Cyber Security of Industrial Control Systems and Potential Impacts on Nuclear Power Plants

Similar documents
Cyber Security of Industrial Control Systems (ICSs)

Cyber Security Requirements for Supply Chain. June 17, 2015

Securing Industrial Control Systems

Introduction to ICS Security

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Practical SCADA Cyber Security Lifecycle Steps

Lesson Learned CIP Version 5 Transition Program

Digital substations. Introduction, benefits, offerings

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

Job Sheet 1 The SCADA System Network

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Substation SCADA Monitoring

You Can t Manage What You Don t Monitor SEL Integrated Systems and Information Management

ABB Process Automation, September 2014

Minimum Support Needed for a Reliable SCADA System

Centralized Control System Architecture

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Cybersecurity Overview

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

Firewalls (IDS and IPS) MIS 5214 Week 6

Smart Grid Standards and Certification

Control Systems Cyber Security Awareness

ENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, OUR TEAM OF PROFESSIONALS HAVE WORKED TOGETHER

IEC A cybersecurity standard approaching the Rail IoT

Building Intrinsically Secure Control and Safety Systems

Security Standards for Electric Market Participants

Securing the North American Electric Grid

playbook OpShield for NERC CIP 5 sales PlAy

Low Impact Generation CIP Compliance. Ryan Walter

VIKING. Vital Infrastructure, Networks, Information and Control Systems Management. A Research Project in the EU Seventh Framework Programme

Cyber security for digital substations. IEC Europe Conference 2017

Cyber Security What we think and what we know?

AUTHORITY FOR ELECTRICITY REGULATION

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

November 29, ECE 421 Session 28. Utility SCADA and Automation. Presented by: Chris Dyer

SECURING THE SUPPLY CHAIN

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

April 2010 Power Systems division A brief introduction. ABB Group August 25, 2011 Slide 1

Maxwell Dondo PhD PEng SMIEEE

TABLE OF CONTENTS. Section Description Page

SCADA Training - T&D Automation

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

The IT Implications of ISA 95 and ISA 99 Dennis Brandl

SCADA System Specification. Vantage Pipeline Project # May 2013

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013

Cyber Attacks on Energy Infrastructure Continue

IEEE 2014 T&D Conference Paper 14TD Storm & Flood Hardening of Electrical Substations

Instrumentation, Controls, and Automation - Program 68

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

Cybersecurity Training

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Categorizing Cyber Systems

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

FERC Hydroproject Cyber Security [FERC 3A Section 9 versus CIP v5]

Peter Overgaauw Pascal Stijns 27 Oct 2016 EXPERION PKS CONTROLS ELECTRICAL SYSTEMS TOO!

COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS

October 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer

Dr. Johan Åkerberg, ABB Corporate Research, Sweden, Communication in Industrial Automation

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

NW NATURAL CYBER SECURITY 2016.JUNE.16

50+ Incident Response Preparedness Checklist Items.

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

SCADA Software. 3.1 SCADA communication architectures SCADA system

Windsor Water Treatment Plant SCADA and Power Upgrades

Industrial Network Trends & Technologies

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Concept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities

CIP V5 Updates Midwest Energy Association Electrical Operations Conference

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities

NAVAL DISTRICT WASHINGTON SMARTSHORE CASE STUDY Jeff Johnson NDW CIO (N6)

SANS SCADA and Process Control Europe Rome 2011

NNR Regulatory Position on FPGA Based Digital I&C Systems

Securing Plant Operation The Important Steps

DRAFT Risks and Mitigations for Losing EMS Functions

How Can I Reduce Vulnerability to Cyber Attacks? V2.2

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N

Standard CIP Cyber Security Critical Cyber Asset Identification

External Supplier Control Obligations. Cyber Security

2009 E09PS E09PS E09PS E09PS E09PS E09PS38 IEEE 2009 E09PS39 E09PS40 E09PS41 E09PS42 E09PS43 IEEE 2008 E09PS44

CIP V5 Implementation Study SMUD s Experience

Standard CIP Cyber Security Critical Cyber Asset Identification

Purpose. ERO Enterprise-Endorsed Implementation Guidance

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Just How Vulnerable is Your Safety System?

Summary of Cyber Security Issues in the Electric Power Sector

Chapter 2 State Estimation and Visualization

Medical Device Cybersecurity: FDA Perspective

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Transcription:

Cyber Security of Industrial Control Systems and Potential Impacts on Nuclear Power Plants IEEE NPEC April 18, 2006 Joe Weiss, PE, CISM KEMA, Inc. Joe.weiss@kema.com (408) 253-7934

2 Why are we here? Ostensibly: Nuclear plant systems are isolated from other systems Nuclear plant networks are isolated from other networks Nuclear plant BOP systems are unique to nuclear plants Nuclear plants have adequate cyber security WRONG!!!!! 2

3 My Background - Nuclear GE Consulting EPRI Development and in-plant testing of Gamma Tip Analysis and assessment of in-core vibration issue EQ Licensing - ATWS EQ final NRC audit for LaSalle Participant in INPO MART visit to Browns Ferry Established Main Coolant Pump Vibration Program Managed Program to Justify Elimination of Response Time Testing Requirements for Pressure Sensors 3

4 My Background- Cyber EPRI KEMA Founded and technical lead for EPRI EIS program Identified vulnerabilities of control systems and differences from IT Performed vulnerability and risk assessments of Control Centers (SCADA), power plants, and substations Involved in multiple international standards organizations including ISA, IEEE, IEC, and NERC Contractor to DHS, DOE, NIST, and INL Testified to Congressional Subcommittees Developed and lead annual KEMA Control System Cyber Security Workshop Developed International Standards Coordination Meeting on Control System Cyber Security 4

5 Do Something NOW!!!! Awareness and training It s real- do something Vulnerability/risk assessments by knowledgeable experts What are the actual issues/concerns Development of control system-specific cyber security policies How can you minimize/mitigate concerns Share information with vetted (non-nuclear) groups What can I learn from others 5

6 What are Industrial Control Systems Digital systems designed to provide real time control and/or monitoring of processes eg, Turbine controls, digital feedwater controls, transformer tap changer controls Control systems generally consist of 2 parts Operator interface Windows, UNIX, LINUX This is what most people think about This is where Denial of Service occurs Field controller Proprietary Real Time Operating System This part generally has been ignored This is where real damage can be done 6

7 Industrial Control Systems SCADA Supervisory Control and Data Acquisition DCS Distributed Control System PLC Programmable Logic Controller RTU Remote Terminal Unit IED Intelligent Electronic Device Field devices Sensors, drives, etc HMI Human Machine Interface 7

8 Generations of Control Systems Generations are generally 15-25 years Nuclear may be longer Legacy (next 3-5 years) No security, cyber vulnerabilities because of backfits Next generation (next 15-25 years) Some security, cyber vulnerabilities designed in Following generation (20-25 years from now) Security and functionality designed in 8

9 Control Systems Trends Decentralizing monitoring and control Moving control down to the field devices Incorporating new technologies Wireless Neural nets, genetic algorithms, data mining Optical and other advanced sensing Networking technologies Replacing cyber dumb equipment with cyber alive equipment 9

10 Common Vulnerabilities Inadequate policies and procedures Ports and services open to outside Operating systems not patched with current releases Dial-up modems Improperly configured equipment (firewall does not guarantee protection) Improperly installed/configured software (e.g., default passwords) Inadequate physical protection Vulnerabilities related to systems of systems (component integration) 10

11 Culture The line between IT and Operations is blurring Operations and IT don t like or understand each other Engineers like toys Including very vulnerable ones Engineering doesn t view security as a procurement criteria Operations views O&M as their driver; security is an impediment 11

12 Specific Nuclear Plant Issues Many nuclear plant data networks are NOT isolated All domestic nuclear corporate data networks have already been compromised by white hat hacker Many nuclear plants connecting plant networks with corporate networks and other external networks Modems and NIC cards found in nuclear facilities Vendors still building vulnerable nuclear plant I&C systems Next generation may be more vulnerable Lack of information sharing and expertise from outside nuclear 12

13 Nuclear Regulatory Issues Cyber is a new type of threat Cyber affects may not have been adequately analyzed or assessed Plant design bases did not consider cyber scenarios Redundancy and diversity did not consider cyber Nuclear plants can be affected by events outside the plant Digital Upgrade Methodologies May not adequately address cyber Generic Letter 2006-02 Does not address cyber Nuclear plant switchyards vulnerable to cyber initiated LOOP 13

14 What are the Business Reasons Cyber events can cause component or plant unavailability Nuclear plant outages can affect grid stability and vice versa Appropriate considerations and training to respond to cyber related events can provide additional investment protection 14

15 The Threat is Real More than 70 known cases (intentional and unintentional) All industries Electric (T&D, fossil, hydro, AND nuclear) 4 nuclear facility cyber incidents Oil/gas Water Chemicals Manufacturing Railroads Damage ranging from trivial to equipment damage and death 15

16 Targeted SCADA Attack Event: Insecure GIS mapping system with no firewall led to targeted attack resulting in loss of SCADA Information Source: SCADA Engineer s presentation at 4 th KEMA Cyber Security Workshop August 2004 Impact: SCADA servers and mapping system lost for two weeks Installation of firewalls, proxy servers, IDS and LAN monitors Neighboring utility networks went from trusted to untrusted 4 Man-months to recover Lessons learned: Isolate SCADA system from corporate LAN Install firewall between the DSL router and the corporate LAN Install group of firewalls between the frame relay and neighbors to isolate all ports that are not businessrelated 16

17 Viruses/Worms Event: Unintentional effects from virus attack caused substation communication failures. Failures due to virus traffic jamming frame relays. Information Source: SCADA List server report followed up with telecom confirmation Impact: SCADA failed resulting in loss of control of switchyards Lessons learned: Assess and assure Telco (e.g., frame relays) has no Internet connections and they are appropriately secure Effective cyber security protection is required 17

18 Instrumentation Failure Event: Remotely controlled Pumped Storage Dam Failure due to instrument failure Information Source: Utility & FERC Impact: Loss of >450 MW hydro station Environmental and economic loss still being evaluated Lessons learned (preliminary): Hardwired safety systems could prevent catastrophic events Secure/Insure instrumentation 18

19 PLC PLC INL Vulnerability Demonstration Data Historian Modem Pool RTU FEP Management Console ` SCADA NETWORK BUSINESS / CORPORATE NETWORK Internet Web Server Database Server Domain Name Server (DNS) 19

20 UNIT SUBSTATIONS NOW WEB-ENABLED TO SIMPLIFY ACCESS TO POWER TRANSFORMER DATA Aug. 29, 2005 Equipped with an Ethernet interface and Web server, Vendor A Unit Substations now provide simple, affordable access to power system information including transformer coil temperatures using a standard Web browser. The pre-engineered equipment ships in standard lead-times and connects to a customer's existing Ethernet Local Area Network much like adding a PC or printer. Unit substations include a Temperature Controller, which provides remote access to transformer data, in addition to its primary role in controlling cooling fans. With a simple click of a mouse, it is easy to monitor transformer coil temperatures per phase, and verify cooling fan status at a glance. Among the many potential benefits, these new capabilities make it possible to correlate circuit loading with transformer temperatures to extend equipment life. The typical unit substation incorporates Medium Voltage Metal-Enclosed Switchgear on the primary side and Low Voltage Switchgear or Low Voltage Switchboard on the secondary. Vendor A was the first manufacturer in the world to embed an Ethernet interface and Web server into its power distribution equipment, allowing customers easier access to power system information. The family of power distribution equipment includes medium and low voltage switchgear, unit substations, motor control centers, switchboards and panelboards. 20

21 Other New Technologies 21

22 What Should Be Done - Now Control system cyber security awareness and training for engineering, plant staff, and senior management Vulnerability/risk assessments by knowledgeable experts Includes the plant and switchyard Development of control system-specific cyber security policies and procedures Review existing policies for consistency Revise procurement specifications to address cyber considerations Share information with vetted (non-nuclear) groups 22

23 What Still Needs to be Done Assess equipment capability in controlled setting Implement CERT for Control Systems Develop secure control system specifications Establish baseline for best practices Develop secure, efficient control systems (long-term goal) 23

24 Summary Many nuclear plants are vulnerable to cyber Productivity needs and replacing obsolete technologies are making control and monitoring systems vulnerable Appropriate policies, procedures, and architectures can make nuclear plants more secure and more reliable Attention should be paid to potential cyber impacts on licensing issues 24