Top Banner
GRID Alstom Cyber Security Program A Holistic Approach April 18, 2012 Rich White
13

Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Apr 15, 2018

Download

Documents

trinhduong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

GRID

Alstom Cyber Security Program

A Holistic Approach April 18, 2012

Rich White

Page 2: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

A Holistic Approach to Cyber Security

•Defense in Depth •Least privileges, and more

Design Criteria

• Centralized user account management • Data security, log management

Security Features

• WS-Security, HTTPS, TLS, SSO, 2-factor authentication, & more

Cutting Edge Technologies

Security Requirements Secure Design Secure Coding Security Testing

Page 3: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

• Defense in Depth

• Specify the network security zones

• Must work with firewalls and IDS/IPS

• Support anti-virus software

• Support content inspection

• Least privileges

• Adopt standards

• Integrate with 3rd party security solutions

Alstom Grid Security Architecture

Security Architecture Design Criteria

Page 4: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Alstom Grid Security Architecture

• Authentication and Authorization − Centralized user account management − Utilize standard user management services − Support 2-factor authentication − Support Single-Sign-On

• Data Security − Secure data in storage, in transit, and in memory − Use standard security protocols: SSL/TLS, HTTPS, WS-Security, etc.

• Log Management − Support log standard: syslog − Integrate with enterprise logging management solution

Security Features

Page 5: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Security Software Development Lifecycle

Secure Design Specifications and Standards

Page 6: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Security Software Development Lifecycle

• Microsoft Threat Analysis and Modeling Tool

• Developers training by Microsoft

Secure Design

Page 7: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Security Software Development Lifecycle

• Provide secure coding training to developers

• Scan source code using Fortify SCA

• Require source code peer review

Secure Coding

Page 8: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Security Software Development Lifecycle

• Alstom Grid Internal Security Testing

• Independent Security Vulnerability Testing − DOE NSTB − DHS CSSP − 3rd party security company

Security Testing

Page 9: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Documented Security Best Practices

• e-terra Security Guides − e-terra Security Overview − e-terra Network Security Guide − e-terra System Security Guide – Windows − e-terra System Security Guide – Linux − e-terra Secure Shell (SSH) User’s Guide − e-terra Secure Connection User’s Guide − e-terratrust User’s Guide

Deployment - System Hardening Port list

Services list

Security audit settings

System security settings (least privileges)

User account management

Secure file transfer

Secure network communications

Page 10: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

O/S Security Patch Validation Testing

Operating System Security Patch Testing

Page 11: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

• The Bandolier Audit Files − The audit files document optimal security configurations for Alstom SCADA control

systems

− Cost effective ongoing monitoring by asset owners − Auditable report for compliance

• NERC CIP, NIST, FISMA, ISA-99 and etc.

e-terraplatform 2.5 (habitat 5.7) Windows Server 2003 Windows XP Red Hat 5.3

e-terraplatform 2.6 (habitat 5.8) Windows Server 2008 R2 Windows 7 Red Hat Linux 5.5

Ensuring System Security

Automatic System Auditing

e-terrahabitat e-terraplatform e-terrabrowser e-terracontrol e-terracomm e-terratrust

Page 12: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

Vulnerability Response and Disclosure

Alstom Grid Security Bulletin URL

Page 13: Alstom Cyber Security Program A Holistic Approach/media/files/events/conference proceedings...Alstom Grid Security Architecture • Authentication and Authorization −Centralized

GRID