Scada Security Workshop Smau 2009 Pennasilico Tieghi

32
Alessio L.R. Pennasilico, Referente Sikurezza.org, CD e CTS CLUSIT Enzo Maria Tieghi, Referente ANIPLA, ISPE, AIIC, Socio CLUSIT Come proteggere reti e sistemi di Automazione, Controllo e Telecontrollo da rischi informatici nell'industria e nelle utility SMAU 2009 21 Ottobre 2009 Fieramilanocity, Milano

description

Alessio Pennasilico ed Enzo M. Tieghi conducono il workshop dal titolo ";Come proteggere reti e sistemi di Automazione, Controllo e Telecontrollo da rischi informatici nell’industria e nelle utility"; a SMAU 2009Milano 21 Ottobre 2009

Transcript of Scada Security Workshop Smau 2009 Pennasilico Tieghi

Page 1: Scada Security Workshop Smau  2009 Pennasilico Tieghi

• Alessio L.R. Pennasilico, Referente Sikurezza.org, CD e CTS CLUSIT

• Enzo Maria Tieghi, Referente ANIPLA, ISPE, AIIC, Socio CLUSIT

Come proteggere reti e sistemi di Automazione, Controllo e Telecontrollo da rischi informatici nell'industria e nelle utility

SMAU 2009 21 Ottobre 2009Fieramilanocity, Milano

Page 2: Scada Security Workshop Smau  2009 Pennasilico Tieghi

I relatori – Alessio L.R. Pennasilico aka mayhem

• Security Evangelist @

• Board of Directors:

Associazione Informatici Professionisti, CLUSIT Associazione Italiana Professionisti Sicurezza Informatica, Italian Linux Society, LUGVR, Sikurezza.org, Hacker’s Profiling Project

Page 3: Scada Security Workshop Smau  2009 Pennasilico Tieghi

I relatori – Enzo Maria Tieghi• Amministratore Delegato di ServiTecno

(da oltre 20 anni software industriale)

• Attivo in associazioni e gruppi di studio per la cyber security industriale (ISA s99 member)

• In Advisory Board, gruppi e progetti internazionali su Industrial Security e CIP (Critical Infrastructure Protection)

• Co-autore ed autore pubblicazioni, articoli e memorie

3

Page 4: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Sistemi di Automazione

IO

BUS (rete di campo? Ethernet? IP?)

PLC ed I/O distribuiti: reti/bus Profibus, Profinet, LonW, DeviceNet, Modbus, Bacnet,

ASI, Can, ecc.

Dispositivi di I/O: Sensori, Attuatori,

Comandi, Allarmi, …

Controllo

Supervisione

- SCADA

- HMI

- DCS

Page 5: Scada Security Workshop Smau  2009 Pennasilico Tieghi

SCADA/HMI: Visualizzazione, Alarmi,Trend,

Controllo

Production

Page 6: Scada Security Workshop Smau  2009 Pennasilico Tieghi

SCADA & dati dagli impianti

Packaging HVAC UtilitySecondaryPrimary

MES/ BusinessSystem

iHistorian

Page 7: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Reti di fabbrica & IT

Page 8: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Incidenti del passato (+ altri recenti… del 2008/9…)

• Al contrario di quanto si potrebbe normalmente pensare, diversi sono gli incidenti avvenuti in questo mondo, partendo dai lontani anni ‘80 sino a casi decisamente recenti.

Page 9: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Whatcom Falls Park• “About 3:28 p.m., Pacific daylight time, on June 10,

1999, a 16-inch-diameter steel pipeline owned by Olympic Pipe Line Company ruptured and released about 237,000 gallons of gasoline into a creek that flowed through Whatcom Falls Park in Bellingham, Washington. About 1.5 hours after the rupture, the gasoline ignited and burned approximately 1.5 miles along the creek. Two 10-year-old boys and an 18-year-old young man died as a result of the accident. Eight additional injuries were documented. A single-family residence and the city of Bellinghamís water treatment plant were severely damaged. As of January 2002, Olympic estimated that total property damages were at least $45 million.”

Page 10: Scada Security Workshop Smau  2009 Pennasilico Tieghi
Page 11: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Technical details• “The Olympic Pipeline SCADA system

consisted of Teledyne Brown Engineering20 SCADA Vector software, version 3.6.1., running on two Digital Equipment Corporation (DEC) VAX Model 4000-300 computers with VMS operating system Version 7.1. In addition to the two main SCADA computers (OLY01 and 02), a similarly configured DEC Alpha 300 computer running Alpha/VMS was used as a host for the separate Modisette Associates, Inc., pipeline leak detection system software package.”

Page 12: Scada Security Workshop Smau  2009 Pennasilico Tieghi

SCADA can save lives

• “5. If the supervisory control and data acquisition (SCADA) system computers had remained responsive to the commands of the Olympic controllers, the controller operating the accident pipeline probably would have been able to initiate actions that would have prevented the pressure increase that ruptured the pipeline.”

http://www.cob.org/press/pipeline/whatcomcreek.htm

Page 13: Scada Security Workshop Smau  2009 Pennasilico Tieghi
Page 14: Scada Security Workshop Smau  2009 Pennasilico Tieghi
Page 15: Scada Security Workshop Smau  2009 Pennasilico Tieghi
Page 16: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Dove intervenire…

Page 17: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Seg&Seg: segmentazione e segregazione

Page 18: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Segmentazione secondo ISA s99 con Zone & Conduit

DataServer

File/PrintServer

App.Server

WorkstationLaptop computer

Router

Plant A Zone

Controller Controller

I/O I/O

App.Server

DataServer

Maint.Server

Plant A Control ZoneFirewall

DataServer

File/PrintServer

App.Server

WorkstationLaptop computer

Router

Plant B Zone

DataServer

File/PrintServer

App.Server

WorkstationLaptop computer

Router

Plant C Zone

MainframeWorkstationLaptop computer Server Server

Enterprise Zone

Firewall

Enterprise Conduit

Plant Control Conduit

Controller Controller

I/O I/O

App.Server

DataServer

Maint.Server

Plant B Control ZoneFirewall

Firewall

Plant Control Conduit

Controller Controller

I/O I/O

App.Server

DataServer

Maint.Server

Plant C Control ZoneFirewall

Firewall

Plant Control Conduit

Page 19: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Antivirus/Malware ?

E le patch?

Page 20: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Manutenzione remota con VPN ?

Accesso Remoto, VPN, ecc.

Page 21: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Hardending: cosa serve davvero?

Rinforzare: Hardening

Applicazione

Infrastruttura

S.O. e sw di base

Page 22: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Verificare lo “stato di salute” Log &

Monitoring

Page 23: Scada Security Workshop Smau  2009 Pennasilico Tieghi

E se proprio ci capita qualcosa…

• Back-up & Recovery• SMS - Change Control &

Configuration Management

Page 24: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Reti Cablate e Reti Wireless

Page 25: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Il wireless arriva in fabbrica

Smart Control Systems

Smart Analytical

Smart FinalControl

Smart AssetOptimization

Smart Safety

Smart Measurement

Smart MachineryHealth

Smart Wireless

25

Page 26: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Esempio di rete “protetta”

Page 27: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Ergonomia / 1

• Donald A. Norman, La caffettiera del masochista• James Reason, L’errore umano

Page 28: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Ergonomia / 2

Evitare diConfondersi…

Page 29: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Ergonomia / 3

http://www.metroland.org.uk/signal/amer01.jpg

Eravamo abituati a…

Page 30: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Ergonomia / 4

Ora lavoriamo

In modo diverso.

http://www.ihcsystems.com/section_n/images/efficientdredgingnewsapril2005_Page_09_Image_0002.jpg

Page 31: Scada Security Workshop Smau  2009 Pennasilico Tieghi

Dove trovo qualche suggerimento?

Clusit: “Introduzione alla protezione di reti e sistemi di controllo e automazione (DCS, SCADA, PLC, ecc.)”

sul sito www.clusit.it