NERC CIP Compliance

Download Report

Transcript NERC CIP Compliance

NERC CIP Compliance
Defining your Electronic Security Perimeter
(ESP) and Access Point Security
Agenda
Specific
NERC CIP-005 Requirements
Underlying fundamentals of the ESP architecture
Building ESPs using Security Enclaves and DinD
Vulnerability Assessment Methodology
Simple Principles
Disclaimer

CAUTION: Every
environment is different and
requires a direct correlation.
The material contained in
this presentation may not
represent your corporate or
architectural requirements

ADVISORY: Education,
consulting and compliance is
about correctly interpreting
and conveying information a requirement for this
content
NERC CIP Compliance
Specific NERC CIP-005 Requirements
Specific NERC CIP-005 Requirements
 CIP-005-1
– Cyber Security – Electronic
Security
 Perimeters: Requires the identification and
protection of an electronic security
perimeter and access points. The electronic
security perimeter is to encompass the
critical cyber assets identified pursuant to
the methodology required by CIP-002-1.
Specific NERC CIP-005 Requirements
 Requirement
1 - Electronic Security Perimeter
—Define an ESP and its access points to protect Critical Cyber
Assets
 Requirement 2 - Electronic Access Controls
—Deny by default
—Enable only required ports and services
—Securing dial-up access
—Documentation
—Appropriate Use Banner
 Requirement 3 - Monitoring Electronic Access (covered in the
SEIM Presentation in two weeks)
 Requirement 4 - Cyber Vulnerability Assessment
 Requirement 5 - Documentation Review and Maintenance
 Monitor
FERC Order 706 Activity
Specific NERC CIP-005 Requirements
 The
following are exempt from Standard
CIP-005:
—4.2.1 Facilities regulated by the U.S. Nuclear
Regulatory Commission or the Canadian Nuclear
Safety Commission.
—4.2.2 Cyber Assets associated with
communication networks and data
communication links between discrete Electronic
Security Perimeters.
—4.2.3 Responsible Entities that, in compliance
with Standard CIP-002, identify that they have
no Critical Cyber Assets.
NERC CIP Compliance
Underlying fundamentals of the
ESP architecture
Architecting your ESP to provide the appropriate
access control and monitoring capabilities
 Approach,
controls, monitoring, assessment and documentation
requirements defined in CIP-005
 Challenging to define an electronic perimeter around
geographically disperse systems collecting information and
performing automated and manual control operations
 Organizations must think methodically about their approach and
intrinsically understand the environment and type of controls
 Define an ESP access point access control request, review and
response workflow
 Define an appropriate trust model for your systems (enclaves)
 Ensure the adequacy of protection and continued high availability
of authorized access and control
Integrating ESP high availability identity
management solutions
 Understand
your organization’s trust model based upon
the enclave approach outlined in the methodology
—Select your identity type, system and appropriate audit
trail for each ESP enclave
—Define the appropriate administrative and operational
trusts for system access
—Separate technical administrative, developers, system
operators and general users
—Correlate your physical and cyber identities as
appropriate
—Ensure identity integrity throughout the ESP
—Define operational procedures to support high
availability access to ensure safety
Control System Network Architecture
Control System Network
Architecture
Traditional Isolation of
Corporate and Control Domains
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
Overview of Contemporary
Control System Architectures
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
Database Attack Vector
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
Common Security Zones
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
Firewall Deployment for Common
Security Zones
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
Defense in Depth with IDS
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
Corporate IT to Control System IT
Comparison
Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006)
NERC CIP Compliance
Building ESPs using Security
Enclaves and DinD
Definition: Security Enclaves
An
enclave is, as defined in the Department of
Defense Directive (DoDD ) 8500.1 E2.1.16.2, “the
collection of computing environments connected by
one or more internal networks under the control of
a single authority and security policy, including
personnel and physical security.“
Terminology Potpourri
—Security Zones
—DeMilitarized Zones
—Transactional Zones
Determine security controls and define system
interactions
Review NIST SP 800-53 r2; 800-82
Security Enclave Creation
 Security
enclaves provide the layers of trusted systems
which limit untrusted interactions
 Enclaves creation can be based upon:
—Mission criticality
—Operational requirements
—Type of application
—System users
—Trusted versus untrusted interactions
Enclave Split - Services
Services
are separated among enclaves
Separation of duties
—External DNS / Internal DNS
—External Mail / Internal Mail
—External Web / Internal Web
—External Authentication / Internal Authentication
Split Active Directory Domains
—Out Of Band Management Network
—Application Proxy
Building Security Enclaves
 Defined
logical ESP access points
with enterprise identity
management and network
integrated firewalls and IDS
Legend
Site-to-Site
VPN
Firewall
ESP
High Availability
Virtualized
Architecture
Restricted
WAN
Control
Enclave
IDS/EDS
Remote VPN,
Contractor,
Identity Mgmt,
Uncontrolled ISO
Enclaves
Office
Desktop
Systems
ISO, Identity &
Event Mgmt
Enclaves
Testing
Enclaves
Building Security Enclaves
Legend
Control
Enclaves
VPN
IDS/EDS
Firewall
Testing
Enclave
Generating /
Sub Station
ESP
Primary
ISO
Enclave
High Availability
Virtualized
Architecture
Secondary
Testing
Enclaves
ISO
Enclave
High Availability
Virtualized
Architecture
Control
Enclave
WAN
Remote VPN,
Contractor,
Uncontrolled ISO
Enclaves
IDS/EDS
Control
Enclave
Office
Systems
Remote VPN,
Contractor,
Uncontrolled ISO
Enclaves
IDS/EDS
Office
Systems
ISO
Enclave
Testing
Enclaves
Defining Ports and Services Access
Rules
• Do you know who, how, why, where, and when
the system communicates across the network?
• Known Communication
Between Systems
• Unknown Communication
Between Systems
– Review levels of system trust
for need of isolation station /
proxy
– Review levels of system trust
for need of isolation station /
proxy
– Define appropriate access
rules
– Work with application vendor
to identify requirements
– If necessary, enable
connectivity in learning mode
Defense in Depth Security Controls
• Layers of Protection for
Information and Control (I & C)
•
Provides security against a single
or multiple points of failure
•
Common to define Network, Client
or Control Node, Server and
Operational controls
Build Knowing The Attacks
“Man-in-the-Middle”
• Attacker reads, inserts and
modifies information without
either party aware
• Physical Layer
• Datalink Layer
• Network Layer
• Application Layer
• Social Layer
• Not an exhaustive list of attacks
and controls
• What can happen?
• Incorrect information is
conveyed to the operator
• Incorrect control settings
are sent to the system
• Control is completely taken
over by attacker
Defense in Depth : Network
Information and Control (I & C)
●
Encrypted and
integrity checked
traffic
Touchpoints should:
—
—
Be limited to the
absolute minimum,
where the purpose of
the application may still
be satisfied
Provide limitations for
trusted and untrusted
access
Traffic
access
control
Intrusion Detection
and Prevention
I&C
●
Note: This is not an
exhaustive list of
Defense in Depth
solutions
Network
authentication /
authorization
Application
proxy
Defense in Depth : EMS / Operator
Connectivity
●
EMS Enclave
●
●
●
Separate
development and
quality assurance
enclaves
Island acceptable
architecture with
dedicated
infrastructure
Note: This is not an
exhaustive list of
Defense in Depth
solutions
Event Monitoring
DHCP Snooping /
Port Security / DNS
Host Files
Separate
EMS Enclaves for
PDS and QAS
I&C
Workstation
Dual Homed / EMS
Direct Connection
Unique
Operator Login
Operational Workflow for Managing ESP/PSP
Access Requests and Approvals
Same
workflow for
both physical and
cyber access
Defines
approval
process for
creation/modification
of access and
revocation of rights
NERC CIP Compliance
Defining your ESP Vulnerability
Assessment Methodology
Defining an ESP Vulnerability Assessment
Methodology appropriate for the bulk electric system.
 The
ESP Vulnerability Assessment Methodology considers the
threat, the cyber asset, adversary type, known vulnerabilities
and the consequences of an adversarial success to arrive at a
relative risk level and appropriate response. Automated and
manual vulnerability analysis is performed by the IT Security
department, and the FERC/NERC Compliance departments to
identify both effective and ineffective security controls. The
results of the assessment are then provided to the FERC/NERC
Compliance Director. The results are reviewed and appropriate
countermeasures are identified, developed, applied in a test
environment, reviewed for acceptance and propagated to
production. The methodology is reapplied to determine the
relative risk reduction achieved. This iterative process is
continued until the most appropriate method for reducing risk
to an acceptable level is identified and approved by the
FERC/NERC Compliance Director.
Performing a Vulnerability Assessment within and
against your ESP
 Defined
in CIP-005 Requirement 4 and
CIP-007 Requirements 3 and 8
 Typically do not perform tests against live systems
—The risk is substantial
 Ensure the accurateness of system state with your change
management system
 Define the appropriate personnel for risk acceptance and
mitigation procedures
 Create an appropriate set of procedures to
—adequately test the response of the system and the
associative controls
—migrate the modifications through staging
—an appropriate rollback structure
Selecting Vulnerability Management Solutions

Review vulnerability management solutions for the following
requirements:
—Ability to generate audit trails and appropriate reports / integration
with your situational awareness software
—Breadth of supported capabilities to validate networks, applications and
operating systems in your environment
—Ability to operate in an *Internet isolated* environment leveraging a
proxy solutions
—Interoperate with NIST or CISecurity.org baseline criteria definitions
—Support agreement and associative service level capabilities
—Incremental patch deployment to categorically identified systems and
applications on a schedule-able basis
—Supports the appropriate trust model for your organization’s access
control model
—High level of assurance of the system’s accuracy and efficiency for your
environment
Vulnerability Assessment Process
 Network
Tests
—Remote / Local Scanning using GFI Languard, Nessus and Harris
STAT
—Remote / Local PenTesting using Backtrack 2 tools with Metasploit
3
 Local Tests
—CISecurity.org Assessment Scoring Tools
 Reviewing New NIST SCAP Vendors
—Part of Federal Desktop Initiative
Responding to results from your vulnerability
assessment
 Do
not PANIC
—However, review high risk results immediately; identify
if other defense in depth controls provide protection
 Vulnerability assessments should be a dialogue between
the audit team and the systems personnel
 Appropriately document, notify the vendor for resolution
and receive the update to validate using your patch
testing methodology created in CIP-007 Requirement 3
NERC CIP Compliance
Simple Principles to reflect
upon while architecting
Simple Principles
Isolationism
provides protection
—The more isolated an environment is from
others the greater the success of physical
and logical security controls assuring
continuously accurate information and
control
Simple Principles
• Assets will be physically stolen or lost
– Physical assets, physical assets storing electronic
information and electronic assets will be stolen or lost
– You must limit the impact of any theft of information

Your conversations will be eavesdropped upon
—Any verbal, paper or electronic conversation can be
monitored; you must be accepting of this and utilize
the appropriate protective controls to limit your risk
Simple Principles
• Assets will be physically stolen or lost
– Physical assets, physical assets storing electronic
information and electronic assets will be stolen or lost
– You must limit the impact of any theft of information
Your
conversations will be
eavesdropped upon
—Any verbal, paper or electronic conversation can
be monitored; you must be accepting of this and
utilize the appropriate protective controls to
limit your risk
Simple Principles
Build
with a moat (control)
—Separate trust levels / Security Enclaves
—Understand how the moat (control) works
(or)
Build with Nightingale Floors *
* Nijo Castle
Kyoto, Japan
Simple Principles
Vulnerabilities
are the gateways
through which threats manifest
themselves
Threats
exist
—Hackers
—Corporations
—Nation States
RISK
MISSION
Risk Assessment Relationship
value
Owners
wish to minimize
impose
to reduce
Countermeasures
that may possess
that may be reduced by
may be aware of
Vulnerabilities
that exploit
Threat agents
give rise to
leading to
Risks
that increase
Threats
to
wish to abuse or damage
Based upon IEEE Standard 15408 (Common Criteria)
Assets
Simple Principles
Security
or risk mitigation controls must be
well understood to be properly used
—A detailed understanding of the category of the
control
Directive
Preventive
Compensating
Detective
Corrective