+ All Categories
Home > Documents > Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the...

Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the...

Date post: 10-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
18
www.inl.gov Evolution of cyber threat to Nuclear Systems Robert Hoffman NHS Consultant, INL
Transcript
Page 1: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

ww

w.inl.gov

Evolution of cyber threat to Nuclear Systems

Robert Hoffman

NHS Consultant,

INL

Page 2: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Mission Support Center: Forward Looking Threat Analysis

2

Threat analysis for prevention, detection, resilience & proactive

response for “all-hazards” to cyber-physical control systems.

• Threat Analysis for Actionable Strategic Intelligence

– Not just the latest tactical incident

– Term, Trend, Threat Actor Analysis

– Characterize Risk for investment decisions & responses

– Identify future Gaps & solutions for defense of key assets

• Teams of Subject Matter Experts: Analyst, Cyber, Sector

– Technical Analysis of Intelligence

– Cyber on Control Systems

– Electric power, nuclear processes

– Wireless communication, network engineers

– Human factors, systems of systems approach

• Cooperative Government Program Relationships

– Multiple Vulnerability Assessment Programs

– DOE: Mitigation R&D, Industry threat outreach

– DHS: ICS-CERT ops center, incident response teams

– International partners & programs

• Extend INL’s Industry Experience & Infrastructure Leadership

– Asset Owners & Operators

– Equipment Vendors

– Integrators & Security Providers

Page 3: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

• The state of cyber in a nuclear security world

• Introduce key factors influencing that world and driving fundamental change.

• Friction being created as the nuclear security and cyber security worlds collide.

• FACTORS: Attack escalation with increased capability, Inter-connectedness/efficiency, Asymmetry (nature of war), rate of technology change/adoption, etc..

• Impact of cyber on risk models, PRA and Global DBT.

Cyber Threat Evolution

Page 4: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Unique Nuclear Considerations

• Materials Protection & Accountability

– theft

• Fuel Processing Facilities

– sabotage

• Nuclear Power Plants

– release

• Supporting Infrastructure

– loss of critical services

4

Physical Cyber Interdependency:

• Access Control Systems

• Non Safety Systems

• Physical Security

• Transportation

• Waste Processing

• HVAC

• Fire Protection

• Materials monitoring

• Emergency Response

• Power subsystems

• Safeguards

Page 5: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

• INL cyber / nuclear experts provide technical assistance focused on the development of implementation strategies for IAEA NSS 13, Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities, (INFCIRC/225/Revision 5)

– Japan, South Korea have been centered on test bed and training development and the incorporation of Industrial Control System (ICS) security considerations.

– IPPAS mission cyber module updates and performance in Finland, Romania and South Korea.

– Provided cyber nuclear component to US – Japan bi-lateral security assessment as part of Material Protection Control and Accounting (MPC&A)

“Computer based systems used for physical protection, nuclear safety, and nuclear accountancy and control should be protected against compromise (e.g. cyber attack,

manipulation or falsification) consistent with the threat assessment or design basis threat.”

INFCIRC rev.5 Cyber Integration

IAEA INFCIRC 225.rev 5 has global impacts on cyber nuclear

security - every country is striving to find a viable path forward.

Page 6: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Challenges: Myths in “Air Gapped” Systems

• Corporate Net connected to ICS (firewall)

• Remote access by engineering stations or support vendors

• Field devices comm ports with little or no authentication

• Required Calibration: laptops & handhelds

• Wireless communications instead of cable

• Removable media: upgrades & backups

– Flash drives

– CD’s

– External hard drives

– “a periodic net connection”

• Unified Buses: Common buses for Control & Safety Systems

6

Data Acquisition

ServerDatabase

Server

Configuration

Server

Engineering

Workstations

HMI

Primary

Historian

Remote Net Router

• Operations

• Engineering

• Business Partners

• Vendor Support

Control System

Modem Pool

Field Devices

Safety System

Field Controllers

Control System Network

HMI

Industrial

Wireless

Page 7: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Challenges: Information Technology vs.Industrial Control Systems (ICS)

Topic IT ICS

Design PhilosophyInformation Protection,

Rapid change in function

Functional Reliability,

Designed on

Electromech Fault Basis

Uptime Regular maintenance

down timesNearly 100%

Change & Patch

ManagementRegular and scheduled

Formal Testing and

Strategic scheduling

Incident Response &

Forensics

Well defined and

deployed

Uncommon, no forensics

beyond event re-creation

Technology Support

Lifetime2 to 3 years 10 to 20 years

7

Page 8: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Aggressor perspective

Topic ICS Opportunity

Design PhilosophyFunctional Reliability,

Electromech Fault BasisPreplanned manipulation

of 1 – n devices

UptimeNearly 100%

Supports interaction during

“off normal hours”

Change & Patch

Management

Testing and Strategic

schedulingMinimizes impact to

malware execution

Incident Response &

Forensics

Uncommon, no forensics

beyond event re-creation

Abnormal behavior creates

engineering investigation,

not cyber forensics

Technology Support

Lifetime10 to 20 years

High ROI and malware

sustainability for target

environment

8

Page 9: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

ICS centric Vulnerability

Discovery has become not

only mainstream but “coin

of the realm” for a subset

of the global security

community… The

response requires a

coordinated effort,

prioritization and

dedicated resources.

The industry of today is

operating upon the

battlefield of tomorrow…

Page 10: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Critical Infrastructure Cyber Threats

Smallest LargestCONSEQUENCES

Less

Very

LIK

ELIH

OO

D Directed

Corruption

Sophisticated

Injection

Poison Data

Compromise Process

Disruption

Concentrated

DDOS

Probe

DOS

Worm

System Compromise

System Control

General Cyber Attacks - Less Structured

• Notoriety and Fame

“Just to Do It”• Hacking Economy

Directed Cyber Attacks – Structured Hackers

• Direct & Targeted Monetary Gain

• Extreme Activist / Groups

• Disgruntled Employee

Strategic Information Warfare

• Major Economic Gain

• Cyber Terrorism

• Asymmetric Warfare

GRP III

• Nation States

• Terrorist

• Autonomous

Collectives

GRP II

• Organized Crime

• Competitors

• Hackers for HireGRP I

• Mainstream

• GRP II & III

Low & slow

Persistent Presence

Cyber Activists

10

Page 11: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Evolving Nature of Cyber Threat

• Lack of institutional constraints: “As with other Anonymous posts, it is hard to verify if the attackers are part of the hacking collective and whether they are responsible for the attack on the Vatican site. Anonymous is a decentralized, loosely organized collection of hactivists with no real leadership. In the past, hackers have claimed actions on behalf of Anonymous only to have others within the collective deny those actions.”

Page 12: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Is the

guard at

your gate

working

for you?

Security Solutions?

Page 13: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Security firm finds SCADA software flaws; won't report them to vendorsReVuln will sell vulnerability information to private buyers as part of a commercial service, the company says

IDG News service – November 2012

• Malta-based security start-up firm ReVulnclaims to be sitting on a stockpile of vulnerabilities in industrial control software, but prefers to sell the information to governments and other paying customers instead of disclosing it to the affected software vendors.

• In a video released Monday, ReVulnshowcased nine "zero-day" vulnerabilities which, according to the company, affect SCADA (supervisory control and data acquisition) software from General Electric, Schneider Electric, Kaskad, Rockwell Automation, Eaton and Siemens. ReVulndeclined to disclose the name of the affected software products.

The attackers "can take control of the machine with the maximum

privileges (SYSTEM on Windows) granted by the

affected service," ReVuln co-founder and security

researcher Luigi Auriemma said Monday via email. "They

can install rootkits and other types of malware or obtain

sensitive data (like passwords used on other computers of

the same network) and obviously they can control the

whole infrastructure."

Page 14: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Cyber-Physical Challenges in Nuclear Facilities

14

Page 15: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Framework for Consequence/ Threat-Driven Design

Blended Local Attack (digital &

material sabotage)

Directed remote attack with witting

insider & supply chain (Nations/groups)

Directed remote attack with unwitting insider (Nations/groups)

Remote directed attack (APT)

Cybersecurity defenses versus unstructured/non-directed cyber threats (crime, Botnets, etc.)

Type of ThreatConsequence Scale Protection Scale

Plant Process

Safety

Radiologic

Safety

Radiologic

Worst Case

Data Theft

Disrupt

Operations

Disrupt

Cyber

Commercial

Risk

People

Risk

Prevention

Signature

Security

Solutions

Detect

Manage

Recover

Redundant

Systems

Engineering

Two person

Rule

Engineering

Full

Spectrum

Defense

Applies to very small

group (.01%) of

assets

Applies to small

group of assets

(CDAs)

Page 16: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Current Process to Manage Safety Risk

Design Basis:

Perform specific

control functions to

failsafe or maintain

the safe operations

16

Problem: For an adversary specifically “targeting” your facility, with modern

digital I&C you will be operating in “contested waters” in all layers (you

are/will be “owned”)

Page 17: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Questions / Comments

Page 18: Evolution of cyber threat to Nuclear Systems...manipulation or falsification) consistent with the threat assessment or design basis threat.” INFCIRC rev.5 Cyber Integration IAEA

Recommended