Search and Find
Service
More of the content
Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure
Front Cover
1
Techno Security's Guide to Securing SCADA
4
Copyright Page
5
Lead Author
6
Contributors
8
Foreword Contributor
15
Contents
16
Foreword
24
Chapter 1: Physical Security: SCADA and the Critical Infrastructure’s Biggest Vulnerability
26
Introduction
27
Key Control
28
Check All Locks for Proper Operation
29
A Little More about Locks and Lock Picking
30
The Elephant Burial Ground
37
Dumpster Diving Still Works
43
Employee Badges
45
Shredder Technology Has Changed
47
Keep an Eye on Corporate or Agency Phonebooks
48
Tailgating
49
Building Operations-Cleaning Crew Awareness
50
Spot-Checking Those Drop Ceilings
53
Checking for Key Stroke Readers
53
Checking Those Phone Closets
56
Removing a Few Door Signs
57
Review Video Security Logs
57
Motion-Sensing Lights
58
Let’s Go to Lunch
59
Fun in Manholes
62
Internal Auditors Are Your Friends
65
Always Be Slightly Suspicious
65
Getting Every Employee Involved
66
Summary
67
Solutions Fast Track
67
Frequently Asked Questions (and Special Interviews)
70
Chapter 2: Supervisory Control and Data Acquisition
86
Introduction
87
Just What Is SCADA?
87
SCADA Systems and Components
90
Remote Terminal Units (RTUs)
90
Programmable Logic Controllers (PLC)
90
Discrete Control
90
Continuous Control
90
Human Machine Interface (HMI)
91
Distributed Control Systems (DCS)
91
Hybrid Controllers
92
Event Loggers
92
Common SCADA Architectures
93
SCADA Communications Protocols
95
How Serious Are the Security Issues of SCADA?
96
Determining the Risks in Your SCADA System
100
Risk Mitigation for SCADA
101
Firewall Considerations for SCADA
103
Negative and Positive Security Models in Firewalls
104
Multi-Network Connectivity
104
Reactive and Proactive Solutions
105
Firewall Inspection Methods
107
Static Packet Filter
107
The Stateful Packet Filter
108
The Circuit-Level Gateway
109
Application-Level Gateway (Proxy)
110
Intrusion Prevention Gateway
112
Deep Packet Inspection
113
Unified Threat Management (UTM)
114
Summary
115
Solutions Fast Track
115
Frequently Asked Questions
118
Chapter 3: SCADA Security Assessment Methodology
120
Introduction
121
Why Do Assessments on SCADA Systems?
121
Assessments Are the Right Thing to Do
122
Assessments Are Required
122
Information Protection Requirements
122
National Institute of Standards and Technology (NIST) Guidance
123
North American Electric Reliability Council (NERC) Critical Infrastructure Protection (CIP) Standards
124
Water Infrastructure Security Enhancement (WISE)
124
The Critical Infrastructure Information Act of 2002
124
An Approach to SCADA Information Security Assessments
125
Pre-Project Activities
127
Vetting the Assessment Request
127
Gaining Buy-In from Management and Technical Personnel
127
Management Buy-In
128
Technical Staff Buy-In
128
Researching the Organization
129
Researching Regulatory and Policy Requirements
130
Determining if this Is a Baseline Assessment or a Repeat Assessment
131
Making a Go/No-Go Decision
131
Pre-Assessment Activities
131
Determining the Organizational Mission
132
Identifying Critical Information
132
Example: Information Criticality
133
Business Description
133
Mission Statement
133
Critical Information for OOPS
134
Identifying Impacts
134
Example Continued: OOPS Impact
135
The Information Criticality Matrix
135
Using the Impact Definitions
136
Organizational Criticality
136
Example Continued: OOPS OICM
137
Identifying Critical Systems/Networks
138
OOPS Example Continued
138
Defining Security Objectives
141
Determining Logical and Physical Boundaries
142
Physical Boundaries
142
Logical Boundaries
142
Determining the Rules of Engagement, Customer Concerns, and Customer Constraints
142
The Rules of Engagement
143
Levels of Invasiveness
143
Testing Machine Addressing
143
Time Frames for Scanning and Interviews
144
Notification Procedures
144
Scanning Tools and Exclusions
144
Customer Concerns
144
Customer Constraints
145
Legal Authorization
145
Writing the Assessment Plan
145
Components of the Assessment Plan
145
On-Site Assessment Activities
147
Conducting the Organizational Assessment
147
Documentation Review
148
Interviews
148
System Demonstrations
149
Observation
149
Conducting the Technical Assessment
149
Enumeration Activities
150
Vulnerability Identification Activities
150
Tools
152
Communication
152
Post Assessment Activities
152
Conducting Analysis
152
Final Report Creation
153
Resources
154
Summary
155
Solutions Fast Track
156
Frequently Asked Questions
159
Chapter 4: Developing an Effective Security Awareness Program
162
Introduction
163
Why an Information Security Awareness Program Is Important
165
We Fail to Recruit Our Employees into the Company’s Security Program
166
We Need to Take the Issue Seriously
167
How to Design an Effective Information Security Awareness Program
168
Seven Times, Seven Different Ways
171
Show Me the Money!
173
Two Important Keys to Implementing an Effective Program
175
To Print or Not to Print
177
Online Training Programs
179
Your In-House Web Site
179
How to Implement an Information Security Awareness Program
180
What We Have Here Is a Failure to Communicate
182
Communicate, Communicate, Communicate!
182
Other Touch Points
182
Manager’s Quick Reference Guide
183
Let’s Talk about Alliances
184
Audit
184
Legal
184
Privacy
184
Compliance
185
Training and Communications
185
Personnel
185
Information Security Consultants
186
How Do You Keep Your Program a Successful Component of Your Company’s Mindset?
187
How to Measure Your Program
188
Summary
192
Solutions Fast Track
192
Chapter 5: Working with Law Enforcement on SCADA Incidents
196
Introduction
197
SCADA System Overview
197
Secure Network Management
200
Securing Wide Area Network Perimeter
200
Controlling Access
201
Performing Network Backup and Recovery
201
Transmitting Legacy Non-Routable Protocol Securely
201
Dial-Up Access to the Remote Terminal Units (RTU)
203
Vendor Support: Dial-Up Modem/VPN Access
203
IT Controlled Communication Gear
203
Corporate VPNs
204
Database Links
204
Poorly Configured Firewalls
205
Business Partner Links
205
Managing Security Events
206
Conduct Routine Assessments
207
Examples of Common Attack Techniques
207
Man-In-The-Middle Attacks (MITM)
207
Key-Logger Software
208
Summary
209
Solutions Fast Track
210
Frequently Asked Questions
212
Chapter 6: Locked but Not Secure: An Overview of Conventional and High Security Locks
214
Introduction
216
Conventional Pin Tumbler Locks
217
The Origins of the Modern Pin Tumbler Lock
219
Review: The Essentials of Pin Tumbler Lock Design
221
Security Enhancements for Conventional Locks
222
Anti-Bumping Pins
222
Security Pins
223
Keyways and Related Designs
224
Bitting Design
224
Design of the Key
225
Standards for Conventional and High Security Locks
226
Transforming a Conventional Cylinder to High Security
227
Deficiencies in the UL 437 Standard
229
Failure to Specify Real World Testing
229
Pick and Impressioning Resistance
230
Complex Forms of Picking
231
Forced Entry Resistance
231
Issues Not Addressed by UL 437
231
Bump Keys
232
Decoding Attacks
233
Key Control
233
Mechanical Bypass of Locking Mechanisms
234
BHMA/ANSI Standards: 156.50 and 156.30
235
BHMA/ANSI 156.50
235
High Security Locks and the BHMA/ANSI Standard
235
The Concept of Security
236
BHMA/ANSI 156.30 High Security Standard
237
Key Control
238
Destructive Testing
238
Surreptitious Entry Resistance
239
Deficiencies in the 156.30 Standard
239
Security Vulnerabilities of Conventional Locks: Why High Security Locks Are Supposed to Offer More Protection Against Methods of Entry
240
Conventional Pin Tumbler Locks: Security Vulnerabilities and Their Compromise
241
Lock Control Procedures
242
Key Control and Key Security
243
Key Security
243
The Concept of Key Control As It Applies to Security
244
The Importance of Key Control and Key Security
244
Rights Amplification
245
Replication, Duplication, and Simulation of Keys and Key Blanks
246
Gathering Intelligence About a System from Its Keys
246
Covert Entry Techniques: Manipulation
Covert Entry Techniques: Manipulation
247
247
Bumping
248
Picking
248
Impressioning
248
Extrapolation of the TMK
248
Mechanical Bypass
248
High Security to High Insecurity: Real World Attacks
249
Summary
251
Solutions Fast Track
251
Frequently Asked Questions
253
Chapter 7: Bomb Threat Planning: Things Have Changed
256
Introduction
257
The Day Our World Changed
258
Insider Information: Where Do These Guys Get This Stuff?
259
The Terrorist Profile
261
Potential Terror Targets
262
Statement Targets
262
Infrastructure Targets
263
Commercial Targets
264
Transportation Targets
264
What Should I Be Looking For?
264
The Container
265
The Power Source
265
Switches
266
Initiators
266
Main Charge
267
Searching: What Am I Looking For and Where?
269
Recommendations for Target Hardening
270
Outside
270
Employee Identification
271
Cameras
271
Deliveries
271
Interior
271
Mail rooms
272
Evacuation Plans
274
Summary
276
Chapter 8: Biometric Authentication for SCADA Security
278
Introduction
279
Understanding Biometric Systems and How They Are Best Used for SCADA Security
280
Footprints to DNA Readings
280
Human Measurements Can Slow Machines
280
Biometric System Imperfections Are at Odds with Perception
281
What is Biometric Authentication?
281
Multiple Factor Authentication
282
What Parts of You Can Be Measured for Security Purposes?
282
Common Measurements for Current Biometric Authentication
282
How Does Biometric Comparison Work?
283
Where Are Biometrics Used in SCADA Systems?
285
Choosing the Best Form of Measurement for Your System
286
Biometric Measurements Trigger Recognition
286
Biometric Measurements Useful in SCADA Security Processes
287
Identify Your System Priorities Before Choosing a Biometric Application
289
Where are Biometric Authentication Regimes Vulnerable?
291
Tricking the Biometric Capture Device
291
Electronic Manipulation of the Authentication Process
293
Identity Theft with Biometric Files: Capturing Your Essence
294
Presumptions of Accuracy
295
How Can We Replace That Finger?
295
Measuring Minutia Can Be Safer Than Storing a Whole Biometric Photograph
296
Anticipating Legal and Policy Changes That Will Affect Biometrics
297
Summary
299
Solutions Fast Track
299
Frequently Asked Questions
301
Appendix: Personal, Workforce, and Family Preparedness
304
Introduction
305
Threats
305
Your Personal Preparedness Plan
308
The Escape Pack
310
Description of Kit Contents
311
Workforce Preparedness
312
Steps for Successful Workforce Preparedness
314
Get Out, Get Away, and Get in Touch
315
Family Preparedness Plan
317
Possible Meeting Points
319
Community Shelter
319
The Personal Evacuation Bag
320
Preparedness Pantry
321
Water
324
Cooking
325
Testing Your Home Preparedness Plan
326
Family Ready Kit
327
Family Ready Kit Contents
328
No Lights? No Problem!
329
Emergency Lighting
330
Handheld Lights
331
Headlamps
332
General Illumination Lamps
333
Spots and Floodlights
334
Emergency Power
334
UPS and Battery Backup
337
Portable 12-Volt Inverters
337
Alternative Power Sources
338
Staying in Touch
339
Dynamo Radios
341
FRS Radios
341
Ham Radio
341
The “POTS” Line
342
Summary
343
Index
344
All prices incl. VAT