0% found this document useful (0 votes)
282 views

AI&SC

Automação industrial e sistemas de controle
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
282 views

AI&SC

Automação industrial e sistemas de controle
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Chapter 3 of:

Industrial Automation and


Control System Security Principles:
Protecting the Critical Infrastructure,
Second Edition
Ronald L. Krutz, PhD, PE

Industrial Automation and


Control System Security Principles:
Protecting the Critical Infrastructure,
Second Edition
By Ronald L. Krutz, PhD, PE

CHAPTER

3
Book Table of Contents

Buy the Complete Book


Industrial Automation
and Control System
Security Principles:
Protecting the Critical
Infrastructure
Second Edition

By Ronald L. Krutz, PhD, PE


Notice
The information presented in this publication is for the general education of the reader. Because nei-
ther the author nor the publisher has any control over the use of the information by the reader, both the
author and the publisher disclaim any and all liability of any kind arising out of such use. The reader is
expected to exercise sound professional judgment in using any of the information presented in a particu-
lar application.
Additionally, neither the author nor the publisher has investigated or considered the effect of any
patents on the ability of the reader to use any of the information in a particular application. The reader is
responsible for reviewing any possible patents that may affect any particular use of the information pre-
sented.
Any references to commercial products in the work are cited as examples only. Neither the author
nor the publisher endorses any referenced commercial product. Any trademarks or tradenames refer-
enced belong to the respective owner of the mark or name. Neither the author nor the publisher makes
any representation regarding the availability of any referenced commercial product at any time. The
manufacturer’s instructions on the use of any commercial product must be followed at all times, even if
in conflict with the information in this publication.

Copyright © 2017 International Society of Automation (ISA)


All rights reserved.

Printed in the United States of America.


10 9 8 7 6 5 4 3 2

ISBN: 978-1-941546-82-6

No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written per-
mission of the publisher.

ISA
67 T. W. Alexander Drive
P.O. Box 12277
Research Triangle Park, NC 27709

Library of Congress Cataloging-in-Publication Data in process


3
Industrial Automation and
Control System Culture
versus IT Paradigms

Some of the basic principles of information system security were presented in Chapter
2 as a prelude to selectively and properly applying them to securing industrial auto-
mation and control systems. As a prerequisite to this adaptation, it is important to
examine the differences in culture, requirements, and operational issues between auto-
mation and control systems and IT systems. Critical areas that have to be addressed
include safety, real-time demands, maintenance, productivity, training, and person-
nel mindsets. These topics and related subject areas are discussed in this chapter to
help the reader better understand how to apply security principles to automation and
control systems without negatively impacting their primary mission and in full
acknowledgement of their special requirements.

Differences in Culture, Philosophy, and Requirements


The major advances in securing computer systems and networks have come
through the information system technology route, with origins in computer
science and software engineering. The principal players are IT system admin-
istrators, systems analysts, database administrators, software engineers, net-
work administrators, chief information officers (CIOs), and so on. On the
other hand, a large number of the personnel populating the industrial automa-
tion and control system field come from engineering backgrounds, with train-
ing in such areas as electrical engineering, chemical engineering, mechanical
engineering, systems engineering, and control engineering.

65
66 Industrial Automation and Control System Security Principles, Second Edition

The motivation, requirements, and focus of each of the groups are, in many
instances, largely divergent, with some overlapping common areas. For exam-
ple, software quality and process improvement methods widely used in the IT
environment are often foreign to control engineers and in fact may be viewed
as cumbersome in implementing SCADA and process control algorithms. In
addition, the performance of a process in a plant is critical, and inadequate
performance in production areas can result in huge financial losses, equip-
ment damage, and personnel injuries. These severe consequences of opera-
tional errors are not usually a common occurrence in IT facilities. Similarly,
safety is a critical concern in a production environment, and control system
malfunctions can result in fires or explosions in some instances. Thus, in a
production environment, safety and performance usually take precedence
over information security, which is not the case in an IT system.

Some of the major differences between IT and industrial automation and con-
trol system requirements are listed in Table 3-1.

Table 3-1. Comparison between IT and Industrial Control and


Automation Systems Issues
Industrial Automation and Control
Issue IT Systems
Systems
Application of Advanced encryption systems Encryption used sometimes or not at all.
encryption used. Delays caused by encryption software
are a consideration.
Degree of employment Implementation of software Installation of software patches usually
of patch management patches performed routinely done infrequently, with deliberation, and
under formal procedures. with involvement of vendors. The impact
of software patches should be tested off-
line to ensure no harmful effects are
introduced into the process or plant. In
some instances, adding patches can
produce some dangerous
consequences.

Degree of vulnerability Penetration testing by ethical Penetration testing must be conducted


testing hackers is widely used to sparingly and at appropriate times in
expose vulnerabilities. order not to inadvertently cause
malfunctions in monitoring and control
systems.
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 67

Table 3-1. Comparison between IT and Industrial Control and


Automation Systems Issues
Employment and Antivirus software is effective Antivirus software can be used but
impact of security and commonly used to scan for issues, such as delays due to scanning
software malware. and processing and lack of spare
computing cycles, might cause problems
in plant systems.

Employment of change Change management is used Change management is employed


management extensively to document and inconsistently and sporadically in many
confirm system changes. organizations. Changes might also result
in hazardous situations.

Impact of equipment Equipment modifications, Many legacy systems in use with few
upgrades upgrades, and replacements changes over periods of many years.
occur almost continuously in
various parts of organizations.

Level of security Awareness training is actively Security awareness training is


awareness training conducted in accordance with conducted sporadically and
security policy. inconsistently in many cases.
Tolerance to data loss Recovery from data loss can Loss of data can result in loss of
usually be accomplished from product, unsafe conditions, and
backups without severe disruption of plant operations.
consequences in most
situations.

Tolerance to loss of Recovery follows standard Systems should be designed with


availability procedures and unless resiliency; however many are not,
availability is lost for extended particularly legacy systems. Loss of
periods of time, effects are not availability can have serious
disastrous. However, availability consequences, including safety of
is critical and can affect mission personnel and equipment.
objectives.

Tolerance to loss of Depending on the data Consequences not usually severe.


confidentiality involved, the consequences
might be minimal or extremely
harmful, such as the loss of
trade secrets, personnel data,
credit card numbers, and health
information.

Tolerance to loss of Consequences can range from Consequences can be very severe
integrity minimal to extremely harmful if because, in many instances, critical
critical data has been altered decisions are made based on data
and is acted on as being valid. assumed to be correct.
68 Industrial Automation and Control System Security Principles, Second Edition

Table 3-1. Comparison between IT and Industrial Control and


Automation Systems Issues
Tolerance to system In most cases, delays might In situations where critical control
delays be considered a nuisance, but decisions are based on deterministic
can be tolerated. response times, delays might result in
serious or dangerous consequences.

Use of auditing Based on organizational Audits of a systems’ security posture are


polices, internal and external conducted irregularly and are a function
audits are normally conducted of the particular organization and
and provide detective controls regulatory requirements.
for breaches of information
system security.

System performance Performance can be Proper performance is critical.


suboptimal at times.
Safety Safety is critical, particularly Safety is critical, particularly that of
that of personnel. personnel.

Figure 3-1 summarizes the important issues listed in Table 3-1 and empha-
sizes some of the common areas between IT and automation and control
systems.

The lesson to be learned from these comparisons is that traditional informa-


tion system security knowledge and methods provide a solid basis for
addressing industrial automation and control system security, albeit with
deliberate, appropriate, and intelligent modifications required to address the
unique characteristics of automation and control systems.

One important starting point in incorporating these modifications is educa-


tion. In general, most universities and certification programs addressing com-
puter and network security have been heavily focused on IT security.
Automation and control systems, which are typically sitting on isolated net-
works and are relatively few in number compared to IT systems, have not been
considered to be interesting targets. With the advent of the terrorism threat,
this situation is no longer the case. In addition, SCADA and plant process con-
trol systems are now being connected to large networks and the Internet.

The Certified Information System Security Professional (CISSP) and related


certifications do not address the security of industrial automation and control
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 69

ͻ Integrity must be
ͻ Frequent backups preserved ͻ Infrequent backups
ͻ Temporary ͻ Availability must ͻ Minimal shutdowns
shutdowns be preserved ͻ Some encryption
ͻ Advanced encryption ͻ Protection ͻ Minimal change
ͻ Formal patch and against malware management
change management is critical ͻ Penetration testing can
ͻ Penetration testing ͻ Intrusions must be harmful
ͻ Frequent upgrades be prevented, ͻ Infrequent upgrades
detected and
ͻ Some delays ͻ Delays intolerable
responses taken
tolerable
ͻ Memory and CPU
ͻ Personnel safety
ͻ Memory and CPU cycles minimal for
is paramount
cycles available for security software
security software ͻ Physical security
must be well- ͻ Data loss intolerable
ͻ Some data loss
executed ͻ Auditing infrequently
tolerable
conducted
ͻ Wireless security
ͻ Formal auditing
is critical
conducted
ͻ Personnel
ͻ Confidentiality critical
screening is
critical

IT systems Common Control systems

Figure 3-1. IT and Automation and Control System Issue Comparisons

systems. Organizations, such as ISA, have addressed this problem and are
filling a critical need. NIST has generated special publications that directly
address industrial automation and control systems. However, it is important
that security training related to the control of production lines, industrial
processes, electrical transmission and distribution, pipelines, chemical
70 Industrial Automation and Control System Security Principles, Second Edition

plants, and so on moves to the fore in universities, technical institutes, and


certification organizations.

To understand how to adapt IT security methods to industrial automation


and control system security, threats to the latter have to be identified and
understood. One impediment to full disclosure of threats realized is the fact
that a majority of affected facilities are privately owned, and these organiza-
tions are reluctant to publicize security breaches that could negatively affect
their reputation and value.

Organizations also need incentives to invest in upgrading their automation and


control infrastructure. Many existing installations have been in place for 10 or
20 years, and investments in security have to compete with other compelling
initiatives in an organization.

Considerations in Adapting IT Security Methods to Industrial


Automation and Control Systems
In order to secure an IACS, there are specific issues that have to be addressed
that take into account the differences between IT systems and IACSs. These
issues include the following:

• Accountability, authorization, and computer forensics have not


matured and have not been implemented widely in IACSs as
compared to IT systems.

• Ethernet to serial line paths provide a means of injecting malicious


commands into a control network.

• Excessive checking, encryption, monitoring, and so on can interfere


with the deterministic nature of process control systems.

• In many IACS environments, control engineers have multiple


responsibilities that, in many instances, violate the security principle
of separation of duties.

• Installing patches and upgrades in process control systems can lead


to serious and sometimes dangerous situations in production facilities.

• Life-cycle design disciplines common in the IT field are not widely


used in industrial automation and control systems.
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 71

• Maintenance hooks and trap doors installed in automation and


control systems for remote maintenance can be easy entry points to
modify critical software and firmware with negative consequences.

• Many IACS vendors combine safety mechanisms with security


mechanisms, leading to single points of failure and less resiliency than
separating these two functions logically and physically.

• Many manufacturing facilities and SCADA installations house legacy


systems with outdated technology, minimal memory and computing
power, and little thought to security.

• Port scanning of automation and control systems can result in


blockages and lack of system availability.

• Remote access into automation and control systems via older


modems or newer wireless devices poses a serious threat to security.

• There is a trend to apply protocols used for IT systems to industrial


control and automation systems because of their wide availability,
their lower cost, and the existence of trained personnel. However, in
most instances, these protocols were not designed for deterministic
process control systems, and they are vulnerable to many existing
attacks.

• There is heavy reliance on suppliers who provide modified software


and hardware for IACSs, resulting in nonstandard implementations
that are difficult to maintain without support from these suppliers.

• Weak authentication mechanisms in many SCADA systems and


networked plant control systems leave them vulnerable to attack.

A variety of additional items must be considered when discussing compari-


sons between IT and industrial automation and control systems. The concepts
related to risk management and the means to protect industrial automation
and control systems will be discussed in detail in Chapters 5 and 6, respec-
tively. However, it is important to now examine some related critical subject
areas to provide a basis for developing more specific security solutions.

Threats
Threats to IT and industrial automation and control systems come from differ-
ent sources, with different motivations. It is important to understand these
72 Industrial Automation and Control System Security Principles, Second Edition

threat sources and their characteristics in order to counter any malicious activi-
ties on their part. NIST SP 800-301 summarizes the various types of threat
sources and some of their driving factors, as shown in Table 3-2. Table 3-3,
also from NIST SP 800-30, provides a listing of some general threat sources,
including environmental ones, which can also cause disruptions to industrial
automation and control systems.

The categories of terrorists, industrial espionage, and insiders are of particular


interest in connection with industrial automation and control systems. Tra-
ditionally, insider threats have been considered one of the most dangerous
because they give insiders the ability to bypass protective measures. However,
external threats are increasing and are also of grave concern, particularly
relating to our nation’s critical infrastructure and resource processing plants. In
addition, threats to automation systems can materialize from environmental
and structural sources, as illustrated in the next section.

Sensitivity of Industrial Automation and Control Systems to


Upgrades and Modifications
One area that is not usually considered when discussing the relative sensitivi-
ties of IT systems and industrial automation and control systems is the
effects of equipment upgrades and modifications. A particularly relevant exam-
ple concerns the consequences of converting analog controls to digital con-
trols. Digital systems transfer information via pulses, which inherently generate
high frequency electromagnetic radiation that can interfere with control system
operations. An article in the journal Interference Technology2 describes the
electromagnetic radiation emission environment in a nuclear plant that was
being changed from analog to digital controls. The authors obtained measure-
ment data in the range of 100 Hz to 6 GHz in instances before and after the
conversion.
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 73

Table 3-2. Threats and Motivations for Attackers


Source: NIST SP 800-30 (2012)

Threat-Source Motivation Threat Actions


Hacker, cracker Challenge Ego Rebellion • Hacking
• Social engineering
• System intrusion, break-ins
• Unauthorized system access
Computer criminal Destruction of information Illegal • Computer crime (e.g., cyber
information disclosure stalking)
Monetary gain • Fraudulent act (e.g., replay,
Unauthorized data alteration impersonation, interception)
• Information bribery
• Spoofing
• System intrusion
Terrorist Blackmail Destruction • Bomb/terrorism
Exploitation Revenge • Information warfare
• System attack (e.g., distributed
denial of service)
• System penetration
• System tampering
Industrial espionage Competitive advantage • Economic exploitation
(companies, foreign Economic espionage • Information theft
governments, other • Intrusion on personal privacy
government interests)
• Social engineering
• System penetration
• Unauthorized system access
(access to classified, proprietary,
and/or technology-related
information)
Insiders (poorly Curiosity Ego Intelligence • Assault on an employee
trained, disgruntled, Monetary gain • Blackmail
malicious, negligent, Revenge • Browsing of proprietary information
dishonest, or Unintentional errors and
• Computer abuse
terminated employees) omissions (e.g., data entry error,
programming error) • Fraud and theft
• Information bribery
• Input of falsified, computed data
• Interception
• Malicious code (e.g., virus, logic
bomb, Trojan horse)
• Sale of personal information
• System bugs
• System intrusion
• System sabotage
• Unauthorized system access
74 Industrial Automation and Control System Security Principles, Second Edition

The testing followed guidelines in U.S. Nuclear Regulatory Commission Regu-


latory Guide, NUREG 1.180,3 and Electric Power Research Institute (EPRI)
document TR-102023-2004.4 In the tests, antennas were installed next to
three cabinets housing control electronics, and radiation emission measure-
ments were taken from the analog and digital control installations. Some of the
results obtained are summarized in Table 3-4, showing frequencies at which
peak amplitudes occur at antennas 1 and 2.

Table 3-3. Listing of General Threat Sources


Source: NIST SP 800-30 (2012)

Type of Threat Source Description Characteristics

Adversarial Individuals, groups, organizations, or Capability,


• Individual states that seek to exploit the intent, targeting
• Outsider organization’s dependence on cyber
• Insider resources (i.e., information in electronic
• Trusted insider form, information and communications
• Privileged insider technologies, and the communications and
• Group information-handling capabilities provided
• Ad hoc by those technologies).
• Established
• Organization
• Nation-state
Accidental Erroneous actions taken by individuals in Range of effects
• Ordinary user the course of executing their everyday
• Privileged user/ responsibilities.
administrator
Structural Failures of equipment, environmental Range of effects
• IT Equipment controls, or software due to aging,
• Storage resource depletion, or other circumstances
• Processing that exceed expected operating
• Communications parameters.
• Display
• Sensor
• Controller
• Environmental controls
• Temperature/humidity
controls
• Power supply
• Software
• Operating system
• Networking
• General-purpose
application
• Mission-specific application
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 75

Table 3-3. Listing of General Threat Sources


Source: NIST SP 800-30 (2012)
Environmental Natural disasters and failures of critical Range of effects
• Natural or man-made infrastructures on which the organization
disaster depends, but which are outside the control
• Fire of the organization.
• Flood/tsunami
• Windstorm/tornado NOTE: Natural and man-made disasters
• Hurricane can also be characterized in terms of their
• Earthquake severity and/or duration. However,
• Bombing because the threat source and the threat
• Overrun event are strongly identified, severity and
• Unusual natural event (e.g., duration can be included in the description
sunspots) of the threat event (e.g., Category 5
• Infrastructure failure/outage hurricane causes extensive damage to the
• Telecommunications facilities housing mission-critical systems,
• Electrical power making those systems unavailable for
three weeks).

Table 3-4. Radiation Emission Measurements


Source: Keebler and Berger (2011)

Analog Measurement Digital Measurement


Antenna Significant Peak Significant Peak
Frequency Frequency
Amplitudes (dBμV/m) Amplitudes (dBμV/m)
1 1.34 MHz 99.2 468 MHz 71.6
1 928 MHz 76.6 826 MHz 94.5
1 928 MHz 113.5
1 1.35 GHz 49.9
1 1.88 GHz 50.5
1 1.92 GHz 53.4
1 2.41 GHz 76.3
1 2.46 GHz 54.4
1 5.82 GHz 60.6
2 1.04 MHz 99.3 2 MHz 84
2 4.55 MHz 88.5 10 MHz 80
2 1 GHz 109
2 1.17 GHz 48.8
2 1.92 GHz 48.9
2 2.42 GHz 57.7
2 5.82 GHz 50.9
76 Industrial Automation and Control System Security Principles, Second Edition

This data is plotted in Figures 3-2 and 3-3 for antennas 1 and 2, respectively.
Note that the digital electronics generate more peak radiation generally and
more at high frequencies compared to the analog equipment. These peak
emissions have the potential to interfere with control system signals and cause
malfunctions if proper shielding and isolation are not applied.

The sample electromagnetic emanations collected illustrate the necessity to


ensure electromagnetic compliance (EMC) when equipment upgrades are
made to plant control systems. These actions will serve to protect against
interruptions of control systems’ operation due to electromagnetic emissions
from digital systems.

120
Antenna 1

100
Amplitude G%ȝ9/m

80

60
Analog
Digital
40

20

0
1.34 468 826 928 1350 1880 1920 2410 2460 5820
Frequency MHz

Figure 3-2. Analog and Digital Radiation Emissions Received at Antenna 1

IT and Industrial Automation and Control Systems


Comparisons from a Standards Perspective
Valuable insight into the contrasts and similarities between IT systems security
focus areas and those of industrial automation and control systems can be
obtained from an example using standards that represent each of the areas. In
this example, ISO/IEC 27002, Code of Practice for Information Security Manage-
ment,5 will be used to represent IT systems security areas of emphasis while
ANSI/ISA-62443-2-1 (99.02.01)-2009, Security for Industrial Automation and Con-
trol Systems Part 2-1: Establishing an Industrial Automation and Control Systems
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 77

120
Antenna 2

100

80
Amplitude G%ȝ9/m

60
Analog
Digital
40

20

0
1.04 2 4.55 10 1000 1170 1920 2420 5820
Frequency MHz

Figure 3-3. Analog and Digital Radiation Emissions Received at Antenna 2

Security Program,6 will be used to illustrate the major concerns of automation


and control system security.

In each document, there are common areas addressed by both standards and
other areas addressed by one standard and not the other. Figure 3-4 summa-
rizes the main characteristics of each standard and identifies common areas
addressed by both, as well as topics that are addressed mainly by one docu-
ment and not the other.

Figure 3-4 shows that topics, such as change management, email security,
access control policies, digital signatures, compliance, and business continuity
planning are among the areas considered critical for IT systems that are not
emphasized in automation and control system standards. Conversely, for
automation and control systems, the significant domains not covered include
security architecture analysis, quantitative and qualitative analysis, informa-
tion security management, and information security testing. Areas of com-
mon emphasis include information security policy, risk assessment, training,
media physical security, remote access, event logging, and protection against
malware.
78 Industrial Automation and Control System Security Principles, Second Edition

ISO/IEC 27002 E^/ͬ/^-99.ϬϬ͘ϬϮ-200ϰ

ͻ Information
ͻ Detailed personnel security policy ͻ Security
security ͻ Risk assessment architecture
analysis
ͻ Information ͻ Information
processing security ͻ Quantitative risk
controls management analysis
ͻ Formal change ͻ Asset ͻ Qualitative risk
management management analysis
ͻ Email security ͻ Education, ͻ Risk
training, and management and
ͻ Access control policies
awareness mitigation
and rules
ͻ Media physical ͻ Information
ͻ VPN management
security security testing
ͻ Log review
ͻ Remote access
ͻ Internal processing
Authentication
controls
ͻ Operating system
ͻ ŝŐŝƚĂůƐŝŐŶĂƚƵƌĞƐ
access control
ͻ Key management
ͻ Password
ͻ Business continuity management
ͻ Detailed ͻ Event logging
compliance
ͻ Encryption
ͻ Protection against
malware

IT systems Common Control systems

Figure 3-4. Standards Comparison Example of IT versus IACSs Important Security


Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 79

Summary
Understanding the requirements of industrial automation and control sys-
tems security and how they relate to IT systems requires a mapping of
these requirements onto the emerging technologies being employed in the con-
trol of production processes, as well as the critical infrastructure (represented
primarily by the electrical generation and distribution grid). The advances in
capability and sophistication of industrial automation and control systems
require a tailored approach to security. Some of the factors pushing the indus-
trial automation and control systems security envelope include:

• The Smart Grid

• Advanced cryptography and key management applications

• Advanced PLCs and PACs

• Advanced protective relaying

• Advanced wireless networks

• Alarm processing

• Availability of real-time energy information

• Multisphere security among IT, transportation, and power systems

• Redundancy in networks, equipment, and sensors

• Fiber communication

• Use of GPS tracking

Chapter 4 will investigate the technical evolution taking place in elements of


the critical infrastructure and in key production facilities to identify the
important risk factors and areas of maximum potential impact in the event
of an attack.
80 Industrial Automation and Control System Security Principles, Second Edition

Review Questions for Chapter 3


3.1 Which of the following statements is generally TRUE regarding an
industrial automation and control system?

A. Installation of software patches can be performed routinely and


frequently.

B. Encryption of data can sometimes lead to problematic delays.

C. Penetration testing can be conducted routinely and frequently.

D. Confidentiality is a key concern in automation systems as


opposed to integrity and availability.

3.2 In both IT and automation and control systems, which of the following
is the primary concern in the event of an emergency or malicious
event?

A. Equipment safety

B. Preservation of documentation

C. Personnel safety

D. Facility protection

3.3 Which of the following statements is FALSE?

A. Flash drives and other portable memory devices can be sources


of malware injections into control systems.

B. Maintenance hooks and trap doors installed in automation and


control systems for remote maintenance can be easy entry
points to modify critical software and firmware with negative
consequences.

C. In many control system environments, control engineers, in


general, do not have multiple responsibilities, such that the
security principle of separation of duties is not normally
violated.

D. Many facilities house legacy systems with outdated technology,


minimal memory and computing power, and little thought to
security.
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 81

3.4 Which of the following actions is the most likely to result in blockages
and lack of system availability in automation and control systems?

A. Remote access

B. Life-cycle design

C. Accountability

D. Port scanning

3.5 Which threat source is motivated by revenge, ego, and dissatisfaction?

A. Insider

B. Espionage

C. Criminal

D. Hacker

3.6 What is a source of a possible disruption of control system functions


that is not normally considered?

A. Changes from digital to analog systems

B. Upgrades from analog to digital systems

C. Malware

D. Attacks

3.7 In general, what distinguishes analog control equipment from digital


control equipment?

A. Analog controls generate more high-frequency peak voltages


than digital controls.

B. Digital controls generate more high-frequency peak voltages


than analog controls.

C. Analog controls generate essentially the same number of high-


frequency peak voltages as digital controls.

D. Digital controls generate essentially the same number of high-


frequency peak voltages as analog controls.
82 Industrial Automation and Control System Security Principles, Second Edition

3.8 Which of the following is more likely to be performed in an IT


environment than in an automation and control system environment?

A. Security architecture analysis

B. Information security testing

C. Quantitative risk analysis

D. Change management

3.9 Which of the following is more likely to be performed in an IT


environment than in an automation and control system environment?

A. Security architecture analysis

B. Information security testing

C. Quantitative risk analysis

D. Change management

3.10 Which of the following threat sources is motivated by economic


exploitation and competitive advantage, and uses social engineering?

A. Insider

B. Terrorist

C. Industrial espionage

D. Computer criminal

3.11 What is a detective control that is more frequently applied in IT


systems than in control and automation systems?

A. Firewall

B. Separation of duties

C. Biometrics

D. Auditing
Chapter 3 – Industrial Automation and Control System Culture versus IT Paradigms 83

3.12 Which of the following is NOT a usual reason for an organization’s


reluctance to disclose successful attacks against it?

A. Hope the attack will harm competitors

B. Embarrassment

C. Effect on reputation

D. Possible loss of customers

3.13 Which of the following can lead to a single point of failure in an


industrial automation and control system?

A. Separation of duties

B. Disk redundancy

C. Combination of safety and security mechanisms

D. Use of authentication with identification

3.14 What is a typical characteristic of industrial automation and control


systems?

A. Have excess computing cycles

B. Have limited extra computing cycles

C. Have excess memory

D. Computational speed is not an issue

3.15 What is a typical characteristic of an automation and control system


supplier?

A. Usually ensures maintenance hooks are never left enabled


without the customer’s approval

B. Usually ensures default passwords are never duplicated from


one customer to another

C. Usually provides unmodified off-the-shelf hardware and


software

D. Usually provides modified hardware and software


84 Industrial Automation and Control System Security Principles, Second Edition

References
1. NIST SP 800-30. Guide for Conducting Risk Assessments. Revision 1.
Washington, DC: NIST (National Institute of Standards and
Technology), 2012.

2. Keebler, P., and S. Berger. “Going from Analog to Digital.” Interference


Technology, 2011 EMC Directory and Design Guide, 2011.

3. U.S. Nuclear Regulatory Commission (NRC) Regulatory Guide


NUREG 1.180. Guidelines for Evaluating Electronic and Radio Frequency
Interference in Safety-Related Instrumentation and Control Systems.
Revision 1. Washington, DC: U.S. Nuclear Regulatory Commission,
2003.

4. EPRI TR-102323-2004. Guidelines for Electromagnetic Interference Testing


in Power Plants. Revision 3. Palo Alto, CA: EPRI (Electric Power
Research Institute), 2004.

5. ISO/IEC Standard 27002-2005. Information Technology – Security


Techniques – Code of Practices for Information Security Management.
Geneva 20 – Switzerland: IEC (International Electrotechnical
Commission) and ISO (International Organization for
Standardization).

6. ANSI/ISA-62443-2-1 (99.02.01)-2009. Security for Industrial Automation


and Control Systems – Part 2-1: Establishing an Industrial Automation and
Control Systems Security Program. Research Triangle Park, NC: ISA
(International Society of Automation).
About the
Author

Ronald L. Krutz, PhD, PE, CISSP, ISSEP


Dr. Krutz is Chief Scientist for Security Risk Solutions, Inc. He has more than
30 years of experience in industrial automation and control systems, distrib-
uted computing systems, computer architectures, information assurance
methodologies, and information security training. He has been a Senior Infor-
mation Security Consultant at Lockheed Martin, BAE Systems, and
REALTECH Systems Corporation, an Associate Director of the Carnegie Mel-
lon Research Institute (CMRI), and a faculty member in the Carnegie Mellon
University Department of Electrical and Computer Engineering. Dr. Krutz
founded the CMRI Cyber Security Center and was founder and director of the
CMRI Computer, Automation and Robotics Group. He was also a lead
instructor for (ISC)2 Inc. in its Certified Information Systems Security Profes-
sionals (CISSP) training seminars

He coauthored the CISSP Prep Guide for John Wiley and Sons and is coau-
thor of the Wiley Advanced CISSP Prep Guide; the CISSP Prep Guide, Gold
Edition; the Security + Certification Guide; the CISM Prep Guide; the CISSP
Prep Guide, Second Edition: Mastering CISSP and ISSEP (Information Systems
Security Engineering Professional); the Network Security Bible; the CISSP and
CAP (Certification and Accreditation Professional) Prep Guide, Platinum Edition:
Mastering CISSP and CAP; the Certified Ethical Hacker (CEH) Prep Guide;
Cloud Computing Security; and Web Commerce Security. He is also the author of
Securing SCADA Systems and of three textbooks in the areas of microcom-

xiii
xiv Industrial Automation and Control System Security Principles, Second Edition

puter system design, computer interfacing, and computer architecture. Dr.


Krutz has seven patents in the area of digital systems and has published more
than 30 technical papers.

Dr. Krutz is also a Senior Fellow of the International Cyber Center of George
Mason University.

Dr. Krutz holds BS, MS, and PhD degrees in Electrical and Computer
Engineering, is a Registered Professional Engineer in Pennsylvania, and is a
Senior Life Member of the IEEE.
Contents

About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

Chapter 1 Industrial Automation and Control System


Fundamental Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Industrial Automation and Control Systems. . . . . . . . . . . . . . . . . . . . . . . . 1
SCADA Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Distributed Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Safety Instrumented Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Industrial Automation and Control System Protocol Summary . . . . . . 10
The OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
The TCP/IP Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Object Linking and Embedding for Process Control . . . . . . . . . . . . 13
OPC Unified Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Modbus/TCP Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
The Distributed Network Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Utility Communications Architecture Version 2.0/IEC 61850 . . . . 16
PROFIBUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Controller Area Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
EtherNet/IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
openSAFETY Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Issues in Industrial Automation and Control Systems Security . . . . . . . 19
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

v
vi Industrial Automation and Control System Security Principles, Second Edition

Review Questions for Chapter 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21


References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Chapter 2 Information System Security Technology . . . . . . . . . . . . . . . . . . . . .29


Information System Security Fundamentals . . . . . . . . . . . . . . . . . . . . . . . 29
Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Nonrepudiation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Related Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Types and Classes of Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Additional System Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Complete Mediation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Defense in Depth. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Economy of Mechanism. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Fail-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Least Common Mechanism. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Least Privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Leveraging Existing Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Open Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Psychological Acceptability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Separation of Duties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Weakest Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Policies, Standards, Guidelines, and Procedures. . . . . . . . . . . . . . . . . . . . 37
Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Malicious Code and Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Viruses and Worms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Trojan Horse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Logic Bomb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Mobile Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Back Door. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Man-in-the-Middle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Guessing Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Denial of Service/Distributed Denial of Service . . . . . . . . . . . . . . . . 41
Replay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Contents vii

Dumpster Diving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Packet-Filtering Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Application Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Application-Proxy Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Screened-Host Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Dual-Homed Host Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Screened-Subnet Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Symmetric Key Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Asymmetric Key Cryptography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Digital Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Attacks Against Cryptosystems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Virtual Private Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Secure Sockets Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Review Questions for Chapter 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Chapter 3 Industrial Automation and Control System Culture


versus IT Paradigms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Differences in Culture, Philosophy, and Requirements. . . . . . . . . . . . . . 65
Considerations in Adapting IT Security Methods to
Industrial Automation and Control Systems. . . . . . . . . . . . . . . . . . . . . . . 70
Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Sensitivity of Industrial Automation and Control Systems
to Upgrades and Modifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
IT and Industrial Automation and Control Systems
Comparisons from a Standards Perspective . . . . . . . . . . . . . . . . . . . . . . . 76
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Review Questions for Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

Chapter 4 The Continuing Technological Evolution Affecting


IAC Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Important Technological Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Home Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Energy Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Social Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Mobile Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
viii Industrial Automation and Control System Security Principles, Second Edition

Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
The Smart Grid and Technological Trends. . . . . . . . . . . . . . . . . . . . . . . . . 93
The Bulk Generation Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
The Transmission Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
The Distribution Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
The Operations Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
The Service Provider Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
The Markets Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
The Customer Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Advanced Metering Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Energy Storage and Management of Stored Energy . . . . . . . . . . . . 101
Smart Grid Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Mapping of Emerging Technology Issues onto an
Example Automation System – The Smart Grid . . . . . . . . . . . . . . . . . . . 105
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Review Questions for Chapter 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Chapter 5 Risk Management for Industrial Automation and


Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
ANSI/ISA-62443-2-1 (99.02.01)-2009 Cyber Security
Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Addressing Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Monitoring and Improving the CSMS. . . . . . . . . . . . . . . . . . . . . . . . 121
NIST SP 800-39 Integrated Enterprise Risk Management . . . . . . . 122
NIST SP 800-37 Risk Management Framework . . . . . . . . . . . . . . . . 127
Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
The Insider Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Relevant IACS External Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

Chapter 6 IAC Systems Security Methodologies and Approaches . . . . . . . .147


Automation and Control System Security Standards
and Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
NIST Special Publication 800-53, Revision 4, Recommended
Security Controls for Federal Information Systems . . . . . . . . . . . . 148
Minimum Assurance Requirements – Low-Impact Systems . . . . . 154
Minimum Assurance Requirements – Moderate-Impact
Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Minimum Assurance Requirements – High-Impact Systems . . . . 156
Contents ix

NIST Special Publication 800-82, Guide to Industrial


Control Systems Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Network Segmentation and Segregation . . . . . . . . . . . . . . . . . . . . . 159
ICS Security Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
NIST 800-53 Control Families. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Appendix G – ICS Overlay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
ANSI/ISA-62443-1-1 (99.01.01)-2007, Security Technologies
for Industrial Automation and Control Systems. . . . . . . . . . . . . . . . . . . 174
Authentication and Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Filtering/Blocking/Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Encryption Technologies Data Validation . . . . . . . . . . . . . . . . . . . . 177
Management, Audit, Measurement, Monitoring,
and Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Industrial Automation and Control Systems
Computer Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Physical Security Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Personnel Security Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
North American Electric Reliability Corporation,
Critical Infrastructure Protection Cyber Security Standards. . . . . . . . . 180
Department of Homeland Security, Catalog of Control
Systems Security: Recommendations for Standards Developers . . . . . 192
AMI System Security Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Identification (FID). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Consolidation of Best Practices Controls for Industrial
Automation and Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Review Questions for Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

Chapter 7 Industrial Automation and Control System Security Training. . . .217


Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Training Sources and Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Idaho National Laboratory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Sandia National Laboratories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
International Society of Automation . . . . . . . . . . . . . . . . . . . . . . . . 221
U.S. Computer Emergency Readiness Team . . . . . . . . . . . . . . . . . . 225
SANS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
National Initiative for Cybersecurity Education . . . . . . . . . . . . . . . 227
National Security Agency and the Department of
Homeland Security National Centers of Academic Excellence. . . 229
Training Support Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
NIST Special Publication 800-50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
NIST Special Publication 800-16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Common Training Subjects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
x Industrial Automation and Control System Security Principles, Second Edition

Review Questions for Chapter 7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239


References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

Chapter 8 Industrial Automation and Control System Trends,


Approaches, and Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .245
Automation and Control System Trends . . . . . . . . . . . . . . . . . . . . . . . . . 245
Penetration Testing of Industrial Automation and
Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Formal Methods Used to Quantify and Standardize
Important Concepts and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
ISCM Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
The Smart Grid Maturity Model (SGMM) . . . . . . . . . . . . . . . . . . . . 259
Automation Maturity Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Future Smart Grid Issues and Automation Security Issues . . . . . . . . . . 269
Smart Grid Electromagnetic Radiation Issues . . . . . . . . . . . . . . . . . 269
NIST 7628 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Review Questions for Chapter 8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

Chapter 9 Emerging Approaches to Industrial Automation and


Control System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281
Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Open Platform Communications Unified Architecture . . . . . . . . . . . . . 283
Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
OWASP IoT Security Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Big Data Analytics and the Industrial Internet of Things. . . . . . . . . . . . 289
Industrial Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
The NIST Cyber-Physical Systems (CPS) Framework . . . . . . . . . . . . . . 296
CPS and Cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Critical Infrastructure Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Framework Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Framework Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Software-Defined Elements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Review Questions for Chapter 9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

Appendix A Review Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . .333

Appendix B ICS Supplemental Guidance for NIST SP 800-53


Security Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .409

Glossary and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .497


Contents xi

Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .563

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .569

You might also like