to Safely Present SCADA Data for Read-Only and Corporate Reporting. Rick Bryson

SECURITY PRACTICES OVERVIEW

TOWARDS CYBER SECURED SCADA SYSTEMS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

AAD - ASSET AND ANOMALY DETECTION DATASHEET

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

Juniper Vendor Security Requirements

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

IEC A cybersecurity standard approaching the Rail IoT

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Internet of Things Toolkit for Small and Medium Businesses

Industrial Control System Security white paper

Control System Security for Social Infrastructure

Cyber security for digital substations. IEC Europe Conference 2017

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

2. INTRUDER DETECTION SYSTEMS

Indegy. Industrial Cyber Security. The Anatomy of an Industrial Cyber Attack

Control Systems Cyber Security Awareness

VIKING. Vital Infrastructure, Networks, Information and Control Systems Management. A Research Project in the EU Seventh Framework Programme

Security protection to industrial control system based on Defense-in-Depth strategy

Addressing Cyber Threats in Power Generation and Distribution

ADIENT VENDOR SECURITY STANDARD

ANALYSIS OF MODERN ATTACKS ON ANTIVIRUSES

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

Alternatives to Patching for more Secure and Reliable Control Systems

Intrusion Detection Systems (IDS)

The SCADA Connection: Moving Beyond Auto Dialers

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Practical SCADA Cyber Security Lifecycle Steps

Synology Security Whitepaper

Cyber Security and Privacy Issues in Smart Grids

IC32E - Pre-Instructional Survey

SAP Security. BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0

Back to the Future Cyber Security

Standard CIP Cyber Security Systems Security Management

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Checklist: Credit Union Information Security and Privacy Policies

NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses

Cyber Security Brian Bostwick OSIsoft Market Principal for Cyber Security

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

AUTHORITY FOR ELECTRICITY REGULATION

Information Security Policy

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

FRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

Introduction to ICS Security

IT Services IT LOGGING POLICY

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Cybersecurity Overview

Assessing Your Incident Response Capabilities Do You Have What it Takes?

K12 Cybersecurity Roadmap

Security of Information Technology Resources IT-12

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

ISO27001 Preparing your business with Snare

Transcription:

Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2008 Applying F(I)MEA-technique for SCADA-based Industrial Control Systems Dependability Assessment and Ensuring Eugene Babeshko Vyacheslav Kharchenko Anatoliy Gorbenko Abstract Dependability and security analysis of the industrial control computer-based systems (ICS) is an open problem. ICS is a complex system that as a rule consists of two levels supervisory control and data acquisition (SCADA) and programmable logic controllers (PLC) and has vulnerabilities on both levels. This paper presents results of the SCADA-based ICS dependability and security analysis using a modification of standardized FMEA (Failure Modes and Effects Analysis)-technique. The technique mentioned takes into account possible intrusions and is called F(I)MEA (Failure (Intrusion) Modes and Effects Analysis). F(I)MEAtechnique is applied for determining the weakest parts of ICS and the required means of fault prevention, fault detection and fault-tolerance ensuring. An example of F(I)MEA-technique applying for SCADA vulnerabilities analysis is provided. The solutions of SCADA-based ICS dependability improvement are proposed. 1. Introduction The current security and safety level of s does not correspond to the possible threat consequences. There is a large quantity of implemented industrial control systems which are relatively insecure and unsafe due to different kinds of disclosed vulnerabilities. Arbitrary applications of technology, informal security, and the fluid vulnerability environment lead to unacceptable risk [1]. Any vulnerability can lead to a failure if an intrusion occurs. To improve dependability of s and ensure their fault and intrusion tolerance, it is necessary to take into account the majority of possible failure and intrusion modes, their causes and the resulting influence on the system. With this purpose we propose to use a modification of standardized FMEA (Failure Modes and Effects Analysis)-technique [2] called F(I)MEA (Failure (Intrusion) Modes and Effects Analysis) [3]. In this paper we focus on analysis and ensuring reliability, security and safety of the SCADA-based industrial control systems. The structure of the paper is organized as follows. Section 2 gives short description of SCADA-based industrial control systems, their typical architectures and functions. In Section 3 we present results of failure and intrusion modes and effects analysis of s. In section 4 we give recommendations concerning dependability ensuring according to the results obtained. Finally, section 5 contains conclusions and briefly outlines the future work on implementation and reengineering of dependable and secure SCADA-based ICS. 978-0-7695-3179-3/08 $25.00 2008 IEEE DOI 10.1109/DepCoS-RELCOMEX.2008.23 309

2. SCADA-based industrial control systems Industrial control systems are extensively applied in different safety-critical infrastructures like electric power stations, oil, petroleum and natural gas communication, conversion and refinement, as well as in various manufacturing operations. Such systems are used to centrally monitor and control remote or local industrial equipment such as motors, valves, pumps, relays, sensors, etc. ICS are dependability (safety, reliability, security)-critical and critical to efficient operation of many physical processes. Typical ICS consists of two levels supervisory control and data acquisition (SCADA) and programmable logic controllers (PLC). SCADA is a necessary element of the most modern ICS. We define ICS that includes SCADA as SCADA-based industrial control system. Typical elements of SCADA-based industrial control systems and its functions are shown in the Fig. 1 Supervisory Control And Data Acquisition Preparing data for higher level ERP Process visualization Remote control User rights management Workstation Network interconnection management between server and workstations Data acquisition and processing Data logging Alarms generation Server PLC Equipment Figure 1. Typical SCADA-based industrial control system SCADA includes server (alarm server, data logging server, etc.), workstations and communication services. Server processes and logs data generates alarms, workstations provide Human Machine Interface (HMI) to users, communication lines are used for data transmission between server, workstations and other equipment. The SCADA network is usually connected to the outside corporate network (for example, to provide enterprise resource planning (ERP) systems with process information) and/or the Internet through specialized gateways [4]. Traditionally ICS were isolated and used proprietary control protocols with specialized hardware and software [5]. Modern systems use Internet protocol devices and share information with a large community (for example, [6]). Moreover, remote access to ICS via different communications channels, even wireless, is usually allowed for maintenance. This improves system usability but increases the risk of cyber intrusions. Generally, nowadays there is a tendency that s improve their performance and convenience every year but their security is still in poor condition. Proposed classification of SCADA-based ICS taking into account the problem of intrusion-tolerance is shown on the Fig. 2. In our opinion, designing systems and already implemented ones should be distinguished because analysis of designing 310

systems can help to avoid vulnerabilities during the design stage. Performance of such an analysis for systems which are already in use is more complicated. Moreover, performing some operations on vulnerability elimination is not always possible because of uninterruptable operation manner of most ICS. Figure 2. Classification of s Inadmissibility of interruptions leads to difficulties in installing security patches that eliminate disclosured vulnerabilities. SCADA and other components like PLCs tend to be hard to upgrade. For example, PLC may use an operating system and application that were burned to ROM and which are not rewritable at all. Or, in case of relatively old systems, the PLC vendor may no longer be in business or may not be producing necessary upgrades. Therefore, any part of can be insecure. So, each element should be analyzed and, if it doesn t have necessary security level, it should be replaced with other element with the same functionality but with higher security level. Any failure (caused physical, design or interaction faults) can lead to data loss. So all predicated should be prevented. How to understand which elements of SCADAbased systems are the weakest places? We propose F(I)MEA-technique for determining this. 3. F(I)MEA technique for SCADA-based ICS analysis 3.1. An overview of F(I)MEA The FMEA is a standard formalized technique for the systems reliability analysis devoted to the specification of failure modes, their sources, causes and influence on system operability [2]. Failure modes means the ways, or modes, in which something might fail. Failures are any errors or defects, especially ones that affect the customer, and can be potential (that can happen) or actual (that already happened). Effects analysis refers to studying the consequences of those. In FMEA-technique, all possible are prioritized according to how serious their consequences are, how frequently they occur and how easily they can be detected. FMEA is used during the design stage with an aim to avoid in future. In the next stages it is used for process control, before and during ongoing operation of the process. The purpose of the FMEA is to take actions to eliminate or reduce possible, starting with the highest-priority ones. It also may be used to evaluate risk management priorities for mitigating known threat-vulnerabilities. IMEA (Intrusion Modes and Effects Analysis) is a modification of FMEA that takes into account possible intrusions to the system [3]. 311

Why do we use IMEA instead (or in addition to) a standardized FMEA? There are some reasons. First of all, SCADA-based industrial control systems as a rule are critical systems. Besides, they are quite reliable, but, nevertheless, like any complex systems, SCADA-based ICS have different vulnerabilities that can be used by an intruder. Any vulnerability can become a failure if an intrusion occurs. So we use IMEA to take into account caused by intrusions using system vulnerabilities. It should be noted that FMEA and IMEA are not the only methods for complex systems and risks analysis. Different approaches are shown and examined in the work [7]. But we think that F(I)MEA technique is the most convenient and clear for specified task. 3.2. F(I)MEA tables for SCADA-based ICS As it was said before, a consists of hardware (PLCs, PCs, switches etc.) and several specific software components (database server, HMI clients, PLC program) and may have different architectures (Fig. 1). Each of these components should be taken into consideration during analysis of failure modes and effects. In this article it is examined two levels of SCADA-based ICS SCADA and PLC. We mark out data server (hardware and software), OPC server (software), HMI workstation (hardware and software) on SCADA level and discuss PLC hardware and PLC software on PLC level. In our opinion, failure influences on system operability could be interruption, termination and no influence. Interruption means that one or several system functions are not performed correctly. For example, in some cases failure may not directly cause the damage, but it may make it impossible for some businesses to operate. Termination means that system doesn t operate at all. In some cases, termination of a causes serious problems, such as discharge of a pollutant, destruction of property, fatalities. Described taxonomy is shown on the Fig. 3. Figure 3. Failure mode taxonomy We performed the analysis of and intrusions effects for software, hardware, stored data, users and as a whole. As an example we took a real SCADA-based gas cleaning system that consisted of the server, 4 workstations and 3 PLCs [8]. Obtained results were generalized to present typical SCADA-based ICS analysis (see Tables 1-2). 312

Table 1. Failures modes and effects analysis Failure Domain Stability of Occurrence accidental permanent Failure Cause Influence on Operability Failure Evidence HW Stored SW data Failure effect as a whole PLC halt termination evident crash - interruption evident limited functionality suspension - workstation PC termination evident crash - limited information about fault interruption evident crash suspension - process state server PC fault termination evident crash no data logging, no information about process state interruption evident data loss suspension termination evident - - - design faults interruption evident - - - incorrect operation - non-evident - - - incorrect service User HW environment accidental permanent incorrect input data malicious impact (intruder attack) termination evident - - interruption evident - - - non-evident - - incorrect service incorrect operation termination evident - - interruption evident - - incorrect operation - non-evident - - incorrect service termination evident hang crash corruption interruption evident hang suspension - SW environment design fault - non-evident hang incorrect operation - incorrect service Table 2. Intrusions modes and effects analysis Intrusion/Attack mode Sniffing System remote control OPC buffer overflow Attack nature passive/ active active active DoS & DDoS active Attack Cause sharing information with large community - weak authentication OPC server without latest security patches - Influence on Operability weak system termination protection interruption Intrusion effect Intrusion Evidence HW SW Stored data termination - - interruption non-evident - - - - termination - - evident interruption - - - non-evident - incorrect operation termination - interruption evident - - crash evident hang crash privacy violation as a whole compromise incorrect operation privacy and integrity violation termination User unauthorized access to user s data deny of service 313

4. Ensuring SCADA-based ICS dependability 4.1. Error recovery Error recovery allows restoring a compromised system to its operational status. The main means of SCADA-based industrial control systems error recovery are: 1) replacement of crashed hardware modules; 2) reinstallation of crashed software components (SCADA level), redownloading software if possible (PLC level); 3) installation/downloading of patches that fix known errors (if acceptable); 4) restarting servers (database server etc.), restarting PLCs. To achieve better level of ICS availability, it is necessary to have spare parts for SCADAbased ICS critical components. For example, if system has several PLCs that are hardware identical but have different software and different functions, at least one PLC must be available as a spare part. 4.2. Fault detection SCADA-based ICS user should get alert or warning for any abnormal behaviors before process becomes out of control. When any fault is detected, the graphical display and alarm messages should be shown to help user in identifying the fault place and source. Modern PLCs and SCADA provide extensive diagnostics and standard SCADA means can be used for displaying and alarms generating. 4.3. Fault prevention Fault prevention is the process of reducing the risk of an unwanted incident. This procedure uppermost is attained by quality control techniques employed during the design and manufacturing of hardware and software [9]. That is, the majority of effective fault prevention measures must be built into the SCADA-based ICS architecture and should not be added later. But for most critical systems it is impossible to foresee all possible faults. So fault prevention must be the part of regular system maintenance activities. Examples of fault prevention actions are: 1) checking of input parameters for acceptability both on SCADA and PLC levels. Even if incorrect input data was transferred to PLC (as a result of SCADA design error, or as a result of an intrusion), PLC should not produce incorrect actions. Only an appropriate alarm should be generated; 2) minimization of corporate network and industrial network interconnections. The most preferable choice is a complete SCADA-based ICS isolation from a corporate network; 3) implementation of security checking on all levels of SCADA-based ICS. User authorization and permissions must be configured properly. Workstations and servers operating systems should not have default accounts and simple passwords; 4) data encryption; 5) removing and closing all unused ports and services. 5. Conclusions Dependability analysis of SCADA-based industrial control systems should be performed not only during the design stage, but during system operation as well. New vulnerabilities are 314

discovered very often and much attention must be paid to react to them. Taking into account this circumstance, SCADA-based ICS should be evolvable systems, i.e. they should be able to evolve according to challenges related to changes of intrusion environment. The F(I)MEA is one of the most convenient techniques for SCADA-based ICS dependability analysis. FMEA and IMEA tables clearly represent current vulnerabilities and possible of s. These tables are the base for the next step of dependability assessment using, for example, PSA- or FTA-techniques. Results of F(I)MEA-analysis may be detailed depending on type and features of SCADAbased ICS. More detailed and thorough analysis allows developing, fitting and implementing more efficient means of dependability ensuring. 6. References [1] Jason Stamp, Phil Campbell, Jennifer DePoy, John Dillinger, William Young. Sustainable Security for Infrastructure SCADA [Online]. Available: http://www.tswg.gov/tswg/ip/sustainablesecurity.pdf [2] IEC 812. Analysis Techniques for System Reliability Procedure for Failure Modes and Effects Analysis (FMEA). International Electrotechnical Commission, Geneva (1985) [3] Anatoliy Gorbenko, Vyacheslav Kharchenko, Olga Tarasyuk, Alexey Furmanov. F(I)MEA-technique of Web Services Analysis and Dependability Ensuring, Lecture Notes in Computer Science, vol. 4157/2006, pp. 153-167 [4] Vinay M. Igure, Sean A. Laughter, Ronald D. Williams. Security issues in SCADA networks, Computers & Security, 25 (2006) pp. 498 506 [5] Stouffer K., Falco J., Kent K. Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. Recommendations of the National Institute of Standards and Technology [Online]. Available: http://csrc.nist.gov/publications/ [6] Kato M., Watahiki K., Suzuki T. Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks, Hitachi Review, Vol. 53 (2004), No. 3, pp. 169-173 [7] White D. Application of systems thinking to risk management: a review of the literature, Management Decision, 1995, vol. 33, 10, pp. 35-45 [8] Eugene Babeshko, Vyacheslav Kharchenko. Gas cleaning system dependability assessment. The second international scientific and technical conference "Dependable systems, services and technologies" (DeSSerT). Kirovograd, Ukraine, 2007 [9] Avizienis A., Laprie J.-C., Randell B., Landwehr C. Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, Vol. 1(1) (2004), pp. 11 33 315