AI&SC
AI&SC
CHAPTER
3
Book Table of Contents
ISBN: 978-1-941546-82-6
No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written per-
mission of the publisher.
ISA
67 T. W. Alexander Drive
P.O. Box 12277
Research Triangle Park, NC 27709
Some of the basic principles of information system security were presented in Chapter
2 as a prelude to selectively and properly applying them to securing industrial auto-
mation and control systems. As a prerequisite to this adaptation, it is important to
examine the differences in culture, requirements, and operational issues between auto-
mation and control systems and IT systems. Critical areas that have to be addressed
include safety, real-time demands, maintenance, productivity, training, and person-
nel mindsets. These topics and related subject areas are discussed in this chapter to
help the reader better understand how to apply security principles to automation and
control systems without negatively impacting their primary mission and in full
acknowledgement of their special requirements.
65
66 Industrial Automation and Control System Security Principles, Second Edition
The motivation, requirements, and focus of each of the groups are, in many
instances, largely divergent, with some overlapping common areas. For exam-
ple, software quality and process improvement methods widely used in the IT
environment are often foreign to control engineers and in fact may be viewed
as cumbersome in implementing SCADA and process control algorithms. In
addition, the performance of a process in a plant is critical, and inadequate
performance in production areas can result in huge financial losses, equip-
ment damage, and personnel injuries. These severe consequences of opera-
tional errors are not usually a common occurrence in IT facilities. Similarly,
safety is a critical concern in a production environment, and control system
malfunctions can result in fires or explosions in some instances. Thus, in a
production environment, safety and performance usually take precedence
over information security, which is not the case in an IT system.
Some of the major differences between IT and industrial automation and con-
trol system requirements are listed in Table 3-1.
Impact of equipment Equipment modifications, Many legacy systems in use with few
upgrades upgrades, and replacements changes over periods of many years.
occur almost continuously in
various parts of organizations.
Tolerance to loss of Consequences can range from Consequences can be very severe
integrity minimal to extremely harmful if because, in many instances, critical
critical data has been altered decisions are made based on data
and is acted on as being valid. assumed to be correct.
68 Industrial Automation and Control System Security Principles, Second Edition
Figure 3-1 summarizes the important issues listed in Table 3-1 and empha-
sizes some of the common areas between IT and automation and control
systems.
ͻ Integrity must be
ͻ Frequent backups preserved ͻ Infrequent backups
ͻ Temporary ͻ Availability must ͻ Minimal shutdowns
shutdowns be preserved ͻ Some encryption
ͻ Advanced encryption ͻ Protection ͻ Minimal change
ͻ Formal patch and against malware management
change management is critical ͻ Penetration testing can
ͻ Penetration testing ͻ Intrusions must be harmful
ͻ Frequent upgrades be prevented, ͻ Infrequent upgrades
detected and
ͻ Some delays ͻ Delays intolerable
responses taken
tolerable
ͻ Memory and CPU
ͻ Personnel safety
ͻ Memory and CPU cycles minimal for
is paramount
cycles available for security software
security software ͻ Physical security
must be well- ͻ Data loss intolerable
ͻ Some data loss
executed ͻ Auditing infrequently
tolerable
conducted
ͻ Wireless security
ͻ Formal auditing
is critical
conducted
ͻ Personnel
ͻ Confidentiality critical
screening is
critical
systems. Organizations, such as ISA, have addressed this problem and are
filling a critical need. NIST has generated special publications that directly
address industrial automation and control systems. However, it is important
that security training related to the control of production lines, industrial
processes, electrical transmission and distribution, pipelines, chemical
70 Industrial Automation and Control System Security Principles, Second Edition
Threats
Threats to IT and industrial automation and control systems come from differ-
ent sources, with different motivations. It is important to understand these
72 Industrial Automation and Control System Security Principles, Second Edition
threat sources and their characteristics in order to counter any malicious activi-
ties on their part. NIST SP 800-301 summarizes the various types of threat
sources and some of their driving factors, as shown in Table 3-2. Table 3-3,
also from NIST SP 800-30, provides a listing of some general threat sources,
including environmental ones, which can also cause disruptions to industrial
automation and control systems.
This data is plotted in Figures 3-2 and 3-3 for antennas 1 and 2, respectively.
Note that the digital electronics generate more peak radiation generally and
more at high frequencies compared to the analog equipment. These peak
emissions have the potential to interfere with control system signals and cause
malfunctions if proper shielding and isolation are not applied.
120
Antenna 1
100
Amplitude G%ȝ9/m
80
60
Analog
Digital
40
20
0
1.34 468 826 928 1350 1880 1920 2410 2460 5820
Frequency MHz
120
Antenna 2
100
80
Amplitude G%ȝ9/m
60
Analog
Digital
40
20
0
1.04 2 4.55 10 1000 1170 1920 2420 5820
Frequency MHz
In each document, there are common areas addressed by both standards and
other areas addressed by one standard and not the other. Figure 3-4 summa-
rizes the main characteristics of each standard and identifies common areas
addressed by both, as well as topics that are addressed mainly by one docu-
ment and not the other.
Figure 3-4 shows that topics, such as change management, email security,
access control policies, digital signatures, compliance, and business continuity
planning are among the areas considered critical for IT systems that are not
emphasized in automation and control system standards. Conversely, for
automation and control systems, the significant domains not covered include
security architecture analysis, quantitative and qualitative analysis, informa-
tion security management, and information security testing. Areas of com-
mon emphasis include information security policy, risk assessment, training,
media physical security, remote access, event logging, and protection against
malware.
78 Industrial Automation and Control System Security Principles, Second Edition
ͻ Information
ͻ Detailed personnel security policy ͻ Security
security ͻ Risk assessment architecture
analysis
ͻ Information ͻ Information
processing security ͻ Quantitative risk
controls management analysis
ͻ Formal change ͻ Asset ͻ Qualitative risk
management management analysis
ͻ Email security ͻ Education, ͻ Risk
training, and management and
ͻ Access control policies
awareness mitigation
and rules
ͻ Media physical ͻ Information
ͻ VPN management
security security testing
ͻ Log review
ͻ Remote access
ͻ Internal processing
Authentication
controls
ͻ Operating system
ͻ ŝŐŝƚĂůƐŝŐŶĂƚƵƌĞƐ
access control
ͻ Key management
ͻ Password
ͻ Business continuity management
ͻ Detailed ͻ Event logging
compliance
ͻ Encryption
ͻ Protection against
malware
Summary
Understanding the requirements of industrial automation and control sys-
tems security and how they relate to IT systems requires a mapping of
these requirements onto the emerging technologies being employed in the con-
trol of production processes, as well as the critical infrastructure (represented
primarily by the electrical generation and distribution grid). The advances in
capability and sophistication of industrial automation and control systems
require a tailored approach to security. Some of the factors pushing the indus-
trial automation and control systems security envelope include:
• Alarm processing
• Fiber communication
3.2 In both IT and automation and control systems, which of the following
is the primary concern in the event of an emergency or malicious
event?
A. Equipment safety
B. Preservation of documentation
C. Personnel safety
D. Facility protection
3.4 Which of the following actions is the most likely to result in blockages
and lack of system availability in automation and control systems?
A. Remote access
B. Life-cycle design
C. Accountability
D. Port scanning
A. Insider
B. Espionage
C. Criminal
D. Hacker
C. Malware
D. Attacks
D. Change management
D. Change management
A. Insider
B. Terrorist
C. Industrial espionage
D. Computer criminal
A. Firewall
B. Separation of duties
C. Biometrics
D. Auditing
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 83
B. Embarrassment
C. Effect on reputation
A. Separation of duties
B. Disk redundancy
References
1. NIST SP 800-30. Guide for Conducting Risk Assessments. Revision 1.
Washington, DC: NIST (National Institute of Standards and
Technology), 2012.
He coauthored the CISSP Prep Guide for John Wiley and Sons and is coau-
thor of the Wiley Advanced CISSP Prep Guide; the CISSP Prep Guide, Gold
Edition; the Security + Certification Guide; the CISM Prep Guide; the CISSP
Prep Guide, Second Edition: Mastering CISSP and ISSEP (Information Systems
Security Engineering Professional); the Network Security Bible; the CISSP and
CAP (Certification and Accreditation Professional) Prep Guide, Platinum Edition:
Mastering CISSP and CAP; the Certified Ethical Hacker (CEH) Prep Guide;
Cloud Computing Security; and Web Commerce Security. He is also the author of
Securing SCADA Systems and of three textbooks in the areas of microcom-
xiii
xiv Industrial Automation and Control System Security Principles, Second Edition
Dr. Krutz is also a Senior Fellow of the International Cyber Center of George
Mason University.
Dr. Krutz holds BS, MS, and PhD degrees in Electrical and Computer
Engineering, is a Registered Professional Engineer in Pennsylvania, and is a
Senior Life Member of the IEEE.
Contents
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
v
vi Industrial Automation and Control System Security Principles, Second Edition
Dumpster Diving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Packet-Filtering Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Application Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Application-Proxy Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Screened-Host Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Dual-Homed Host Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Screened-Subnet Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Symmetric Key Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Asymmetric Key Cryptography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Digital Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Attacks Against Cryptosystems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Virtual Private Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Secure Sockets Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Review Questions for Chapter 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
The Smart Grid and Technological Trends. . . . . . . . . . . . . . . . . . . . . . . . . 93
The Bulk Generation Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
The Transmission Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
The Distribution Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
The Operations Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
The Service Provider Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
The Markets Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
The Customer Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Advanced Metering Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Energy Storage and Management of Stored Energy . . . . . . . . . . . . 101
Smart Grid Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Mapping of Emerging Technology Issues onto an
Example Automation System – The Smart Grid . . . . . . . . . . . . . . . . . . . 105
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Review Questions for Chapter 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .563
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .569