11
Tampa Convention Center Tampa, Florida Cybersecurity Basics For Energy Managers Michael Mylrea Manager, Cybersecurity & Energy Technology Pacific Northwest National Lab August 15, 2017 Protecting Buildings Operational Technology (OT) from Evolving Cyber Threats & Vulnerabilities

Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Tampa Convention Center • Tampa, Florida

Cybersecurity Basics For Energy Managers

Michael MylreaManager, Cybersecurity & Energy TechnologyPacific Northwest National Lab August 15, 2017

Protecting Buildings Operational Technology (OT) from Evolving Cyber Threats & Vulnerabilities

Page 2: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade2

Case Studies & Lessons LearnedUkraine Grid Cyber Attack

Lessons Learned Know and Monitor Your Critical Cyber Assets Do Not Run A Flat Network - Segregate & Secure IT/OT Networks Cyber Policies Can Reduce Human Error Hackers Often Use Very Basic Tactics to Hack Very Vulnerable Systems Implement Password Management Controls, Firewalls, Encryption & Configuration Policies

The Industrial Control System Cyber Kill Chain. Michael J. Assante and Robert M. Lee October 2015

Page 3: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade

Case Studies & Lessons Learned

3

Devil’s IvySHODAN RESEARCHMIRAI

Lessons Learned Cybersecurity starts with smart procurement and provisioning of devices Though it is easy to find vulnerabilities, you can make it tough to exploit them Patch early, Patch often, Patch Smart Security is a continuous process that requires active management of cyber risk

Page 4: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade4

Case Study: DOE Integrated Joint Cybersecurity Coordination Center – Cyber Physical ECC

Buildings Cybersecurity

Framework

Lessons Learned & Recommendations Government lacks clear cybersecurity requirements for buildings and OT cybersecurity Insider attacks, social engineering & physical access can defeat cybersecurity defenses Establish clear roles and responsibilities for buildings cybersecurity Security is a continuous process that requires active management of cyber risk

http://www.bc2m2.pnnl.gov/

www.cf.labworks.org

3 Open Source Tools to Help Protect Buildings

Operational Technology (OT) from Evolving Cyber Threats & Vulnerabilities

Page 5: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade

IJC3 Lessons Learned – Applying Facility OT Cyber Assessment Tools & Methodologies

DOE Buildings Cybersecurity

Framework

DOE Cybersecurity

Maturity Model

INL/DHS CSET

COTS Cyber Tools/Vendor

Solutions

Provides an actionable framework for establishing OT building and facility specific OT cybersecurity PROCEDURES-Implements new executive order for cybersecurity for critical infrastructure

Provides high level baseline and guidance for developing cybersecurity POLICIES for buildings OT• Adapted from over 50 cyber best practices to assess

buildings/facilities IT and OT

Helps assess the policies and procedures that are in place against industry and government best practices

Organizational Level tools

Facility Leveltools

Procedures

Policies

Measuring policies and procedures in place

Systems level Assessment

Security is a Continuous Process… Fostering a Culture of Security is Imperative. The following are a couple of easy to use tools to facilitate this process

There are are many COTS, each with their own strengths and weaknesses….but no panacea.

Limitations: Cost, know-how and risk of causing damage -scanning legacy buildings controls

Page 6: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Buildings Cybersecurity Frameworkhttps://cf.labworks.org

Page 7: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

BCF Realizes Goals of the Recent Executive Order Requiring Implementation of the NIST Cyber

Framework

• Domains are logical groupings of cybersecurity practices, based on thefoundation of National Institute of Standards and Technology (NIST)Framework.

• The executive order encourages implementation of the NIST Framework which is the core of BCF and holds cabinet secretaries and agency directors responsible for the security of their organizations' information assets, as is the current law.

• "Agency heads will be held accountable by the president for implementing risk management measures commensurate with the risk and magnitude of the harm that would result from unauthorized access, use, disclosure, disruption, modification or destruction of information or systems," the revised draft order states.

Page 8: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Organization of the BCF Framework

Framework

Domains

Building Blocks

Each Domain Includes a Checklist & Security Indicator

Level (SIL)

Security Level

1

Security Level

2

Security Level3

Framework contains 5 domains

Three or more per domain. Unique to each domain

Based on NIST Cybersecurity Framework and existing best practices

Page 9: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade9

BCF Webtool Features

https://cf.labworks.org

Page 10: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade

• SANS Institute 20 Critical Security Controls• ISA 62443-3-3:2013• ISO/IEC 27001:2013• Michael Chipley; Daryl Haegley; And Eric J. Nickel, Your Building Control Systems Have Been Hacked. Now What?• DOE Cybersecurity Capability Maturity Model (C2M2)• DOE Buildings Cybersecurity Maturity Model (B-C2M2)• DOE EERE BTO Buildings Cybersecurity Whitepaper (forthcoming)• DOE EERE Building Cybersecurity Framework Overview (forthcoming)• DOE’s U.S. Department of Defense, United Facilities Criteria: Cybersecurity of Facility-Related Control Systems (UFC)• DoD Instruction 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT)• DoD Facility-Related Control Systems Cybersecurity Guidelines• Executive Order 13636 and 13800 (May 2017)• Michael J. Assante and Robert M. Lee . The Industrial Control System Cyber Kill Chain. October 2015• National Institute of Standards and Technology Special Publication 800-53 R4 Security and Privacy Controls for

Federal Information Systems and Organizations 2013• National Institute of Standards and Technology Special Publication 800-82 R2 Guide to Industrial Control Systems

(ICS) Security 2015• National Institute of Standards and Technology Special Publication SP 800-115• United Facilities Criteria 3-410-02 Direct Digital Control for HVAC and Other Building Control Systems• Government Accountability Office Report 15-6 Federal Facility Cybersecurity 2014

10

References

Page 11: Protecting Buildings Operational Technology (OT) from ... · Security is a Continuous Process … Fostering a Culture of Security is Imperative. The following are a couple of easy

Energy Exchange: Federal Sustainability for the Next Decade

Contact Info

11

Michael MylreaPacific Northwest National Lab

[email protected]