Tips for secure remote access

Remote access will become an even more vital element as the industry becomes more open and connected and secure communications can be a constant if the right steps are taken.

08/14/2016


As the industry continues its expansion into a more open and connected environment, remote access will become an even more vital element, but with the right strategies in place, secure communications should not be an issue.

"There is no doubt control systems have evolved," said Marco Ayala, senior industrial cybersecurity project manager at aeSolutions, during his presentation at the Siemens 2016 Automation Summit in Las Vegas. "We look at cyber as a huge piece of information. Workers need to ensure security is top of mind at all times. Are you monitoring? Are you logging? Are we saying information technology (IT) has it? Are we saying operational technology (OT) has it?"

Ayala pointed at the attack on the Ukrainian power grid this past December as a perfect case in point about remote security.

On December 23, 2015, power went out for a high number of customers (reports range from 80,000 customers to 700,000 homes) in the Western region of the Ukraine served by regional power distribution companies. These companies end up supplied by thermal power generation stations (the Ukraine also has a large amount of power generated from nuclear facilities, though not in this region).

Reports about the incident in local media quickly spread to the international community by the end of the year and analysis and discussion amongst Western industrial cybersecurity interest groups began. While that discussion is ongoing, a picture has become clear that a coordinated attack involving multiple components took place.

Attack details

Here are components of the Ukrainian power grid attack:

BlackEnergy (also known as DarkEnergy) is malware that has existed since 2008 and its modular components have morphed over time. In this incident, the third variant of BlackEnergy is a key vector that provided the attackers with access to the utilities' computer networks and the ability to remotely communicate with them. This compromise and the resulting remote communications were probably not within the industrial control system (ICS) networks.

One BlackEnergy component, known as KillDisk, has a wiping functionality that may have denied the use of the supervisory control and data acquisition (SCADA) system, delayed restoration and covered the perpetrators' tracks. The actual hosts affected by KillDisk have yet to be disclosed.

In addition, an attack on phone systems, possibly a denial of service (DoS) attack, prevented the utilities from receiving calls from customers reporting outages.

Also, the electricity went out and restored the same day by field staff manually reclosing breakers at affected substations.

"Attackers were on the system months before the attack," Ayala said. "They took advantage of the SCADA systems and social engineering. (The utility) also failed to put in two-factor authentication on virtual private networks.

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure such as the Internet to provide remote networks or computers with secure access to another network.

Information ends up encrypted and sent to the destination network where it is decrypted upon arrival.

The encryption protects the confidentiality and integrity of the data as it travels across the untrusted network.

VPNs by themselves do not limit the protocols or detect malicious code or behavior. If the remote computer or a machine on the remote network ends up infected or compromised, then an attack can occur to devices accessible across the VPN.

Remote best practices

To avoid a remote attack, consider these some best practices:

  • Require the use of corporate-owned laptops for remote access which are subject and maintained according to the organization's security policies
  • Provide remote access users with a secure bootable image
  • Require and enforce contractually that third parties with remote access accept and comply with the organizations security rules
  • Require two-factor authentication for any remote access session
  • Configure the VPN such that split tunneling is not allowable by technical policy
  • Monitor and log user ID, time, and duration of remote access across all remote access sessions
  • Provide mechanisms for on-demand and automatic session termination
  • Encrypt all communications and untrusted networks
  • Configure modems and remote access software for maximum security
  • Restrict remote connections to special machine in the IACS demilitarized zone (DMZ), which then has access to select resources in the control system.

When talking about remote access, the fracking industry can come to mind with their remote operations needing to send data and workers needing to pull information at any time.

On top of all the remote best practices, there are some other details user need to pay attention to in the fracking environment. For one, "control systems must be able to withstand harsh vibrations and extended temperature ranges and also withstand blowing rain," Ayala said. In addition, they also must have operator friendly diagnostics, must be able to log in to view the process, must be cybersecurity with remote access, and there also must be ingress/egress logging.

In addition, Ayala said, the system does not have the Internet running at all times, but the user must be able to get on and pull data when needed.

Safety and security is symbiotic

Securing the remote access connection not only protects the network, it can also allow for greater safety."Process safety and cybersecurity are number one," Ayala said. "They are symbiotic; they go hand in hand. We have policies and procedures in place, but the human factor drives all of this."

He stressed monitoring, logging and defense-in-depth is critical.

In short, Ayala said there should be:

  • Multiple layers of security are paramount
  • Security is baked in
  • Front-end engineering and design (FEED)
  • Security acceptance testing (SAT)
  • Factory acceptance testing (FAT)
  • Lifecycle; continuous testing and auditing.

"We have to be smart about how we configure our systems. A system under attack means at best there is a financial loss, in a worst case it could be a catastrophic event," Ayala said.

Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information Website covering safety and security issues in the manufacturing automation sector. This content originally appeared on ISSSource.com. Edited by Chris Vavra, production editor, CFE Media, Control Engineeringcvavra@cfemedia.com.

ONLINE extra

See additional stories from ISSSource about cybersecurity linked below.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me