Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Similar documents
Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Industrial Security - Protecting productivity IEC INDA

Security analysis and assessment of threats in European signalling systems?

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Protection Levels, Holistic Approach. ISA-99 WG 3 TG 3 Protection Levels

Cyber Security for Process Control Systems ABB's view

IC32E - Pre-Instructional Survey

Just How Vulnerable is Your Safety System?

Cyber Security Standards Developments

IEC A cybersecurity standard approaching the Rail IoT

Cyber security - why and how

ISA99 - Industrial Automation and Controls Systems Security

Protecting productivity with Industrial Security Services

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Securing Industrial Control Systems

Security in grid control centers: Spectrum Power TM Cyber Security

Hvordan kommer man i gang med et Industrial Security-koncept?

K12 Cybersecurity Roadmap

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

TABLE OF CONTENTS. Section Description Page

Cyber Security Requirements for Electronic Safety and Security

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

Cyber Security What Do I Need to Do Now?

Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant

Cybersecurity Training

Maarten Oosterink for PPA 2010 Delft, Vendor Requirements. Process Control Domain - Security Requirements for Vendors

ISA99 - Industrial Automation and Controls Systems Security

Altius IT Policy Collection Compliance and Standards Matrix

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

Industry Best Practices for Securing Critical Infrastructure

Achilles System Certification (ASC) from GE Digital

Cyber security for digital substations. IEC Europe Conference 2017

Securing Network Devices with the IEC Standard What You Should Know. Vance Chen Product Manager

Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance

Altius IT Policy Collection Compliance and Standards Matrix

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013

NW NATURAL CYBER SECURITY 2016.JUNE.16

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Process System Security. Process System Security

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

Altius IT Policy Collection

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Securing Plant Operation The Important Steps

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

SCADA Security - how to safely audit and protect Industrial Control Systems?

Operational Guidelines for Industrial Security

April Appendix 3. IA System Security. Sida 1 (8)

Information Security Management System

Introduction to ICS Security

Digital Wind Cyber Security from GE Renewable Energy

PROCESS SAFETY from POINT A to POINT Zed

Siemens Research Cyber Security

Security Challenges in Smart Distribution

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Cyber Hygiene: A Baseline Set of Practices

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich

Triconex Safety System Platforms

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Gerhard Brndt, ABB AG, BU Power Generation Cyber Security and Compliance in Increasingly Distributed and Aging Power Generation Infrastructures

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Addressing Cyber Threats in Power Generation and Distribution

Industrial control system (ICS) security

T22 - Industrial Control System Security

Security Standardization and Regulation An Industry Perspective

Industrial Defender ASM. for Automation Systems Management

Field Agents* Secure Deployment Guide

CCISO Blueprint v1. EC-Council

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Innovation policy for Industry 4.0

LESSONS LEARNED IN SMART GRID CYBER SECURITY

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Cyber Security Solutions for Industrial Controls

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Industrial Network Trends & Technologies

Functional Safety Processes and SIL Requirements

INDUSTRIAL NETWORK RESILIENCE. Davide Crispino Salvatore Brandonisio

The cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of

IPM Secure Hardening Guidelines

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS

Vulnerabilities in Process Control Networks: What Are We Protecting Against?

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

Cyber Security in the Digital Substation and Beyond. Energy Management > Energy Automation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

INDUSTRIAL CYBER SECURITY

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

Continuous protection to reduce risk and maintain production availability

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Cyber Security of Industrial Control Systems (ICSs)

Industrial Security Getting Started

Chapter 8 Information Technology

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

Table of Contents Table of Contents Disclaimer...4 Executive Summary...5 Background...6 Scope... 6 Audience... 6 Intent... 6 Other Materials... 6 Crit

GUIDE. MetaDefender Kiosk Deployment Guide

TITLE: IECEx Cybersecurity Workshop, June 2018, Weimar Report as copy of workshop presentation INTRODUCTION

Security Standards White Paper for Sino-German Industrie 4.0/ Intelligent Manufacturing

Transcription:

Functional Safety and Cyber Security Pete Brown Safety & Security Officer PI-UK

Setting the Scene 2 Functional Safety requires Security Consider just Cyber Security for FS Therefore Industrial Control Systems (ICS) Physical security Full defence in depth Safety lifecycle not Security lifecycle My personal view Discussion point for a way forward

Safety Vs Security 3 Independent domains Little interaction Convergence of technologies Common infrastructure Conflicting responsibilities Engineering Vs IT IEC 615xx risk based Vs IEC 62443 risk based

Operational / Commercial Advantages 4 Efficient management of plant / performance Remote supervision / travel Keep employees out of hazardous zone Diagnostics / MTTR IT technology lowering ICS costs Industry 4.0 / IOT / IIOT

IEC TC57 WG15 NIST PSCRF VDN TSM AGA 12 Standards / Guidelines IEC 61784-4 NERC-CIP IEC 60870-5-10x WIB M-2784 ISA- TR99 INL IEC 62351 GAO- 04-140T Roadmap to Secure Control Systems in the Energy Sector IEC 61850 Common Criteria FIPS 140-2 NIST SP 800 ISA 99 CIGRE IEC / ISA- 62443 ISO 17799, ISO/IEC 2700x BSI Grundschutz TÜV SÜD Certified Grid Control VDEW DKE US-CERT Control Systems Security Center 5

Risk Reduction 6 IPSEC Firewalls IDS/IPS CERT RADIUS Government legislation SIEM VPN Solutions? 802.1x Active Directory International Standards Antivirus RSA VLAN AAA Gates / locks PKI infrastructure Security guards

ISO 27000 Series 7 The ISO 27000 series of standards have been specifically reserved by ISO for information security matters. This of course, aligns with a number of other topics, including ISO 9000 (quality management) and ISO 14000 (environmental management). ISO/IEC 27001 describes a cybersecurity management system for business / information technology systems but much of the content in these standards is applicable to Industrial systems as well. Availability Availability

IEC 62443 8 All Industrial Control Systems Risk / lifecycle Security Level (SL) Access control Use control Data integrity Data confidentiality Restrict data flow Timely response to events Resource availability

SL 1 SL 2 SL 3 SL 4 Author / Title of the presentation IEC 62443 Protection against casual or coincidental violation Protection against intentional violation using simple means with low resources, generic skills and low motivation Protection against intentional violation using sophisticated means with moderate resources, IACS specific skills and moderate motivation Protection against intentional violation using sophisticated means with extended resources, IACS specific skills and high motivation Plant environment IEC 62443 Risk assessment System architecture zones, conduits Target SLs Achieved SLs Automation solution Capability SLs Control System capabilities Independent of plant environment 1. Part 3-2: asset owner / system integrator define zones and conduits with target SLs 2. Part 3-3: product supplier provides system features according to capability SLs 3. Capability SLs are deployed to match target SLs 3-2 Security risk assessment and system design 3-3 System security requirements and Security levels 9

Issues for Security / IEC 62443 10 How to risk assess? Detailed or high level? Where to get reliability data? Will insurance help? SIS & Connectivity SIS & Wireless SIS & Workstations CPNI detect & respond

Industrial IT Security 11 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures Security management processes Operational Guidelines Business Continuity Management & Disaster Recovery DCS/ SCADA* Network Security Security Zones & DMZ Secure architecture based on network segmentation Firewalls and VPN Implementation of Firewalls as the only access point to a security cell Potential Attack *DCS: Distributed Control System SCADA: Supervisory Control and Data Acquisition System Integrity System Hardening Adapting system to be secure by default User Account Management Access control based on user rights and privileges Patch Management Regular implementation of patches and updates Malware Detection and Prevention Anti Virus and Whitelisting

Ca Cb Cc Cd Fa Fb Fa Fb Fa Fb Risk Graph Pa Pb Pa Pb Pa Pb Pa Pb a = no special safety requirements b = individual safety system insufficient X1 X2 X3 X4 X5 X6 W3 W2 W1 a 1 2 3 4 b a 1 2 3 4 Safety Integrity Levels SIL a 1 2 3 Effect Ca Minor injury Cb Major, irreversible injury or death of one person Cc Cd Death of several persons Death of very many persons Frequency and duration Fa Seldom to often Fb Frequent to constant Danger prevention Pa Possible under cert. circum. Pb Nearly impossible Probability of occurrence W1 Very low W2 Low W3 Relatively high 12

Risk Comparison 13 Process Risk Machinery Risk Security Risk String of vulnerabilities Single vulnerability

PROFINET Security Concept 14 The PROFINET Security Concept From the PROFINET Security Guideline Network Architecture Security Zones Trust Concept within Zones Perimeter Defence Firewall/VPN Provision of Confidentiality and Integrity Transparent Integration of Firewalls

Possible Approach / Ideas 15 No accepted risk assessment method Include security team in safety hazard analysis Perform initial safety system security risk assessment Separate ICS security risk assessment SF/SIF security risk assessment Layers of protection = defence in depth Add security management elements in FSM Follow existing 61508 Association guidance There is no silver bullet! We must add layers now.

Any questions? Peter Brown Product Specialist Siemens Customer Services Mobile: 07808 825551 Email: brown.peter@siemens.com