protecting your dnp3 networks

24
Protecting Your DNP3 Networks Chris Sistrunk, PE Sr. Consultant Mandiant

Upload: chris-sistrunk

Post on 23-Aug-2014

476 views

Category:

Internet


5 download

DESCRIPTION

Your SCADA system has a DNP3 vulnerability, now what? I shortly summarize the DNP3 vulnerabilities (and other ICS protocols too). Then I focus on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or patches can't be installed.

TRANSCRIPT

Page 1: Protecting Your DNP3 Networks

Protecting Your DNP3 Networks

Chris Sistrunk, PESr. Consultant

Mandiant

Page 2: Protecting Your DNP3 Networks

Let’s assume that your SCADA device has a faulty DNP3

stack…

Page 3: Protecting Your DNP3 Networks

http://threatpost.com/copa-data-patches-dnp3-scada-vulnerability“Crain and Sistrunk have discovered a boatload of ICS vulnerabilities over the years”

…because of these guys(well bad vendor coding really)

DNPtha-reeeeeee

Page 4: Protecting Your DNP3 Networks

Let’s take a step back and ask some questions: What’s the risk if this device is

compromised?◦ Probability * Impact = Risk◦ Check out my RTU risk score pres from S4x13

What is the device talking to? Is it DNP3 serial or IP…or both? Is the physical security sufficient? Will you be called at 2AM?

Now What?

Page 5: Protecting Your DNP3 Networks

How I Audit SCADA systems

Page 6: Protecting Your DNP3 Networks

The answers to the questions tell you that you have to do something to protect the device(s) What types of mitigations exist? Which ones will you use?

◦ Defense in depth – more than one!◦ Belt and suspenders!

When will they be deployed?◦ The sooner the better!

Anticipate…Mitigate!

Page 7: Protecting Your DNP3 Networks

Software/firmware patches/device upgrades Robust device and master configurations Robust IP network configurations DNP3-aware network tools Proper physical security Employee awareness

Secure coding and SDL for Vendors

DNP3 Vulnerability Mitigation

Page 8: Protecting Your DNP3 Networks

NERC/CIP?DNP3 Vulnerability Mitigation

Page 9: Protecting Your DNP3 Networks

If there is a software or firmware patch or hardware upgrade that’s out there that fixes a known DNP3 vulnerability…GO GET IT

Properly test it before you roll it out If you’re not used to patching your SCADA

system, please work with your vendors to do this to minimize downtime

Get The Bug Fix!

Page 10: Protecting Your DNP3 Networks

USE DNP3-SA! (application layer security)◦ Correct master only talks to the correct RTU◦ But it won’t protect against all “bugs”

Disable unused serial and network ports Use a possible workaround (ex: auto restart) Check the default settings

◦ DNP3 or other protocols may be factory configured◦ If not used, disable them!◦ DNP3 devices are on SHODAN

Many appear to have the same congfigurations

Robust Device/Master Configuration

Page 11: Protecting Your DNP3 Networks

When possible, DISABLE functions that aren’t required in your production systems◦ Cold and/or Warm Restarts (FC 13 & 14)◦ Start/Stop Application (FC 17 & 18)◦ Save Configuration (FC 19) old

Activate Configuration (FC 31) new◦ Open, Close, Delete, Abort File (FC 25, 26, 27, 30)

If you can’t disable these, use IDS/IPS or DPI Firewalls to prevent unwanted DNP3 traffic

Robust Device/Master Configuration

Page 12: Protecting Your DNP3 Networks

Segment your SCADA WAN◦ Routers, Firewalls, DMZs, & VLANs◦ This can help isolate the network when needed

Understand your network!◦ The bad guys sure will

Use encryption and authentication◦ Use DNP3-SA and TLS◦ Remote access VPNs, radios, etc◦ Look at IEC 62351 standard (dovetails with SA)

No SCADA protocols on Corporate WAN

Robust IP Networks

Page 13: Protecting Your DNP3 Networks

Examples of tools used in SCADA and Enterprise networks understand DNP3 Protocol analyzers such as Wireshark, ASE &

TMW RTU Test Sets IDS/IPS such as SNORT, Bro, McAfee ADM,

and Checkpoint Routers such as the Cisco CGR 2010 Field firewall w/ DNP3 Deep Packet

Inspection◦ Secure Crossing & Tofino (in the works)

DNP3-Aware Network Tools

Page 14: Protecting Your DNP3 Networks

Newer enterprise security technologies can be used to help detect, respond, and contain threats on your SCADA network

Security Operations Center◦ Security Analyst(s) using a SIEM◦ Log aggregation◦ Anomaly and intrusion detection◦ Indicators of Compromise (IOCs)◦ Full packet capture

Security Onion (Linux distro) www.securityonion.net

Network Security Monitoring

Page 15: Protecting Your DNP3 Networks

What is the proper amount of physical security? It depends…

If your Critical SCADA master has top physical security, but the serially-connected tiny distribution RTU does not, is that okay?

Use a lock that meets or exceeds: UL 437, ANSI 156.30 Grade A, or ASTM F883 Grade 6

Harden your external barriers The better the defenses, the more time it

buys you to respond

Proper Physical Security

Page 16: Protecting Your DNP3 Networks
Page 17: Protecting Your DNP3 Networks

Physical Security

3/8” Mesh

ASTM Grade 6

These may buy youextra time to respond

Page 18: Protecting Your DNP3 Networks

“Thieves hit our store last night. This is how they circumvented the

door alarm…”

via http://redd.it/1pn1xi

Page 19: Protecting Your DNP3 Networks

Because people follow directions…you know what happens next

Page 20: Protecting Your DNP3 Networks

Train your folks on ICS/SCADA security◦ Security Conferences, several training classes available◦ http://

ics-cert.us-cert.gov/Training-Available-Through-ICS-CERT◦ GICSP Certification

Security awareness is important Have a questioning attitude Report suspicious computer or personal

activity/incidents◦ Who do you call?◦ Internal hotline, supervisor, SOC, etc◦ ICS-CERT (877-776-7585)

Employee Awareness

Page 21: Protecting Your DNP3 Networks

Ask your vendors for DNP3-SA if they don’t have it or are already working on it

Require in the bids for new SCADA systems or upgrades to be tested by a 3rd party, including the DNP3 protocol stack◦ Positive Tests: FAT/SAT◦ Negative Tests: Fuzzing (it’s not new folks!)

DNP3 Will Be Here A While

Page 22: Protecting Your DNP3 Networks

DNP3 isn’t a special case. Other ICS protocols will see the same fate

Modbus, IEC 60870, IEC 61850, ICCP, EtherNet/IP… You can defend your SCADA Early testing both slave/server AND

master/client sides of the protocol are important!

Compliance != Security, but the culture is important

Don’t count on the government to protect your critical systems…it’s your job

Conclusions

Page 23: Protecting Your DNP3 Networks
Page 24: Protecting Your DNP3 Networks

Ideas? Questions?