SlideShare a Scribd company logo
Cyber Security for Data Center Infrastructure
                        AFCOM Data Center World
                        Las Vegas 2012
                        Presenter: Eric Gallant
Agenda:

• Emergence of cyber weapons that target Industrial Control Systems
  (ICS/DCS/SCADA).
• Why should Data Centers care?
• Who would target a Data Center?
• Challenges to securing ICS-SCADA systems.
• Recommendations.
• Summary.
Natanz Nuclear Fuel Enrichment Plant (FEP)

• Key facility in Iranian nuclear
  program
• Extremely secure facility
• Located in a rugged, rural area
• Centrifuges located in
  hardened bunkers under 22
  meters of soil.
• No Internet connection
• In 2010, a cyber-weapon
  called STUXNET infected ICS-
  SCADA systems and caused
  catastrophic physical damage
  to centrifuges.
STUXNET was a “game changer”

• Groundbreaking
  features:
  – First SCADA “worm”
  – Crossed the barrier
    between the “cyber”
    and the “real”
  – Crossed the “air gap” to
    infect un-networked
    systems
  – First PLC rootkit
  – Sent false data to HMI
Stuxnet was a game changer

• The STUXNET cyber attack was of great interest to:
   – Cyber security community
   – Homeland Security and Intelligence communities
   – Providers of Infrastructure of National interest
• But data center infrastructure?
Why should data centers care?

• What is ICS-SCADA?
  – ICS Industrial Control System
  – SCADA Supervisory Control and Data Acquisition
  – DCS Distributed Control System
• Systems consist of:
  –   SCADA controller (Windows or Linux PC)
  –   Human Machine Interface (HMI)
  –   Programmable Logic Controllers (PLC)
  –   Field Devices (Sensors)
  –   Communication Infrastructure
Why should data centers care?

• How are ICS-SCADA systems used?
   – At Natanz to control centrifuge speed
   – At electrical utilities to control flow of
     current
   – At water purification plant to control
     flow and process
• How are ICS-SCADA systems used in data
  centers?
   – Switchgear
   – Mechanical Systems
   – Building Automation
Why should data centers care?

• Langner’s prediction, “The next cyber weapon will be
  considerably cheaper, since much of the attack vector
  and the specifics of how to use automation equipment
  will simply be copied. Sabotage with the motivation of
  extortion will get a commonplace scenario. At this time
  targets are no longer limited to critical infrastructure but
  will especially cover the private sector — a TARGET-RICH
  AREA where it cannot be assumed that organizations will
  install countermeasures large scale in a reasonable
  amount of time.”
Why should data centers care?

• Most data centers use some type of ICS-SCADA to monitor and
  control their electrical and/or mechanical infrastructure.
• Data center ICS-SCADA systems have precisely the same
  vulnerabilities as the systems at Natanz.
• Since STUXNET, cyber weapons that target physical infrastructure
  through ICS-SCADA vulnerabilities have proliferated.
• ICS-SCADA malware, malware development tools and exploits are
  becoming more common and a wide variety of bad actors are
  developing capabilities.
• More Advanced Persistent Threats (APT) similar to STUXNET have
  been discovered.
• ICS-CERT has issued alerts for every major ICS manufacturer.
  Including: GE, Schneider, Siemens, Koyo, ABB, Rockwell/Allen
  Bradley
Aurora Generator Test
Who would attack a data center’s ICS-SCADA?

• National Agencies
     – Disrupt Banking and Commerce
     – Disrupt Intelligence Gathering
     – Disrupt Communication Infrastructure
•   In 2007 a Blue Horizons paper, titled, “State Actor Threats in 2025” was
    prepared by the US Air Force. The paper identified a number of scenarios that
    could threaten the United States in the future. The scenario with “the highest
    potential for a state actor to inflict catastrophic damage to the US” is known as
    Phantom Menace. In this scenario, cyber attacks are used, “against the enemy
    so that the civilian electricity network, traffic dispatching network, financial
    transaction network, telephone communications network, and mass media
    network are completely paralyzed, this will cause the enemy nation to fall into
    social panic, street riots, and a political crisis.”
Who would attack a data center’s ICS-SCADA?

• Cybercriminals
  – Many Data Centers have deep pockets and are
    vulnerable to extortion
Who would attack a data center’s ICS-SCADA?

• Corporate Espionage
  – Gain a competitive advantage
• Operation Aurora: Google, Adobe
  Systems, Juniper Networks and Rackspace
  have publicly confirmed that they were
  targeted. According to media
  reports, Yahoo, Symantec, Northrop
  Grumman, Morgan Stanley and Dow Chemical
  were also among the targets.
Who would attack a data center’s ICS-SCADA?

• Hacktivists
  – Anonymous
  – Radical Environmentalists
  – Occupy Movement
Who would attack a data center’s ICS-SCADA?

• Script Kiddies
Challenges to securing ICS-SCADA systems

• ICS-SCADA systems are squarely in the gap
  between facilities and IT
• Awareness of vulnerability is low among IT and
  Facilities teams
• Security is assumed
• Standard cyber security tactics are ineffective and
  often counterproductive
• No authentication in communication protocols
• ICS-SCADA systems have very complex attack
  surface
Complex Attack Surfaces
Control System Vulnerabilities
Recommendations

•   Physical Security
•   Dedicated Networks
•   Ban Removable Storage Devices
•   Training
•   3rd Party Penetration/Vulnerability Testing
•   White Listing
Summary

• There's a cyberwar raging all around us.
  –   Nation vs. nation
  –   Nation vs. corporation
  –   Corporation vs. corporation
  –   Extremists vs. everyone
• ICS-SCADA systems are now on the battlefield
• Hackers and malware have the motivation and
  capability to strike data centers
• Yesterday’s security strategies are no longer
  effective
Questions?
    Eric Gallant
    Schneider Electric
    Eric.gallant@schneider-electric.com
    M: 404-431-1986

More Related Content

PPTX
PLC Virtualization Dragos S4 2019
PPTX
Cyber Security of Power grids
PDF
[CLASS 2014] Palestra Técnica - Samuel Linares
PDF
Cybersecurity for modern industrial systems
PDF
[CLASS 2014] Palestra Técnica - Michael Firstenberg
PPTX
Critical Infrastructure Security by Subodh Belgi
PDF
Industrial Control Security USA Sacramento California Oct 13/14
PPTX
Cyber & Process Attack Scenarios for ICS
PLC Virtualization Dragos S4 2019
Cyber Security of Power grids
[CLASS 2014] Palestra Técnica - Samuel Linares
Cybersecurity for modern industrial systems
[CLASS 2014] Palestra Técnica - Michael Firstenberg
Critical Infrastructure Security by Subodh Belgi
Industrial Control Security USA Sacramento California Oct 13/14
Cyber & Process Attack Scenarios for ICS

What's hot (20)

PDF
Nozomi networks-solution brief
PPTX
Protecting Infrastructure from Cyber Attacks
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PDF
Nozomi Networks Q1_2018 Company Introduction
PPTX
Nozomi Fortinet Accelerate18
PPTX
Securing Electric Utility Infrastructure
PDF
Dragos and CyberWire: ICS Ransomware
PPTX
Securing Industrial Control Systems
PDF
Should I Patch My ICS?
PPTX
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
PDF
Industrial Control Cyber Security Europe 2015
PDF
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
PPTX
Solving ICS Cybersecurity Challenges in the Electric Industry
PPTX
Hacker Halted 2016 - How to get into ICS security
PDF
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
3778975074 january march 2015 1
PDF
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
PDF
S C A D A Security Keynote C K
Nozomi networks-solution brief
Protecting Infrastructure from Cyber Attacks
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Nozomi Networks Q1_2018 Company Introduction
Nozomi Fortinet Accelerate18
Securing Electric Utility Infrastructure
Dragos and CyberWire: ICS Ransomware
Securing Industrial Control Systems
Should I Patch My ICS?
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Control Cyber Security Europe 2015
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Solving ICS Cybersecurity Challenges in the Electric Industry
Hacker Halted 2016 - How to get into ICS security
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
3778975074 january march 2015 1
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
S C A D A Security Keynote C K
Ad

Viewers also liked (20)

PPTX
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
PPTX
Plc scada details and comparison
PPTX
Scada security webinar 2012
PDF
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
ODP
Securing control systems v0.4
PPT
SCADA Security
PDF
The 4horsemen of ics secapocalypse
PPTX
Industrial protocols for pentesters
PDF
The journey to ICS - Extended
PPTX
How scada systems work
PDF
Security testing in critical systems
PDF
Nist 800 82
PDF
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
PPT
Control System Cyber Security - A Different Approach
PPTX
6 Month Industrial Automation Training
PDF
[Bucharest] From SCADA to IoT Cyber Security
PPTX
SCADA Security Webinar
PPTX
SCADA and HMI Security in InduSoft Web Studio
PPSX
Smart Grid & SCADA Systems
PDF
PT-DTS SCADA Security using MaxPatrol
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
Plc scada details and comparison
Scada security webinar 2012
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
Securing control systems v0.4
SCADA Security
The 4horsemen of ics secapocalypse
Industrial protocols for pentesters
The journey to ICS - Extended
How scada systems work
Security testing in critical systems
Nist 800 82
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Control System Cyber Security - A Different Approach
6 Month Industrial Automation Training
[Bucharest] From SCADA to IoT Cyber Security
SCADA Security Webinar
SCADA and HMI Security in InduSoft Web Studio
Smart Grid & SCADA Systems
PT-DTS SCADA Security using MaxPatrol
Ad

Similar to 2012 02 14 Afcom Presentation (20)

PPTX
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
PDF
David Blanco ISHM 8280-2016
PDF
SCADA White Paper March2012
PPTX
Infrastructure Attacks - The Next generation, ESET LLC
PDF
Cyber security colombo meetup
PDF
Securing SCADA
PDF
Securing SCADA
PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
PPTX
Day-4-Cyber-Analysis-Course_01152016.pptx
PPTX
Power station monitoring and cyber security
PDF
ICS security
PDF
115.pdf
PPT
Cybersecurity for Control Systems: Current State and Future Vision pt.1
PDF
Digital danger zone tackling cyber security
PDF
Digital danger zone tackling cyber security
PPTX
Avila 3 b
PPTX
Stuxnet worm
PDF
DTS Solution - SCADA Security Solutions
PDF
How stuxnet spreads – a study of infection paths in best practice systems
PPTX
chile-2015 (2)
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
David Blanco ISHM 8280-2016
SCADA White Paper March2012
Infrastructure Attacks - The Next generation, ESET LLC
Cyber security colombo meetup
Securing SCADA
Securing SCADA
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Day-4-Cyber-Analysis-Course_01152016.pptx
Power station monitoring and cyber security
ICS security
115.pdf
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Digital danger zone tackling cyber security
Digital danger zone tackling cyber security
Avila 3 b
Stuxnet worm
DTS Solution - SCADA Security Solutions
How stuxnet spreads – a study of infection paths in best practice systems
chile-2015 (2)

2012 02 14 Afcom Presentation

  • 1. Cyber Security for Data Center Infrastructure AFCOM Data Center World Las Vegas 2012 Presenter: Eric Gallant
  • 2. Agenda: • Emergence of cyber weapons that target Industrial Control Systems (ICS/DCS/SCADA). • Why should Data Centers care? • Who would target a Data Center? • Challenges to securing ICS-SCADA systems. • Recommendations. • Summary.
  • 3. Natanz Nuclear Fuel Enrichment Plant (FEP) • Key facility in Iranian nuclear program • Extremely secure facility • Located in a rugged, rural area • Centrifuges located in hardened bunkers under 22 meters of soil. • No Internet connection • In 2010, a cyber-weapon called STUXNET infected ICS- SCADA systems and caused catastrophic physical damage to centrifuges.
  • 4. STUXNET was a “game changer” • Groundbreaking features: – First SCADA “worm” – Crossed the barrier between the “cyber” and the “real” – Crossed the “air gap” to infect un-networked systems – First PLC rootkit – Sent false data to HMI
  • 5. Stuxnet was a game changer • The STUXNET cyber attack was of great interest to: – Cyber security community – Homeland Security and Intelligence communities – Providers of Infrastructure of National interest • But data center infrastructure?
  • 6. Why should data centers care? • What is ICS-SCADA? – ICS Industrial Control System – SCADA Supervisory Control and Data Acquisition – DCS Distributed Control System • Systems consist of: – SCADA controller (Windows or Linux PC) – Human Machine Interface (HMI) – Programmable Logic Controllers (PLC) – Field Devices (Sensors) – Communication Infrastructure
  • 7. Why should data centers care? • How are ICS-SCADA systems used? – At Natanz to control centrifuge speed – At electrical utilities to control flow of current – At water purification plant to control flow and process • How are ICS-SCADA systems used in data centers? – Switchgear – Mechanical Systems – Building Automation
  • 8. Why should data centers care? • Langner’s prediction, “The next cyber weapon will be considerably cheaper, since much of the attack vector and the specifics of how to use automation equipment will simply be copied. Sabotage with the motivation of extortion will get a commonplace scenario. At this time targets are no longer limited to critical infrastructure but will especially cover the private sector — a TARGET-RICH AREA where it cannot be assumed that organizations will install countermeasures large scale in a reasonable amount of time.”
  • 9. Why should data centers care? • Most data centers use some type of ICS-SCADA to monitor and control their electrical and/or mechanical infrastructure. • Data center ICS-SCADA systems have precisely the same vulnerabilities as the systems at Natanz. • Since STUXNET, cyber weapons that target physical infrastructure through ICS-SCADA vulnerabilities have proliferated. • ICS-SCADA malware, malware development tools and exploits are becoming more common and a wide variety of bad actors are developing capabilities. • More Advanced Persistent Threats (APT) similar to STUXNET have been discovered. • ICS-CERT has issued alerts for every major ICS manufacturer. Including: GE, Schneider, Siemens, Koyo, ABB, Rockwell/Allen Bradley
  • 11. Who would attack a data center’s ICS-SCADA? • National Agencies – Disrupt Banking and Commerce – Disrupt Intelligence Gathering – Disrupt Communication Infrastructure • In 2007 a Blue Horizons paper, titled, “State Actor Threats in 2025” was prepared by the US Air Force. The paper identified a number of scenarios that could threaten the United States in the future. The scenario with “the highest potential for a state actor to inflict catastrophic damage to the US” is known as Phantom Menace. In this scenario, cyber attacks are used, “against the enemy so that the civilian electricity network, traffic dispatching network, financial transaction network, telephone communications network, and mass media network are completely paralyzed, this will cause the enemy nation to fall into social panic, street riots, and a political crisis.”
  • 12. Who would attack a data center’s ICS-SCADA? • Cybercriminals – Many Data Centers have deep pockets and are vulnerable to extortion
  • 13. Who would attack a data center’s ICS-SCADA? • Corporate Espionage – Gain a competitive advantage • Operation Aurora: Google, Adobe Systems, Juniper Networks and Rackspace have publicly confirmed that they were targeted. According to media reports, Yahoo, Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical were also among the targets.
  • 14. Who would attack a data center’s ICS-SCADA? • Hacktivists – Anonymous – Radical Environmentalists – Occupy Movement
  • 15. Who would attack a data center’s ICS-SCADA? • Script Kiddies
  • 16. Challenges to securing ICS-SCADA systems • ICS-SCADA systems are squarely in the gap between facilities and IT • Awareness of vulnerability is low among IT and Facilities teams • Security is assumed • Standard cyber security tactics are ineffective and often counterproductive • No authentication in communication protocols • ICS-SCADA systems have very complex attack surface
  • 19. Recommendations • Physical Security • Dedicated Networks • Ban Removable Storage Devices • Training • 3rd Party Penetration/Vulnerability Testing • White Listing
  • 20. Summary • There's a cyberwar raging all around us. – Nation vs. nation – Nation vs. corporation – Corporation vs. corporation – Extremists vs. everyone • ICS-SCADA systems are now on the battlefield • Hackers and malware have the motivation and capability to strike data centers • Yesterday’s security strategies are no longer effective
  • 21. Questions? Eric Gallant Schneider Electric Eric.gallant@schneider-electric.com M: 404-431-1986

Editor's Notes

  • #2: Different from many of the presentations you have heard this week. Purely educational. Lee Tech and Schneider do not offer products or services directly related to addressing cyber vulnerabilities in data center infrastructure.This is a subject that I became interested in in 2010. I’ve done a lot of research, published a few articles and I’m presenting to you a summary of my research on the subject.Purpose of this presentation is to raise awareness of an emerging trend. Hacking and malware designed to target physical infrastructure.
  • #3: Who would target a data center? In security-speak, what are the “threat agents”?Recommendations. No technical deep dive on recommendations. System architectures and degree of convergence are too diverse to have a meaningful conversation with out knowing more about system particulars.Discuss convergence and the trend of ICS-SCADA systems migrating to IP6
  • #4: Most of what you see in this aerial photo is admin and concrete manufacturing buildings. The bulk of the facility is deep underground. Looks a bit like Nevada (Ha, ha)A bit about enrichment of Uranium. U235 is 99.25% of naturally occurring Uranium. The remainder is an isotope, U238. Separating U235 from U238 is very delicate, very tricky work.
  • #5: The first “cyber super weapon”Crossing the barrier between Cyber and Real. This is one of the key differences between cyber security for ICS and security for traditional IT. Traditional IT threats don’t cause physical effects that destroy hardware and potentially hurts people. Set up discussion of differences between traditional IT security and ICS security.
  • #6: Infrastructure of National Interest such as power generation and distribution, water purification, oil and gas refinement etc..Briefly discuss how data centers often are infrastructure of national interest. Setting up more in depth conversation later in the presentation.
  • #7: System consists of…there are slight variations in terms and device types depending on the system application. However, this is a good summary.System consists of…Each of the devices listed has unique cyber vulnerabilitiesCommunication Infrastructure. Discuss how this aspect of ICS systems is rapidly converging on IP6 and how this convergence is one of the reasons that ICS systems are becoming more vulnerable. Also, how convergence to IP is making ICS more useful and powerful.
  • #8: Reiterate that regardless of the application and the manufacturer of the ICS the vulnerabilities are the same. All systems softwares run on vulnerable Windows (rarely Unix) platforms, all communicate using vulnerable unauthenticated MODBUS (or PROFIBUS) protocol, all run on vulnerable off the shelf (OTS) PCs. etc..Photo shows a data center SCADA system. Through the window is the data centers generators being controlled and monitored by the SCADA system.
  • #9: Who is Ralph LangnerDiscuss Langners TED talk as an informative resourceDiscuss the probability that infrastructure such as the electrical grid will probably get their act together before falling victim to a cyber attack. However, as ICS weapons proliferate , an increasing number of lower profile facilities will become viable targets.
  • #10: Discuss DUQU
  • #12: Phantom Menace..not Star Wars Episode I (chuckle)
  • #13: Most likely malware to adversely effect an ICS is currently unintentional fallout from one of these types of crimes. Corporate assets are attacked by cybercriminals and networked ICS assets are infected almost by accident. Discuss how important it is that ICS systems operate in as close to real time as possible. Discuss how infection of the SCADA controller by a botnet or virus would slow system thus preventing timely response to changing system conditions.
  • #15: Anarchist hacker collective, “Anonymous” has been actively seeking skills and information relative to ICS-SCADA hackingGroups like Greenpeace have a history of aggressively going after targets that they feel are egrigious polluters. Greenpeace has identfied data centers and energy hogs and the dust up between Greenpeace and Facebook has been well covered by industry newsOccupy would undoubtedly love to take down financial sector data centers such as the NY Stock Exchange
  • #16: Majority of malware isn’t written from scratch with a specific purpose in mind. Most use existing viruses that have been tweaked (hacked) by amateurs (the proverbial Kid-in-his-parent’s-basement). This has led to the huge numbers of viruses and worms currently in circulation. Security experts expect ICS targeted attacks to follow a similar proliferation path. From relatively rare to increasingly prevalent as more groups develop expertise and tools to exploit security flaws.
  • #17: Discuss The Gap. How facilities teams often have little understanding of cybersecurity and how IT teams with strong cybersecurity skill don’t know that vulnerable systems can be found in the gray space.Discuss the priorities of IT professionals are Confidentiality, Integrity, Availability (CIA) in that order. ICS on the other hand flips those priorities 100% to have Availability an absolute must have and Confidentiality is relatively low.
  • #18: Highly complex systems with a variety of interconnections.
  • #19: Each component has multiple vulnerabilitiesFirewalls and Read Only devices may adequately patch some vulnerabilities. But a defense in depth strategy is needed for good security.Thanks to Joel Langill at SCADAhacker.com for the graphicDiscuss how this network architecture is vastly different from traditional IT architecture
  • #20: Physical security is vital. If I can walk up to your generator (for example) because the generator yard is unsecure or using a social hack you have a vulnerability that should be fixed before you address cyber vulnerabilities.Dedicated Networks The story of the Facility Manager that got fed up with having two identical PCs on his desk and simply loaded his SCADA system on his corproate email PC.White listing vs. black listing. Slow system response during tradition AV protection scanningValue of ICS-CERT bullitinsDiscuss “threats from” and “threats to”