Top Banner
Digital Convergence and ICS SOCs Omar Sherin GICSP/CERT-IH/CRISC/CBCP ISA99/IEC 62443 Voting member
25

Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Sep 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Digital Convergence and

ICS SOCsOmar Sherin

GICSP/CERT-IH/CRISC/CBCP

ISA99/IEC 62443 Voting member

Page 2: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Confidential — All Rights Reserved — EY /MENA 2017 22

Page 3: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Confidential — All Rights Reserved — EY /MENA 2017 33

GISS 2016 global key findings – Energy Sector

The Gap

2006 2017

Page 4: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

70% of incidents are detected by a third party

Page 5: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

You can not detect what you can not see

Page 6: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Attack Matrix [control, execute, and maintain]

Page 7: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Security Visibility Approaches in MENA

Taking Security Operation Centers (SOCs) as an Example

MENA Organizations opt for:

1. Integrated SOCs ( ISOC) ( covering IT/OT/Physical Security)

2. Separate SOCs

3. Managed SOCs

Page 8

Page 8: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Integrated SOCsA- Full Integration

Page 9: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Architecture Models (Fully Integrated)

Page 10

Page 10: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Pros vs Cons

Pros:

Provides real-time situational

awareness across the entire

enterprise

Easier detection of cross-business

unit incidents

Develops internal capabilities for

true Corporate wide IH

Supports an intelligence-driven

approach to incident detection

Unified view on IH and Patch

management..etc

Page 11

Cons:

o Requires staff to be experts in

multiple business units (corporate IT

and OT domains)

o Requires staff to be well trained to

provide incident response

capabilities and forensics support to

different business units.

o Corporate Politics and culture can

be a challenge

People

Page 11: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Integrated SOCsB- Distributed Integration

Page 12: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Page 13

Architecture Models (Distributed Model)

Page 13: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Pros vs Cons

Pros:

Reduces likelihood of false positives for

ISOC since only critical alarms are

brought to their attention

Less corporate politics

No need for 1 team knows all ( Easier

to get)

Page 14

Cons:

o ISOC does not have a real-time

view across the enterprise, making it

difficult to correlate events and

alarms that may appear non-critical

o Staff must develop detailed policies

and procedures for each business

unit to identify critical alarms that

should be brought to the ISOC’s

attention. (Hand-over)

Process

2x CapEx

Page 14: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Separate ICS SOC

Page 15: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

SOC

► Automated Maturity & Compliance

Reporting

► Asset Inventory & Configuration

Management

► Standardised External Access

Control

► Patch Management

► Anti-Virus Management

► Log Collection

OT SOC Services

Treating the IT as an

untrusted 3rd party

Page 16: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Pros vs Cons

Pros:

Solves the corporate politics

Comfort zone for your technical

staff (IT/OT)

Least false positives

Page 17

Cons:

o Much Bigger Investment

o No corporate wide visibility

o Different security levels

Page 17: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Page 18

Various SOC Deployment models analysis

Service attributes 100% In-houseTraditional

MSSP/Outsource

SOC/CSIRT Staff

AugmentationEY Managed OT SOC

EY Build On-Premise

(IT and OT)

Managed EY Digital SOC

(IT, OT and IoT)

Speed to effectiveness Years N/A Months to year MonthsMonths

(EY build & handover) Months

People

Service team On-premise 100% remote On-premise and remote

team

On-premise and remote

team (International)

Build and handover On premise and remote

team (based in GCC)

Resource competency Material gaps High High High Skill gaps (OT) High

Service availability Business hours only 24/7/365

“eyes on glass”

24/7/365 = “on call”

for “critical” alerts

24/7/365

“eyes on glass”

Business hours 24x7

Incident response Material skill gaps Often not included Optional Included Included Included

Process With EY Input

Process effectiveness Low High High High High (EY IP) High

Team integration Material gaps exist Low High High Medium High

Business context High Low High High High Strategic

Reports/metrics Minimal to none or

operational focus

Provider SLA

focused

Material gaps Strategic and operational

insight

Medium (EY IP) SLA ensured

Advanced threat Commodity malware

focus

Commodity malware

OR APT focused

Commodity malware

focused

Cover threat/attack

spectrum

Commodity/APT

(EY IP)

APT/Covert and bigger

attack spectrum

Technology IT/ OT convergence

Network visibility Perimeter, traditional

IDS

Perimeter,

traditional IDS

Perimeter, traditional

IDS

Perimeter and internal,

content/session inspection

Internal, perimeter

& OT EY

Architecture)

Internal, perimeter, OT

& IoT

Endpoint/server visibility Minimal to no

capability

Often not included Minimal to no

capability

“Always on” monitoring &

“on demand” host

analysis

High (EY

Architecture)

High

Data loss

detection

Minimal to no

capability

Often not included Minimal to no

capability

Client data exfiltration

detection

Optional

(not focus for OT)

Optional

(not focus for OT / IoT)

Log management/search Poorly tuned SIEM “Black box” SIEM Poorly tuned SIEM Well tuned SIEM +

analytics/efficient search

High High

Speed to deployment Months to years Weeks Months to years Weeks to months Months Months

Capital investment High Low High Low to moderate

(Hardware)

High (Opex and

Capex)

Moderate (Capex)

Your access to your data High Minimal to no

access (portal only)

High High High High

High Medium LowService Maturity Level:

IT: Information Technology OT: Operational Technology / Industrial Control Systems

IoT: Internet of Things CSIRT: Computer Security Incident Response Team

SIEM: Security Incidents & Events Monitoring

Page 18: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Confidential — All Rights Reserved — EY /MENA 2017 1919

Page 19: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Confidential — All Rights Reserved — EY /MENA 2016 2020

The D-SOC Approach

Digital SOCs will enhance the

capabilities and value propositions

beyond traditional SOCs.

Digital SOCs will provide an end to

end threat visibility and awareness,

this is essential for today’s and

tomorrow’s

hyper connected world.

Security Analysts Digital SOC

Platform

Digital SOC

Security Administrator

Supply chain Monitoring

Security Services

Industrial Environments

(OT and Industrial IoT)

Industry Threat and

MENA region feeds

Physical Security and Digital Oil Fields ready

Corporate Offices(IT)

CERTS / CSIRTS

National Intelligence

Agencies

Page 20: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Page 21 Copyright © 2016 Ernst & Young Australia. All Rights Reserved. Liability limited by a scheme approved under Professional Standards Legislation

Pla

tfo

rm S

up

po

rt

Data Science

Support IR teams

Maintain Infrastructure

Collaborate with partners (e.g. LANL)

Maintain Visualisation

Layer

Infr

ast

ructu

re S

up

po

rt

NextGen Cyber Analytics Platform

Visual Analysis

Operate Technology

En

vir

on

me

nt

Su

pp

ort

Op

era

tio

na

l C

yb

er

Da

ta S

cie

nti

sts

Big Data Platform

Integrate New Data Sources R

ese

arc

h C

yb

er

Da

ta

Scie

nti

sts

Deploy new models

Develop new models

Integrate with CSIRT

Playbooks / Use Cases / Unauthorised Access

Playbooks / Use Cases / DDoS

Playbooks / Use Cases / Malware

Detect Hunt Respond

New Patterns

Incidents Closed PIR

New Rules

Investigations

An

aly

sts

&

Hu

nte

rs

Cyber Security Incident Response

Visual Analysis

External Assessment of Potential Attackers

Cyber Reconnaissance by Fire

Acti

ve

De

fen

ce

An

aly

sts

Th

rea

t M

an

ag

em

en

t A

na

lyst

sThreat Management / Threat Intelligence Platform

Threat Intelligence Collection

Threat Intelligence Analysis

Kill Chain Mapping

Risk Assessment of Critical Assets

Continuous Monitoring

Anomaly Analysis

Countermeasure Deployment

Red Team exercises

Next Generation Security OperationsNext Generation security operations operating model

Page 21: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Page 22

Paths are used to identify anomalous traversal activity

Stars are used to identify recon and insider threat activity

PathScan: A behavioral approachIdentify shapes of anomalous activity in the network in near real time

anomaly anomaly anomaly

Anomalous Behavior

Normal Behavior

Page 22: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Confidential — All Rights Reserved — EY /MENA 2015 23

Example: Attack Kill Chain

Page 23: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Confidential — All Rights Reserved — EY /MENA 2015 24

Example: Attack Kill Chain – Attacker Profiling

Page 24: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

it’s a journey

Page 26

Step 3Step 2Step 1

Convergence Journey

Corporate

Strategy

GIS Asset

Upgrade

Project

Digital Oil

Fields

Cloud

ComputingDemand

Response

Enhanced

Mobility

Wireless

Plants

COMM

NOCStandards

Analytics

Platform

Cyber Security

Enhanced

AnalyticsD- SOC

Physical

security

Security related items

IT Concerns

Architecture &

Governance

Asset

Planning

Strategy

Big

Data

IT-OT

Integration Dev-Ops

1

1. There are logical dependencies

between initiatives that must be

addressed in the roadmap.

2. Certain initiatives should be

considered pre-requisites. (such as

Asset Management Programs)

3. Convergence plans are complex,

highly intertwined programs. When it’s

time to execute, strong program

management is required.

Taking the proper steps towards

achieving the Digital convergence

security vision requires two timelines:

a long-term strategic roadmap and

an actionable short-term

implementation plan. Key

considerations during this process

include:

Charting the path forward

Evolution not

revolution

Convergence Road Map

HSE

Page 25: Digital Convergence and ICS SOCscdn-cms.f-static.com/uploads/164655/normal_59086e3adca38.pdf · Integration Dev-Ops 1 1. There are logical dependencies between initiatives that must

Thank you

@osherin