16
Public 2017 CODESYS ® a trademark of 3S-Smart Software Solutions GmbH Security in Automation  – possible threats and integrated measures in CODESYS CODESYS Users Conference 2017 Manfred Werner

Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

Public 2017

CODESYS® a trademark of 3S-Smart Software Solutions GmbH

Security in Automation  –possible threats and integrated measures in CODESYS

CODESYS Users Conference 2017

Manfred Werner

Page 2: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Agenda

1

2

What is Security?

Situation in Industrial Security

2 © 3S-Smart Software Solutions GmbH

3 Security Measures within CODESYS

Page 3: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

What is Security?

SecuritySecuritySafetySafety

vs.

3 © 3S-Smart Software Solutions GmbH

Restricted complexity

Failure prediction

Availability is not central

Protect humans Protect investments

„Keep smart people fromdoing clever things“

„Keep crazy people fromdoing stupid things“

Constantly growing complexity

Prediction of threat situation isnot possible

Availability has top priority

Page 4: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

„Keep smart people from doing clever things!“

What is Security?

4 © 3S-Smart Software Solutions GmbH

© Author unknown, Location: Konsequenz, Universität Bielefeld

Page 5: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Vulnerabilities incidents in industrial security:

RISI 2010 (ICSJWG Spring Conference): 162 incidents since 2000 78% unintended (handling or device errors, viruses) 22% intentional, 53% of which by insiders (employees) and 47% by externals (including

suppliers)

Vulnerabilities in products (ICS):

ICS-Cert Advisories

Situation in Industrial Security

5 © 3S-Smart Software Solutions GmbH

ICS-Cert Advisories 44 vulnerabilities in different products from January until May 2013 Are systematically searched for by security consultants (service providers)

Remarkable:

The incidents have nothing to do with the vulnerabilities.

Known, targeted attack on an application

StuxNet

Page 6: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Vulnerabilities

Situation in Industrial Security

Programming interface &

remote maintenance

Cloud / Fog Level

6 © 3S-Smart Software Solutions GmbH

Operation and monitoring

Operation and monitoring

Realtimecommunication

between controllers

Fieldbus interface

Realtimecommunication

between controllers

Page 7: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Level 1: Occasional and accidental threat

Example: Hard disk failure Example: Operating error

Level 2: Intentional threat by simple means

Example: Password guessed correctly

Level 3:

IEC 62443 protection level

Situation in Industrial Security

7 © 3S-Smart Software Solutions GmbH

Level 3: Intentional threat by highly-developed means

Example: Hacker tools

Level 4: Intentional threat by highly-developed meansand extended resources

Example: Specific development Example: Knowledge of the application Example: Corruption of insiders

Page 8: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Situation in Industrial Security

8 © 3S-Smart Software Solutions GmbH

Page 9: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Security responsibilities in industrial control applications

Situation in Industrial Security

9 © 3S-Smart Software Solutions GmbH

Page 10: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Guidline for OEMs, System Integrators and Operators

Introduction in security subjects in industrial automation

Involved parties

Definition of the security level

Available tools in CODESYS to achieve the desired security level

Security Whitepaper

Security measures within CODESYS

10 © 3S-Smart Software Solutions GmbH

Dealing with detected security vulnerability

Page 11: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

CODESYS Development System

Security measures within CODESYS

Measure Whitepaper Section

Measure relevant for Suitable measure against

Suppliers of automation components

System integrators / machine builders

Operator

Encryption of the source code of the application

5.1.1 (10) X Occasional / unintentional threats

and attacks

User administration on project 5.1.2 (11) X Occasional /

11 © 3S-Smart Software Solutions GmbH

User administration on project level

5.1.2 (11) X Occasional / unintentional threats

and attacks

Page 12: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

CODESYS Runtime System

Security measures within CODESYS

Measure Whitepaper Section

Measure relevant for Suitable measure against

Suppliers of automation components

System integrators / machine builders

Operator

Access to the runtime system with authentication / permission management

5.2.1 (11) X X X Occasional / unintentional threats

and attacks

12 © 3S-Smart Software Solutions GmbH

Encryption and signing of the executable application code

5.2.2 (11) X X Attacks

Controller operation mode 5.2.3 (12) X Occasional / unintentional threats

and attacks

Interactive login 5.2.4 (12) X X Occasional / unintentional threats

Disaster recovery 5.2.5 (12) X X X Occasional / unintentional threats

Communication encryption between the IDE and the controller

5.2.6 (12) X X X Attacks

Page 13: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

IEC 61131-3 Application code

Security measures within CODESYS

Measure Whitepaper Section

Measure relevant for Suitable measure against

Suppliers of automation components

System integrators / machine builders

Operator

Access restrictions out of the application / library

5.3.1 (13) X X Occasional / unintentional threats

and attacks

Unlocking additional functions 5.3.2 (13) X X Occasional /

13 © 3S-Smart Software Solutions GmbH

Unlocking additional functions 5.3.2 (13) X X Occasional / unintentional threats

and attacks

Page 14: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

CODESYS Visualization

Security measures within CODESYS

Measure Whitepaper Section

Measure relevant for Suitable measure against

Suppliers of automation components

System integrators / machine builders

Operator

Visualization User Management 5.4.1 (13) X X Occasional / unintentional threats

and attacks

Communication encryption for the 5.4.2 (13) X X X Attacks

14 © 3S-Smart Software Solutions GmbH

Communication encryption for the CODESYS WebVisu

5.4.2 (13) X X X Attacks

Page 15: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

CODESYS Security

Handling of security vulnerabilities in CODESYS

Security measures within CODESYS

External report OEM reportThird partysoftware

Internal report

Creation of securityJira issue

Decision fix version(s) /release date

Assessment of impact, severity, tech. urgency

Decision publishingdate

[email protected]

15 © 3S-Smart Software Solutions GmbH

release date severity, tech. urgency date

Jira Security-Issues

Fix

Integration, test, release

Security-Patch

OEM customer info„First-Advisory“

Advisory Update (including

Workaround)

Release Advisory, Release Information

Document

Workaround

Version-No.Update recommendation

Page 16: Security in Automation - ПК ПРОЛОГ · 2017-05-25 · Security in Automation ... Are systematically searched for by security consultants (service providers) Remarkable: The

16 © 3S-Smart Software Solutions GmbH

Inspiring Automation Solutions

Thank you for your attention.

CODESYS® is a registered trademark of 3S-Smart Software Solutions GmbH. Technical specifications are subject to change.Errors and omissions excepted. No reproduction or distribution, in whole or in part, without prior permission.Note: Not all CODESYS features are available in all territories. For more information on geographic restrictions, please contact [email protected].