Segurança Cibernética Na Automação Industrial
Segurança Cibernética Na Automação Industrial
Florian Spiteller
March 2019
source: Adobe Stock_40-10860249
IT security vs. Functional safety
Manufacturing
Controller Machine
OT ?
no IT
IT ?
no OT
PLC
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 4
Changes in Manufacturing 1/2
Controller Machine
OT Office
PLC
IT
1. Fieldbus connection between machines 2. Ethernet based fieldbus (IT and OT but different
IT and OT with different physical mediums Networks) + Remote Services
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 5
Changes in Manufacturing 2/2
Internet
Factory A Factory B
3. IoT
from machine in country
A to machine in country
B within the cloud
networks with security
enabled
Supplier
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 6
Implement Cybersecurity
7
Differences in requirements for Office and Industrial IT
Office IT Industrial IT
5-20 years
Service life 3-5 years Note: IEC 62443 uses the term service life in Part 1-1 with
regard to key management but does not specify a time frame
Critical
Time dependency Delays accepted Note: IEC 62443 defines security objectives in Part 1-1; the
real-time capability is indicated in the millisecond range
24/7
Availability Short down-times tolerated Note: IEC 62443 defines security objectives in Part 1-1, where
availability is defined as the highest security goal
source:https://www.zvei.org/fileadmin/user_upload/Presse_und_Medien/Publikationen/2017/April/Orientierungsleitfaden_fuer_He
rsteller_IEC_62443/Orientierungsleitfaden_fuer_Hersteller_IEC_62443.pdf
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 8
Industry 4.0 – Networking poses hidden risks
Human error
Blackmail, ransomware
(D) DoS-Attacks
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 9
IT security is complex
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 10
Cyber crime
source: *As defined by the Bundeskriminalamt (German Federal Criminal Police Office)
12
IT security in critical infrastructures…
KRITIS
Organisation Human
Risk
Attacks management
Market
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 13
ISO/IEC 27001 Information Security
Definition of critical infrastructure according to BMI
Transport and road
Energy Hazardous substances Information technology /
traffic
Telecommunications
Aviation Electricity Chemicals and
biological Telecommunications
Maritime transport Nuclear power
substances
plants Information
Railways & local
Hazardous goods technology
transportation Gas
transport
Roads Mineral oil
Defence industry
Postal services
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 14
Series of standards ISO/IEC 27000
Sector/branch-specific standards
Sector and branch-specific Topic-specific standards
ISO 27010
ISO 27017/27018 ISO 27031 ISO 27032 ISO 27033 ISO 27034
Information exchange
Cloud services Business continuity Cyber security Network security Application security
in critical infrastructures
ISO 27042
ISO 27039 ISO 27041
ISO 27015 ISO 27040 Analysis and
ISO 27799 Intrusion detection Incident investigation
Information security Storage security interpretation
Health sector security system methods
in the financial sector of digital evidence
ISO 27043
Investigation of
incidents
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 15
ISO/IEC 27001 Information Security
Structure of the ISO 27000 standards series based on ISO 27000
Terminology
27000
Overview and terminology
requirements
General
27006
27001
Requirements for bodies providing
Requirements
audit and certification
guidelines
27004 27007
General
27011
guidelines
Requirements for
telecommunications organisations 27019
27709 Requirements for the control
Requirements for the health sector systems in the energy utility ind.
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 16
Characterisation of safety vs. IT security
Hazard avoidance,
prevention, health & Availability, integrity, confidentiality
Objectives
safety
slight
Conditions risk
(risks,
Transparent Non-transparent/confidential F 1
methods, 1
measures) S
1
P 2
More static field Highly dynamic field; adjustable goal F 1
(intended purpose, (intentional manipulation, criminal 2 P
Activities
foreseeable misuse) intent) P
2 3
F
S P
1
Risk
Primarily mechanical
From a variety of actors (machine 2
1
F 2 4
production at a
minimisatio manufacturers, system integrators, S 1 F
dedicated time (when
n
making the machine
machine users, service providers) at 3
F 5
(reduction), any time along the entire life cycle 2
available for initial use)
measures severe risk
20
Classification of information
security for functional safety
Safety Information
security
The relationship between the
requirements of functional security and
information security is described in such
Information Industrial a manner that makes it possible to
Functional information efficiently combine the measures.
security for
safety security
functional
IEC 61508 safety IEC 62443
21
Interconnection safety and security risk assessment
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 22
Series of standards 62443- Security for industrial automation
and control systems
General Guidelines and procedures System Component
1-1 Terminology 2-1 Security program requirements 3-1 IT security technologies 4-1 Requirements for product
for IACS asset owners for industrial automation development
systems (TR)
1-2 Glossary with abbreviations 2-2 Implementation guidelines for 3-2 Security risk 4-2 Technical security
an IT security program for assessment and system requirements for IACS
automation systems design (CDV) components (CDV)
1-3 Benchmark for determining 2-3 Patch management for 3-3 System requirements for
compliance industrial automation systems (TR) IT security and security level
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 25
Cybersecurity: Attack vectors and Certification tests
5
7
1 4
3 Cloud/Backend
6
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 26
Draft IEC 62443-4-2 Security for industrial automation and control
systems – Part 4-2: Security requirements for IACS components
source: Copyright and all right reserved © VDE Prüf- und Zertifizierungsinstitut GmbH 2018.
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 27
Risk-Assessment
according to IEC 62443
IEC 62443-3-2:
„Security Risk Assessment and
System Design” (draft status)
Identify assets
Identify threats
Identify vulnerabilities
Calculate occurrence probability
Identify possible impact
Calculate risk
28
IEC 62443 - Protection against violations
SL-C Security-Level – Capability Security level the device or system can reach if it is correctly used and configured
SL-T Security-Level – Target This target security level is a result of the threat/risk analysis
SL-A Security-Level – Achieved The achieved and measurable security level achieved in the overall system
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 29
Standards in Industry 4.0
Concept of protection levels as per IEC 62443
Degree of development
Security process Security functions
source: Source: Pierre Kobes: Protection Levels, ISA-99 Meetings, Frankfurt, June 2015
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 30
Example of
typical vulnerabilities
Limited security awareness
Flaws in asset management
Updates or patches add on vulnerability
31
IT security in trades
source: VDE-USB-Stick-auf-Tastatur_IMG_1938
automatic locking when mobile device not in use
Understandable security guidelines for device
allocations
Company data: save internally and transmit via
encrypted connections, e.g. WPA2 or VPN
Sensitive data: on encrypted private mobile
devices
Draw attention to possible risks, e.g. from apps
Mobile device management: only if mobile
devices are centrally managed
Bluetooth and WiFi: only if wireless connection
necessary
32
A need to adapt with new the
IT security threats
Industry 4.0
33
Security concepts for machine
and system constructors
34
Source: Hacker attack on Deutsche Telekom devices: Security researchers at
the Freie Univerisität Berlin create a detailed picture of the situation
Reachable TR069 devices in Europe (23/11/2016)
viaFunctional
securityvs.
ITITsecurity standards
norms andsafety
Thank you
for your attention!
We are building the e-dialistic future.
Please join us.
Your contact:
Florian Spiteller
Head of External Relations & Support
Member of the DKE Executive Board
Phone +49 69 6308-380
[email protected]
3/27/2019 © DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE 36