TU3_1-3O - icalepcs 2005
Download
Report
Transcript TU3_1-3O - icalepcs 2005
ICALEPCS 2005
11 Octobre 2005
Best practices in the design of a secure
control system
Søren Poulsen
CERN, TS Department
1
The presentation
Context
Problems
Methods and solutions
Results and conclusion
Perspectives
2
Context - 1
Technical infrastructure provisioning
Services for accelerators and experimental areas (LHC)
Cooling
Ventilation
Fluid distribution
Control system examples in the TS Cooling/Ventilation group
Control of production and distribution of chilled water for LHC
experiments or control of air-handling units
Covers more than 40000 process variables for LHC start
Control and supervision system technologies
SCADA (PC/Unix-based monitoring and control) - 50 systems
PLCs – exceeding 200 PLCs for LHC start
Networking (Ethernet, TCP/IP) and field-buses
3
A typical application
4
Context - 2
Classic control systems
Few functions (e.g. an electro-mechanical protection relay)
Functions implemented in hardware rather than software
Stand-alone and proprietary technology (hardware, field-bus)
New controls system architectures
Distributed software systems
Network integration
Integration of process control with general data processing
New technologies and products
Modular platforms (hardware/OS/application)
Implemented via standard office modules (e.g. MS Office)
Ethernet/IP replacing field-bus
5
New problems
Expectations to a control system
Stable and « Available » (“information” and process available)
High level of integrity – system reflects and controls accurately
the status of a critical process
Emerging IT security problems and control system threats
“Classic” security problems and specific to control equipment
In-house threats: User errors, malfunctions, abuse and theft
See dedicated talk on Friday: Control Systems under Attack?
General solutions for IT security not always effective
Not fit for control systems in general (anti-virus?)
Not fit for existing systems – installed for the lifetime of the LHC
Not known by the control system designers or manufacturers
6
Solutions – The Approach
Identify problems
Risk management
Define objectives
Availability
Integrity
Use what is available
IT management frameworks
Security standards – ISO/IEC 17799 (not control oriented)
Security models and architectures
Technologies
People!
7
Strategies - 1
Standardising
Less technologies and less equipment types
Less versions (NT, Windows 2000, XP)
Proliferation unavoidable (e.g. operating systems)
Life-cycle of software and process control very different
Objectives and advantages
Less to learn (configure, operate) – training is essential
Less to analyse for potential vulnerabilities and stay current
Consolidating
Reducing hardware and OS platforms
Some redundancy unavoidable – but at the right level
Objectives and advantages
Less to maintain and verify – in particular when no
standards
8
Strategies - 2
Minimizing
Prioritize functions and user requirements
Exclude non-essential from core process control
Keep core functions stable and “task-oriented”
Provide new functions outside the core (scope creep!)
Maintaining
Think about maintenance from the outset (i.e. budgets)
Organize with supplier – maintenance contract
Make internal (automatic) change management procedures
High-availability and patching ?
Patch when it fits the process and the users
Protect the system without patching (design)!
9
Architecture
Modular and distributed
Map function or tasks to individual modules
Implement modules via the most secure components (PLC)
Connect over networks and field-buses
Use private and shared as appropriate (beware of shared!)
Create an architecture of layers, such as
Core functions
Non-essential functions
Optional functions
How to use layers
Separation and protection according to layer’s criticality
Physical or logical implementation
Network implementation (e.g. private LAN, DMZ, public LAN)
10
Layered example
Core functions (in the PLC)
I/O
Process safety (emergency stops) – SIL levels ?
Minimal user interactions (start, stop, verify state)
Redundant/backup functions also available via other means
Non-essential functions (in the SCADA)
Process visualisation (schematic panels)
Presentation of states and measurements
Short-term trending and alarm lists
Optional functions
Connections to maintenance management
Interface to logging database
11
Layered implementation
12
Access control
What are the requirements?
Separation and protection between layers
Physical access control
Essential to the process and to the users
Accepted and used: Keys, badges
Logical access control
Access to terminals and operator displays
Access to network resources such as Web interfaces
Balance between security/criticality and convenience
Future tools
Integrate physical and logical access control ? Badges ?
13
User management
What are the requirements ? Linked to access control…
Refer to main objectives (e.g. “integrity”)
Traceability and least-privilege/Need-to-know
Define the “model”
User role: Operator, engineer, administrator
Access-modes and situations: local, remote, web
Authorizations: e.g. rights for local vs. remote operation
Accounts for individual users vs. “generic” accounts?
Easy answer: No; but many systems do not support users
Future tools
Integrate with IT user management (authentication) systems?
14
Non-technical issues
People is more important than all the technology
Many errors are un-intentional
Many errors committed by in-house personnel
People and users is a resource – the most effective
…but need to see what they can gain with security
…but need training and information to gain awareness
…but need clear roles and responsibilities
Management is the key issue
Must decide on appropriate security level for process
Must decide on the management tools in place
Must provide the resources
15
Conclusion
Important real changes based on these principles
have been implemented on existing systems
other changes are planned
Results obtained so far
Less interruptions, incidents and time spent on maintenance
More user time spent on operation of process and less on
solving control system problems
The real return is the problems that do not appear!
In the future
Consider these issues during the design/deployment
16
Perspectives
IT Security is more than technology
Management and organisation must be in place
People at all levels must be involved
IT Security is more than an IT issue
Also an issue for systems outside the classic domains of
“administrative/office” IT
CERN has taken broader organisation-wide initiatives
Look forward to “CNIC presentation”, U. Epting, today, 14:40
and “Controls Systems under Attack?”, S. Lüders, Friday
17
18