Using Open Source Intelligence To Improve ICS & SCADA Security
Using Open Source Intelligence To Improve ICS & SCADA Security
Source
Intelligence to
Improve ICS &
SCADA Security
Richard Piggin
Agenda
1.
2.
3.
4.
5.
6.
7.
8.
Our expertise
Sources
Methodology
Physical Vulnerabilities
Social Media and Social Engineering
Control Systems Vulnerabilities
Threat Assessment
Key Points
Our
expertise
Atkins Capability
Sources
Mainstream
media
Academic
material
Methodology
Physical
Vulnerabilities
THREATS
MITIGATION
Requirement to establish
sources for accuracy and to
investigate the potential to
reduce footprint and request
removal of some sources
Security
Infrastructure
Commercial in Confidence
Security
Infrastructure
Commercial in Confidence
Job Title
Notes
LinkedIn, Facebook
EC&I Engineer
LinkedIn, Facebook
EC&I Engineer
EC&I Section Head
Electrical Engineer
Former EC&I Team Leader
LinkedIn
N/A
LinkedIn
LinkedIn
LinkedIn
LinkedIn
N/A
LinkedIn
LinkedIn
Facebook
LinkedIn
Mechanical Engineer
Fire Alarm Engineer
Head of Mechanical Engineering
LinkedIn
LinkedIn
LinkedIn
Link
Link
THREATS
MITIGATIONS
Control
Systems
Vulnerabilities
Consequences
Understand
targets
Identify components
SHODAN results
Interrogates connected devices and catalogues the response from
a device.
The response, known as a banner, provides information on the
particular service and details of the service.
Commercial in Confidence
Commercial in Confidence
OSINT
System
Identification
System
Context
Control
system A
Control
system B
Control
system C
Control
system D
Most significant
Moderate
Insignificant / None
Physical/Net
work Access
Engineering
Personnel
Identified
Third Party
Identified
SHODAN
Exploit
Vulnerability
/Exploit
MITIGATION
Threat
Assessment
Challenge
Application of patches
Host systems
Operating systems
Networks
Applications
...Continued
Security Theme
Challenge
Availability
Security goals
IT security awareness
Security testing
Forensics
Technology lifetime and Integration can be a technically demanding over such long time frames.
support
Delay in technology adoption into ICS (typically 10 years) exacerbates
risk
Source: Development of industrial cyber security standards: IEC 62443 for SCADA and Industrial control systems, Piggin, R.
Key points