SlideShare a Scribd company logo
1 of 5
Download to read offline
White Paper
Hardening Critical Systems at Electrical Utilities
Meeting Regulatory Requirements Through Endpoint Controls


Ryan Wakeham
Senior Security Consultant, NetSPI

The electrical industry addresses cyber security

Securing our nation’s critical power infrastructure has never been more
important. Electrical power utilities generate and distribute the energy that
is needed to drive the economy, as well as daily life, in modern America.
However, these utilities depend on networks of aging systems and devices and
are therefore vulnerable to cyber threats, which can be malicious attacks from           Utilities depend on networks
hackers or terrorists, as well as unintentional damage done by employees.                of aging systems and

In response to the risks posed by insufficient cyber security controls, industry         devices and are therefore
regulators and organizations such as the Federal Energy Regulatory
Commission (FERC), the North American Electric Reliability Corporation                   vulnerable to cyber threats,
(NERC), the Nuclear Regulatory Commission (NRC), and the Nuclear Energy                  which can be malicious
Institute (NEI) have implemented a number of regulations and standards to
address these weakness and ensure the continued safe and reliable generation             attacks from hackers
of electricity. In particular, the NERC Critical Infrastructure Protection standards
CIP-002 through CIP-009 provide a cyber security framework for non-nuclear               or terrorists, as well as
facilities. These standards require critical cyber asset identification, in additional   unintentional damage done
to certain physical, logical, and administrative controls.
                                                                                         by employees.
Regulatory requirements

The key systems that utilities typically identify as critical cyber assets
include servers and workstations in process or SCADA environments. These
environments are central to the efficient generation and distribution of power;
therefore, the servers and workstations that operate in concert with digital
devices throughout power plants and the electrical grid must be available and
functioning properly around the clock. The need for high availability in these
systems, combined with the fact that they run proprietary software applications,
means that they are rarely protected by controls such as security patches and
anti-malware programs that are often taken for granted in other environments.

                                                              continued on next page




  www.netspi.com
  612-465-8880
White Paper
Hardening Critical Systems at Electrical Utilities


The NERC CIPs apply a number of requirements to these sorts of systems.
For example, the CIPs require configuration hardening (CIP-007 R2), patch
management or compensating controls (CIP-007 R3), anti-malware controls
(CIP-007 R4), and security monitoring and logging (CIP-007 R6). Because
process and SCADA servers and workstations are often not suited to more
conventional controls, electrical utilities may find it difficult to fulfill these
requirements in an appropriate way. However, a relatively new set of solutions,
dubbed “endpoint security” or “endpoint control,” shows great promise in
helping utilities to meet these requirements laid out in the NERC CIPs.
                                                                                     The whitelist approach
What is endpoint control?
                                                                                     adheres to the fundamental
While the term “endpoint control” may mean different things to different people,     security tenet of denying by
endpoint control products generally provide administrators with more granular
control over the systems for which they are responsible. The first generation of     default all applications and
these products includes anti-malware scanners, host-based firewalls, and other
                                                                                     processes except those
host-based software that can be configured to control access to removable
media and the network. The second generation increases the abilities of              that have been granted
administrators to control the activities occurring on endpoint systems through
the use of technologies such as application and process whitelisting.                explicit permission to run.

A first-generation control product such as an anti-malware scanner relies on
signature matching with a blacklist or else uses heuristic-based guessing to
determine if an application or process should be allowed to run. By contrast,
the whitelist approach adheres to the fundamental security tenet of denying
by default all applications and processes except those that have been granted
explicit permission to run. This approach both eliminates the chance that an
unknown or unidentified process will be run and also gives administrators
the capability to control processes at a much more granular level than was
previously possible.

                                                            continued on next page




 www.netspi.com
 612-465-8880
White Paper
Hardening Critical Systems at Electrical Utilities


Endpoint control in process environments

Endpoint control products can provide significant benefits when implemented
in process systems. For one thing, process environments are fairly static,
with servers and workstations running only a limited number of pre-defined
applications and services. In such an environment, endpoint control solutions
that use application whitelisting can prevent unauthorized applications from
ever executing.

If properly implemented, this level of control can protect these critical systems     Application whitelisting
from threats that originate at the network, that may be introduced by removable
media, or that are already resident on the system. Additionally, application          can eliminate the need for
whitelisting can eliminate the need for security patching because potential           security patching because
malware or exploits are prevented from ever running. This reduces the
administrative burden of applying security patches and also minimizes the             potential malware or
downtime of these critical systems. Finally, because no full-system malware
scans ever need to be performed, a properly designed whitelisting solution has        exploits are prevented from
the potential to minimize the negative impact on system performance.                  ever running.

Of course, endpoint control solutions are just one piece in a multi-layer
defensive strategy. An endpoint control solution will be unable to directly provide
additional security to digital devices such as programmable logic controllers
(PLCs) and remote terminal units (RTUs). These PLCs and RTUs, which rarely
have security controls more sophisticated than a password, are abundant in
process networks, including within power plants and across the bulk power grid.
In light of this reality, other logical controls, such as network segmentation and
firewalls, should be deployed in addition to endpoint control solutions.

                                                            continued on next page




 www.netspi.com
 612-465-8880
White Paper
Hardening Critical Systems at Electrical Utilities


What to look for in an application whitelisting solution

As with any security product, the effectiveness with which the solution performs
its task is the critical deciding factor. The most effective whitelisting solutions
need to operate at the kernel level of the operating system in order to ensure
that they cannot be undermined. This should give the additional advantage of
allowing the solution to monitor and manage network-level activity.

Finally, no matter how well a security solution may enforce controls, it will
not be completely effective if it is difficult to manage over a potentially large     The most effective
environment; for administrators, the management features of the solution
are just as important as the security controls that it provides. These features       whitelisting solutions need
should include the ability to configure multiple hosts as a group and apply           to operate at the kernel
policies remotely, as well as provide monitoring, logging, alerting, and reporting
features.                                                                             level of the operating

The whitelisting software that meets both the security and the management             system in order to ensure
requirements fills an important need for endpoint control that supports               that they cannot be
regulatory requirements in electric utilities.
                                                                                      undermined.
The table on the following page maps several NERC CIP requirements to
important features of an application whitelisting solution.

                                                            continued on next page




 www.netspi.com
 612-465-8880
White Paper
Hardening Critical Systems at Electrical Utilities


Requirement    Applicable Excerpt                  Whitelisting Solution Feature
CIP-007-R2     The Responsible Entity shall        Network-level controls,
               establish and document a            based on integration with
               process to ensure that only those   the operating system kernel,
               ports and services required         can act as a firewall and
               for normal and emergency            prevent communication over
               operations are enabled.             unauthorized ports or protocols.
CIP-007-R3.2   The Responsible Entity shall        Application whitelisting solutions
               document the implementation         can act as a compensating
               of security patches. In any         control on unpatched systems         No matter how well a
               case where the patch is not         because they prevent illicit
               installed, the Responsible Entity   activities such as the execution     security solution may
               shall document compensating         of unauthorized code and the
                                                                                        enforce controls, it will not
               measure(s) applied to mitigate      exploitation of network services.
               risk exposure or an acceptance                                           be completely effective
               of risk.
CIP-007-R4     The Responsible Entity shall        Application whitelisting can         if it is difficult to manage
               use anti-virus software and other   prevent any malware, known
               malicious software (“malware”)      or unknown, from running on          over a potentially large
               prevention tools, where             protected systems. Additionally,
                                                                                        environment.
               technically feasible, to detect,    this solution provides superior
               prevent, deter, and mitigate        performance compared to
               the introduction, exposure,         blacklisting solutions.
               and propagation of malware
               on all Cyber Assets within the
               Electronic Security Perimeter(s).
CIP-007-R6     The Responsible Entity shall        Solutions should support
               ensure that all Cyber Assets        management requirements,
               within the Electronic Security      which include the ability to
               Perimeter, as technically           monitor, log, alert, and report on
               feasible, implement automated       status and events.
               tools or organizational process
               controls to monitor system
               events that are related to cyber
               security.




 www.netspi.com
 612-465-8880

More Related Content

What's hot

Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
RoutecoMarketing
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
majolic
 
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
James W. De Rienzo
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
FitCEO, Inc. (FCI)
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
Rishu Mehra
 

What's hot (20)

Nist.sp.800 82r2
Nist.sp.800 82r2Nist.sp.800 82r2
Nist.sp.800 82r2
 
ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
ICSA 2019 Architectural Security Weaknesses in Industrial Control SystemsICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 

Similar to NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities

Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 

Similar to NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities (20)

White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Asset Utilization Metrics Propel a Revival in Safety Solutions
Asset Utilization Metrics Propel a Revival in Safety SolutionsAsset Utilization Metrics Propel a Revival in Safety Solutions
Asset Utilization Metrics Propel a Revival in Safety Solutions
 

More from CoreTrace Corporation

More from CoreTrace Corporation (8)

Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And Beyond
 
CoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And DataCoreTrace Whitepaper: Protecting PCI Systems And Data
CoreTrace Whitepaper: Protecting PCI Systems And Data
 
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI AnalysisCoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
 
CoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
CoreTrace Whitepaper: Combating Buffer Overflows And RootkitsCoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
CoreTrace Whitepaper: Combating Buffer Overflows And Rootkits
 
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security ParadigmCoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
 
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceFeldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities

  • 1. White Paper Hardening Critical Systems at Electrical Utilities Meeting Regulatory Requirements Through Endpoint Controls Ryan Wakeham Senior Security Consultant, NetSPI The electrical industry addresses cyber security Securing our nation’s critical power infrastructure has never been more important. Electrical power utilities generate and distribute the energy that is needed to drive the economy, as well as daily life, in modern America. However, these utilities depend on networks of aging systems and devices and are therefore vulnerable to cyber threats, which can be malicious attacks from Utilities depend on networks hackers or terrorists, as well as unintentional damage done by employees. of aging systems and In response to the risks posed by insufficient cyber security controls, industry devices and are therefore regulators and organizations such as the Federal Energy Regulatory Commission (FERC), the North American Electric Reliability Corporation vulnerable to cyber threats, (NERC), the Nuclear Regulatory Commission (NRC), and the Nuclear Energy which can be malicious Institute (NEI) have implemented a number of regulations and standards to address these weakness and ensure the continued safe and reliable generation attacks from hackers of electricity. In particular, the NERC Critical Infrastructure Protection standards CIP-002 through CIP-009 provide a cyber security framework for non-nuclear or terrorists, as well as facilities. These standards require critical cyber asset identification, in additional unintentional damage done to certain physical, logical, and administrative controls. by employees. Regulatory requirements The key systems that utilities typically identify as critical cyber assets include servers and workstations in process or SCADA environments. These environments are central to the efficient generation and distribution of power; therefore, the servers and workstations that operate in concert with digital devices throughout power plants and the electrical grid must be available and functioning properly around the clock. The need for high availability in these systems, combined with the fact that they run proprietary software applications, means that they are rarely protected by controls such as security patches and anti-malware programs that are often taken for granted in other environments. continued on next page www.netspi.com 612-465-8880
  • 2. White Paper Hardening Critical Systems at Electrical Utilities The NERC CIPs apply a number of requirements to these sorts of systems. For example, the CIPs require configuration hardening (CIP-007 R2), patch management or compensating controls (CIP-007 R3), anti-malware controls (CIP-007 R4), and security monitoring and logging (CIP-007 R6). Because process and SCADA servers and workstations are often not suited to more conventional controls, electrical utilities may find it difficult to fulfill these requirements in an appropriate way. However, a relatively new set of solutions, dubbed “endpoint security” or “endpoint control,” shows great promise in helping utilities to meet these requirements laid out in the NERC CIPs. The whitelist approach What is endpoint control? adheres to the fundamental While the term “endpoint control” may mean different things to different people, security tenet of denying by endpoint control products generally provide administrators with more granular control over the systems for which they are responsible. The first generation of default all applications and these products includes anti-malware scanners, host-based firewalls, and other processes except those host-based software that can be configured to control access to removable media and the network. The second generation increases the abilities of that have been granted administrators to control the activities occurring on endpoint systems through the use of technologies such as application and process whitelisting. explicit permission to run. A first-generation control product such as an anti-malware scanner relies on signature matching with a blacklist or else uses heuristic-based guessing to determine if an application or process should be allowed to run. By contrast, the whitelist approach adheres to the fundamental security tenet of denying by default all applications and processes except those that have been granted explicit permission to run. This approach both eliminates the chance that an unknown or unidentified process will be run and also gives administrators the capability to control processes at a much more granular level than was previously possible. continued on next page www.netspi.com 612-465-8880
  • 3. White Paper Hardening Critical Systems at Electrical Utilities Endpoint control in process environments Endpoint control products can provide significant benefits when implemented in process systems. For one thing, process environments are fairly static, with servers and workstations running only a limited number of pre-defined applications and services. In such an environment, endpoint control solutions that use application whitelisting can prevent unauthorized applications from ever executing. If properly implemented, this level of control can protect these critical systems Application whitelisting from threats that originate at the network, that may be introduced by removable media, or that are already resident on the system. Additionally, application can eliminate the need for whitelisting can eliminate the need for security patching because potential security patching because malware or exploits are prevented from ever running. This reduces the administrative burden of applying security patches and also minimizes the potential malware or downtime of these critical systems. Finally, because no full-system malware scans ever need to be performed, a properly designed whitelisting solution has exploits are prevented from the potential to minimize the negative impact on system performance. ever running. Of course, endpoint control solutions are just one piece in a multi-layer defensive strategy. An endpoint control solution will be unable to directly provide additional security to digital devices such as programmable logic controllers (PLCs) and remote terminal units (RTUs). These PLCs and RTUs, which rarely have security controls more sophisticated than a password, are abundant in process networks, including within power plants and across the bulk power grid. In light of this reality, other logical controls, such as network segmentation and firewalls, should be deployed in addition to endpoint control solutions. continued on next page www.netspi.com 612-465-8880
  • 4. White Paper Hardening Critical Systems at Electrical Utilities What to look for in an application whitelisting solution As with any security product, the effectiveness with which the solution performs its task is the critical deciding factor. The most effective whitelisting solutions need to operate at the kernel level of the operating system in order to ensure that they cannot be undermined. This should give the additional advantage of allowing the solution to monitor and manage network-level activity. Finally, no matter how well a security solution may enforce controls, it will not be completely effective if it is difficult to manage over a potentially large The most effective environment; for administrators, the management features of the solution are just as important as the security controls that it provides. These features whitelisting solutions need should include the ability to configure multiple hosts as a group and apply to operate at the kernel policies remotely, as well as provide monitoring, logging, alerting, and reporting features. level of the operating The whitelisting software that meets both the security and the management system in order to ensure requirements fills an important need for endpoint control that supports that they cannot be regulatory requirements in electric utilities. undermined. The table on the following page maps several NERC CIP requirements to important features of an application whitelisting solution. continued on next page www.netspi.com 612-465-8880
  • 5. White Paper Hardening Critical Systems at Electrical Utilities Requirement Applicable Excerpt Whitelisting Solution Feature CIP-007-R2 The Responsible Entity shall Network-level controls, establish and document a based on integration with process to ensure that only those the operating system kernel, ports and services required can act as a firewall and for normal and emergency prevent communication over operations are enabled. unauthorized ports or protocols. CIP-007-R3.2 The Responsible Entity shall Application whitelisting solutions document the implementation can act as a compensating of security patches. In any control on unpatched systems No matter how well a case where the patch is not because they prevent illicit installed, the Responsible Entity activities such as the execution security solution may shall document compensating of unauthorized code and the enforce controls, it will not measure(s) applied to mitigate exploitation of network services. risk exposure or an acceptance be completely effective of risk. CIP-007-R4 The Responsible Entity shall Application whitelisting can if it is difficult to manage use anti-virus software and other prevent any malware, known malicious software (“malware”) or unknown, from running on over a potentially large prevention tools, where protected systems. Additionally, environment. technically feasible, to detect, this solution provides superior prevent, deter, and mitigate performance compared to the introduction, exposure, blacklisting solutions. and propagation of malware on all Cyber Assets within the Electronic Security Perimeter(s). CIP-007-R6 The Responsible Entity shall Solutions should support ensure that all Cyber Assets management requirements, within the Electronic Security which include the ability to Perimeter, as technically monitor, log, alert, and report on feasible, implement automated status and events. tools or organizational process controls to monitor system events that are related to cyber security. www.netspi.com 612-465-8880