Top Banner
Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor – Cyber Security CIP-005-3 Audit Approach, ESP Diagrams, Industry Best Practices September 24 – 25, 2013 SALT LAKE CITY, UTAH
40

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

Aug 16, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP

Sr. Compliance Auditor – Cyber Security

CIP-005-3 Audit Approach, ESP Diagrams, Industry Best Practices

September 24 – 25, 2013 SALT LAKE CITY, UTAH

Page 2: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

2

•  Joseph A. Andrews o  21 years DoD IT & Information Security / Network

Engineering (Federal Civilian) §  Senior Information Systems Security Engineer §  Information Assurance Program Manager §  Network Security Engineer §  Information Systems Security Officer §  Etc..

o  Academic §  Master of Science in Information Security & Assurance §  Bachelor of Science in IT/Information Security §  Professional Certifications: CISSP-ISSEP, ISSAP, ISSMP,

CISA, PSP, CAP, GCIH, C|CISO, C|EH, CNDA, CBRM, CGEIT, CompTIA Security +

Speaker Introduction

Page 3: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

3

•  R1. Identify and document Critical Cyber Assets (CCAs) residing within an Electronic Security Perimeter (ESP) including Access Points (AP) to the ESP

•  R2. Implement and document ESP access controls (i.e., Access Points; deny by default, ports & services, appropriate use banner)

•  R3. Monitor and log access to the ESP

•  R4. Conduct annual Cyber Vulnerability Assessment (CVA) of the Access Points to the ESP

•  R5. Review, update, maintain CIP-005-3 relevant documentation

CIP-005-3 Requirements Overview

Page 4: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

4

Page 5: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

5

•  Provides network segmentation and restricted access to Critical Cyber Assets within the SCADA and Process Control Network from the Enterprise/Corporate Network and any other untrusted networks and sources.

•  It is the Access Point, which establishes the Electronic Security Perimeter.

R1. Electronic Security Perimeter (ESP)

Page 6: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

6

•  An information system, device or appliance that provides access to and/or through (e.g., ingress or egress traffic) the ESP (e.g., Firewall, Gateway, Control device w/modem (TCP, UDP; Telnet, SSH, SSL, VPN, HTTP[s]))

•  May provide access control, monitoring, alerting and/or logging of access to and/or through the ESP o  may require intermediary device(s) for some of

this functionality: Electronic Access Control and Monitoring (EACM) devices

R1. Access Point (AP)

Page 7: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

7

ESP Graphical Depiction

Page 8: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

8

ESP w/ DMZ Graphical Depiction

Page 9: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

9

•  An Electronic Security Perimeter that is typically located in a single geographical location, which may be protected by a single Physical Security Perimeter (PSP) that may or may not traverse multiple rooms, albeit, the cabling infrastructure is protected by the PSP and all rooms are afforded the protections of CIP-006.

Discreet Electronic Security Perimeter

Page 10: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

10

Page 11: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

11

•  A single Electronic Security Perimeter that may be located in multiple geographical locations, or multiple rooms in the same facility location, protected by one or more Physical Security Perimeters (PSP), albeit, the cabling infrastructure may traverse multiple facility rooms or areas outside of an established PSP.

Extended Electronic Security Perimeter

Page 12: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

12

Page 13: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

13

ESP-1 (Actual) Front Rack View

Page 14: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

14

ESP-1 Front Rack View (CCAs Labeled)

Page 15: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

15

Access Point Graphical Depiction

Page 16: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

16

Access Point GUI & CLI INTERFACE

Page 17: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

17

Page 18: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

18

•  ICS components with serial and/or dial-up interfaces can be Access Points: o  A Front End Processor (FEP) or CCA serially

connected to a component of another network beyond your control (e.g., another entity)

o A FEP or media converter device that uses the internet (e.g.,IP;VPN, SSL, AES) to communicate

o  •  Know the backend architecture of your ICS

network!

R1. CAR-005

Page 19: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

19

Page 20: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

20

Page 21: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

21

Page 22: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

22

Contrary to popular belief: VLANs were originally created as a network performance and organization feature, not a Security feature. •  Dynamic Trunking protocol (DTP) abuse o Cisco proprietary, no authentication, switches are in

default auto-negotiate, sniff all VLAN traffic •  Trunking protocol (802.1q and ISL) abuse o  PVLAN hopping, Double 802.1q VLAN tagging

•  Virtual Trunking protocol (VTP) abuse •  Common spanning tree (CST) abuse •  Multiple other attacks

YERSINIA (VLAN Exploit Tool)

Page 23: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

23

•  Legacy SCADA Networks o Radio and Leased Line communication o RTUs serially connected to Radio Modem or Leased

Line Modem o Radio Modem or Leased Line Modem Connected to

Front End Processor (FEP) at control station •  Secure IP VPN (Vendors are pushing) o  IP network communications o RTU connected to multi-homed and multi-protocol

devices (MPLS/Frame/IP; Fiber, Ethernet, VSAT) o Front End Processors are multi-homed and multi-

protocol capable and scalable devices

Trend: Legacy Networks to IP VPN

Page 24: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

24

Page 25: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

25

Page 26: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

26

•  It’s cheaper o One to one hardware solutions are more expensive

•  It’s scalable & reliable (redundancy) o Multi-homed, multi-protocol and network agnostic

systems are scalable, while eliminating single points of failure

•  It’s safer o VPN-IPSEC, AES256 versus unencrypted legacy

serial communications •  It’s still IP! o Susceptible to the same vulnerabilities plaguing

traditional network architectures o We’re not against it, we just need to check it

Legacy Networks to IP VPN - WHY?

Page 27: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

27

•  Spanish Cyber Security Researcher Leonardo Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate users) satellite internet connections using less than $75 worth of tools, which can be purchased on Ebay.

- (1) Skystar “2” PCI satellite receiver card, open source Linux DVB software app, and the free network data analysis tool

Wireshark.

Hacking Satellite

Page 28: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

28

•  US Satellites hacked by Chinese Military! •  The hactivist group Anonymous Hacks

NASA Satellite! •  Anonymous hacks Turkish Satellite

provider! •  Three states have demonstrated the ability

to physically damage satellites by intercepting them: the US, Russia and China

EXTRA! EXTRA! Read all about it!

Page 29: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

29

•  Verify Critical Cyber Asset (CCA) list

•  Verify Electronic Security Perimeter (ESP) designation documentation

•  Verify Access Points of ESP documentation

•  Cross reference CCA, ESP and AP documentation with network diagrams

R1. CCA, ESP and AP Enumeration

Page 30: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

30

•  Access Point Configuration Analysis Checks o  Appropriate Use Banner configured (Not on radar and Not Applicable for CIP-V5) o  Deny by default statement

§  An automatic implicit “deny all” statement after explicit statements is standard for most new firewalls

o  SNMP community string default (i.e. “PUBLIC”) o  Access Control List is restrictive (e.g., No entire Class A IP range left open 255.255.0.0

(65K IP addresses) and justification for entire Class C) o  Authorized ports and services

R2. Access Point Checks

Page 31: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

31

•  Validate electronic & manual 24/7 monitoring, logging and alerting

(Including dial-up accessible CCAs with non-routable protocols) o  Validate electronic and/or manual logs o  Verify implemented technical solutions that are

responsible for alerting appropriate personnel (i.e., SMTP, SIEM, Log Server, etc.)

R3. AP Monitoring, Logging, & Alerting

Page 32: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

32

•  Remote Access Guidance o  Use encrypted access controls for

remote access o  Use multi-factor authentication o  Consider Proxy device as VPN

termination point o  Implement logging and monitoring o  etc…

NERC Industry Advisories

Page 33: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

33

•  Guidance for Secure Remote Access o  Secure interactive remote access

concepts o  Security practices and proposed solutions

for secure interactive remote access o  Assessing the implementation of

interactive remote access controls o  Network architecture decisions

NERC Guidance

Page 34: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

34

•  Validate vulnerability assessment process documentation

•  CVA criteria must address: o  Authorized ports and services o  Discovery of all Access Points to ESP o  Review of controls, default accounts,

passwords and network mgmt community strings (PUBLIC)

o  For vulnerabilities discovered, establish a remediation action plan, and ensure the

execution of the action plan

R4. Annual Cyber Vulnerability Assessment (CVA) of APs to ESP

Page 35: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

35

•  The CVA summary report should specifically identify, by unique identifiers, the Access Points that were assessed.

•  The auditors will ask for any raw evidence relevant to the assessment.

(e.g., automated scans, Access Point configurations)

R4 Cyber Vulnerability Assessment

Page 36: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

36

•  Auditors will cross reference the Access Point ports and services baseline with configuration

•  Excess ports and services found during the CVA should be added to the CVA mitigation/remediation plan

R4 Cyber Vulnerability Assessment

Page 37: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

37

Auditors will review of Action Items

Action Item Status Completion Date DON’T LEAVE BLANK!!

Page 38: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

38

•  Documentation reflect current configurations

•  Documentation updated within 90 days of change to network or security controls

•  Retain relevant access logs for at least 90 calendar days, however, in the instance of a Cyber Security Incident the retention window is approximately 3 years

R5. Documentation Review and Maintenance

Page 39: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

39

•  NERC Industry Advisory: remote access guidance (2011). Retrieved from the North American Electric Reliability Corporate website on January 7, 2012, from, http://www.nerc.com/fileUploads/File/Events%20Analysis/A-2011-08-24-1-Remote_Access_Guidance-Final.pdf

•  NERC Guidance for Secure Interactive Remote Access (2011). Retrieved from the North American

Electric Reliability Corporate website on January 7, 2012, from, http://www.nerc.com/fileUploads/File/Events%20Analysis/FINAL-Guidance_for_Secure_Interactive_Remote_Access.pdf

References

Page 40: Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr ... · 9/24/2013  · Nve demonstrated at BlackHat the exploitation of (i.e., gaining access to and impersonating legitimate

Joe Andrews, CISSP-ISSEP, ISSAP, ISSMP, CISA Sr. Compliance Auditor – Cyber Security Western Electricity Coordinating Council jandrews[@]wecc[.]biz Office: 801.819.7683

Questions?