Cybersecurity For Industrial Control Systems - Use Case
Cybersecurity For Industrial Control Systems - Use Case
1
http://www.ssi.gouv.fr/systemesindustriels
2
Management Information Systems (MIS): information systems for office applications and services, human resources
management, customer relationship management and integrated management.
Walking past the network wiring closets in the control room, he noted that the SCADA bays were
properly identified and separated from the adjacent ones for the Intranet system.
However, he noticed a network cable from the SCADA racks going towards the intranet racks.
He asked the control room manager for an explanation. Seeming uncomfortable, the manager
explained that for certain operations, it was useful to access SCADA from an office PC located in
another room.
The coordinator pointed out that there had already been an incident caused by network
interconnections. The manager explained that it was just a SCADA machine with two network
cards, one connected to the office network and the other connected to the SCADA network;
therefore, the networks were not interconnected. The coordinator explained that an individual or a
rootkit that compromised this machine would have control of the entire SCADA network. This
was a major risk, with the same consequences as the spread of a malware.
The Intranet components have measures to address external threats (e.g. antivirus
software, regular updates, strong authentication, etc.), while that is surely not the case
for all SCADA devices. One non secure machine with two network interfaces provides
an attack path and facilitates the spread of viruses.
Solutions (e.g. based on Web technologies or RDP), together with network segregation
mechanisms, provide better security for SCADA access from office work stations (see
Appendix B).
This connection, which allows industrial systems to be compromised from the Internet
by way of the office network, should therefore be removed.
The coordinator also noted a USB drive plugged into a work station. Someone had clearly
forgotten it. He asked why USB drives were used in the control room. He was told that the team
needed to retrieve data from SCADA for reporting purposes. Examination of the key revealed
that it contained personal data, as well as a virus! Fortunately, it was not a particularly
dangerous one, but all machines needed to be checked, and disinfected as necessary. The head of
the control room said that USB drives were the only way to retrieve data from SCADA or to
The coordinator explained that, short of banning USB drives, it is possible to disable
Autorun for removable media, a function is exploited by many viruses (see Appendix B).
Software restriction policies could be configured to whitelist specific programmes (e.g.
SCADA functions and certain utilities).
It is also possible to implement a secure data exchange station and disable the USB
ports on all critical SCADA machines. Solutions can be found!
USB drives are a primary vector for the spread of viruses. Numerous incidents bear this
out!
The coordinator asked how internal personnel and subcontractors were made aware of
cybersecurity issues. The manager responded that, theoretically, they undergo limited training, but
it is mainly oriented around the IT side and that training should take place on a regular basis in
order to be effective. The coordinator said that the same hygiene rules used for IT systems are
applicable to industrial systems.
The "IT hygiene rules" for ICSs (see Appendix D) could be posted in the control room and
in the production units. Pictograms, like those regarding dependability, could also be
used to remind personnel that USB keys are prohibited on critical plants, that laptop
computers cannot be connected without authorisation, that all anomalies must be
reported, etc.
From the control room, numerous actions and configurations could be performed on the plant.
The SCADA applications were numerous and inconsistent. The coordinator asked what would
happen if an operator executed an erroneous command or incorrectly entered a setting (e.g.
10,000 RPM for an engine speed instead of 1,000).
The manager replied that checks are built into the system to limit the risk of operator error.
The coordinator commented that this could also be valuable against attackers.
The SCADA system's input fields incorporate bounds checking: a user cannot enter a value
outside the device operating limits. These limits are also integrated in the PLCs and are
unchangeable. They cannot be modified without changing the PLC source code.
Moreover, to avoid certain erroneous operations, the SCADA application asks for confirmation
before sending the command. Although this reduces the risk of errors, they can still occur. The
command request must be sent (bit = 0), and then when the PLC has accepted it, the command is
Cybersecurity for Industrial Control Systems – Use case 9
sent (bit = 1). The manager explained that this mechanism allowed the shutdown of an plant to be
avoided during a recent intervention. An automation specialist reloaded the PLC data from a
backup. In the backup, the stop bits were set for several plant, but the command request bit was
not. The production shop did not stop and an alarm concerning this discrepancy was sent to the
SCADA system, which allowed detection of the problem. The coordinator said that this is an
example of how simple mechanisms can sometimes prevent problems. This measure would be
ineffective against an attacker with in depth knowledge of the system, but could allow detection
of many other less sophisticated attacks.
During his visit, the coordinator noticed a work station located in a corner of the production shop.
Next to it, an interim employee of the cleaning service was dusting. The coordinator asked the
shop foreman what the work station was used for. The latter replied that it was a "remote"
SCADA work station used by team leaders and maintenance technicians.
Taking a closer look, he found that the SCADA application was running under a "Maintenance"
login. The shop manager explained that maintenance had been carried out on a production line the
previous day. It ended late and the technician had probably forgotten to log out.
The coordinator pointed out that, as a result, anyone could use the application even the interim
custodian who was working nearby. Wouldn't it make sense to include an automatic timeout in the
application that locked the screen after a period of inactivity?
The manager replied that it would have little effect because the logins are generic, assigned to a
team and thus known by numerous people.
The shop manager said that these suggestions were interesting and that he would like to pursue
them.
This touch screen (Operator Panel OP) is very similar to a PC and has a standard
operating system, but is physically more robust. It surely has easily exploitable
vulnerabilities that need to be considered in access policies and when installing
updates. It could be useful to perform penetration tests from this type of device. The OP
has USB ports; what would happen if a keyboard were plugged in? Does it provide
access to system functions or to the list of programmes installed on the OP, for
example?
The coordinator asked how the control room was informed when particular modes of operation
are used. The technician replied that, in general, he calls the operators to inform them, because the
system does not send this information to the control room.
The shop manager explained that this new assembly line is much faster than the old ones, but it
stops more often and requires more precise and more frequent configuration. Therefore, in order
to avoid swamping the control room, not all information is sent to the SCADA system.
The coordinator explained that, on the contrary, more traceability and more data sent to
the SCADA system could help identify malfunctions and detect abnormal operation.
Today's systems and software are capable of handling large volumes of data. Data
storage is no longer a major constraint.
The coordinator said he was surprised to see one SCADA application in the control room for
shops A and B, and a different application for shop C. The manager said he would like to have a
single application and especially the same level of functionality for all three. That would make it
Cybersecurity for Industrial Control Systems – Use case 11
easier to correlate production data. However, the PLCs in shop A and B interact with the SCADA
system via specific protocols not supported by other manufacturers or by the new SCADA
equipment.
The shop manager said that, from his point of view, SCADA systems using specific
protocols are not vulnerable. The coordinator explained that, in reality, proprietary
systems are not immune from attacks. They are often developed using standard
components and run on standard operating systems that are not specific to ICSs. Their
security mechanisms are often weak. An analysis of this system is needed. An upgrade
study is also needed, conducted together with the manufacturer.
Next, the coordinator visited the hazardous material storage unit, located a few hundred metres
from the production building, outside the site's main perimeter.
He noted that the devices (radar) for measuring the levels of hazardous materials in the tanks were
situated "out in the open," easily accessible to individuals outside the company. He pointed out to
the unit manager that these levels could be modified by malicious individuals and asked what the
impact would be.
The manager replied that invalid level readings could disrupt the operation of the system. For
example, the PLC could close the distribution valves if it detects a low level in a tank. In the past,
a sensor malfunction gave rise to erratic system behaviour without the cause being apparent.
Diagnosis was difficult because this unit does not send any data to the control room. In the wake
of that incident, a second set of sensors was installed to increase reliability.
The coordinator said that physical protection of remote or exterior devices seemed
necessary, as well as a minimum report of data to the control room.
The unit manager observed that a planned expansion project would provide an opportunity to
improve the monitoring of the system. This would also free operations teams from having to
frequently visit the plant to check for anomalies.
Meanwhile, the coordinator noticed a modem connected to the PLC. The integrator had installed
it to allow remote intervention and thereby reduce maintenance costs and response times.
An attacker scanning the range of telephone numbers used by the company could identify the
modem, take control of the PLC, modify the programme and provoke malfunctions in the system.
Fortunately, the PLC modem has a callback function3. Thus, an attacker cannot take control of
the PLC, even if he knows the password.
The manager explained that the integrator would like to connect the PLC Web management
interface to the Internet (e.g. via a VPN), which would give them access to more advanced
diagnostic functions.
The coordinator understood the need and the request. Nevertheless, it is paramount to assess the
associated risks.
In the hazardous material distribution unit, the coordinator noticed several SCADA work stations
unlike those he had seen so far. The unit manager explained that in this unit, the SCADA system
is maintained by the company that integrated it. The integrator intervenes at their request if a
work station does not function properly. Sometimes the integrator replaces the work stations. The
coordinator was surprised and asked why this service was not provided by the IT department.
Since they are on site, they could act more quickly; moreover, they could provide standard
equipment that would certainly be less expensive.
3
Callback: A maintenance telephone number is configured; when the modem receives a call, it hangs up and dials the
configured number.
The coordinator asked how hazardous materials are distributed and how the entire system is
operated.
Distribution is fully automatic, in response to the needs of the production lines. The plant, which
requires high availability, is operated by three high availability PLCs.
The coordinator asked whether there was a link with the storage unit. The manager replied that
the majority of servos are independent. However, there is still a link, since, in case of leakage, the
distribution unit shuts down and sends a stop command to the storage unit, closing the safety
valves. Leak detection signals (on off logic) are wired directly to the valves. A bus or Wi Fi
connection is in the plans for expansion of the storage unit. This would provide more flexibility
for operating the system.
The PLCs communicate with the SCADA system via an Ethernet network that appears to be the
same one used by the other PLCs on the site.
The coordinator asked how maintenance of this unit was managed. The unit manager replied that
maintenance is provided by the company that placed the systems in service, the same as for the
SCADA systems. Because the system is robust, maintenance interventions are relatively rare and
are limited to equipment failures. Sometimes the Ethernet cards are at fault. If they become
unavailable (e.g. due to frame overflow), the PLC must be restarted to reinitialise them. The
coordinator asked whether these overflows were identified. The manager replied no, because
users do not necessarily have sufficient network skills to diagnose the problem.
The coordinator asked how interventions are carried out. The manager replied that in general, a
technician from the company goes to the location in question, connects his console to the PLC or
network, makes a diagnosis and corrects the problem. The coordinator was concerned whether
this connection also provides access to the site's other PLCs and if access to PLCs is protected
(e.g. by passwords). The manager did not know; he said he would ask the integrator.
The integrator indicated that no password was configured for the PLCs. This simplifies
interventions. In addition, these PLCs, like the SCADA system, are connected to the same
Ethernet network as the other PLCs on the site.
The coordinator concluded that, during very specific and infrequent interventions,
external users connect to the SCADA network with their own tools and have access to
every PLC on the site, since no password is configured. This constitutes a major
vulnerability. These interventions must be governed by procedures, access to the PLCs
must be limited and protected by passwords, and most importantly, the maintenance
consoles must be controlled and made available to users when necessary.
Physical access to PLCs, fieldbuses, SCADA and other devices must be limited to the
full extent possible.
After his visit to the plants, the coordinator made a rough and rapid assessment:
both users and management had fully cooperated with him. However, the coordinator felt
that his presence may have sometimes been stressful as he pointed out vulnerabilities;
systems are heterogeneous and not managed in the same way;
control over systems is relatively weak. Many issues solely concerned the integrators, or
even those who initially placed the plant in service, several decades ago;
to address their needs which seem legitimate users are using insecure approaches that create
vulnerabilities;
the various personnel he interviewed were motivated, but there is high staff turnover and
numerous interim employees;
it is fairly easy for anyone to connect to the SCADA system (open sessions on work stations
with high access levels);
physical protection is incomplete;
there is no notion of segregation. All components seem to be on the same network, regardless
of their level of criticality and their functionality. The PLC halt during penetration testing
confirms the need to implement a solution as quickly as possible to filter between the
networks and limit access;
it is indispensable to create a process to monitor vulnerabilities (e.g. monitoring information
from CERTs and from the manufacturer's site, bringing in subcontractors specialised in this
domain);
there is a need for a procedure (e.g. to be posted in the control room) to handle incidents and
an alert hierarchy to be followed;
it also appears useful to prominently display the 10 "healthy network" rules for ICSs (see
Appendix D);
awareness training tailored to ICSs is needed.
Overall, the coordinator tried to understand the issues faced by users and demonstrate a pedagogic
approach. However, this is not enough. There are significant business constraints. He must show
users how cybersecurity provides solutions and reassure them again: the measures will be
undertaken as a joint project and will not impair business objectives.
Although certain actions immediately spring to mind and seem simple to implement, such as the
networks segregation or defining a policy for managing removable media, the constraints of
certain shops and the obsolescence of certain equipment mean that a more comprehensive
analysis is required. That will involve several areas of expertise and require him to restructure the
approach he had envisioned into three steps.
In particular, the need to upgrade the SCADA systems in shops A and B, as well as the automation
of the hazardous material storage and distribution unit, seem more complex. The hazardous
material unit involves issues regarding the safety of assets and individuals. A coordinated
approach with safety experts is necessary.
Moreover, the subject of backups and documentation has not been addressed. During the
debriefing that he will organise with the various managers concerned, he expects to cover this, as
well as other transversal themes.
4.3 Mapping
The first step of his approach remained unchanged. He established a mapping of the industrial
systems from different viewpoints that will help identify weaknesses and areas for improvement.
Pre existing FMECA studies have already clearly defined levels of criticality for the plant,
allowing an initial mapping of the systems to be carried out rapidly.
The hazardous material distribution plant located in the "safety" zone also strongly affects
production in case of a shutdown. It must ensure high availability, but priority is given to safety
functions.
The control room is considered strategic because it makes it possible to view the status of plants
and ensure that they are all functioning correctly. A high level of availability is required, even if it
is possible to stop the SCADA for a few minutes without a significant impact on the site's proper
operation. The procedure in case of total loss of SCADA functions in the control room for more
than 15 minutes (as happened in the past due to a network outage) calls for evacuation of the
production building upon the decision of the safety manager.
A deeper analysis of the network topology is needed to understand how various devices are
connected. Currently, the situation is not very clear. In collaboration with IT department personnel
accustomed to this type of exercise, the coordinator obtained the following topology.
The network topology is inconsistent and seems to lack robustness. It has developed along with
the shops, but has not been subject to overall planning.
Some devices are connected to switches placed in network wiring closets while others are
connected to hubs placed directly in electrical cabinets.
Failure of a hub in workshop A means the loss of SCADA in shop B and the hazardous material
distribution unit.
Continuing to work together with IT teams and shop foremen, he established the logical topology
of the plants.
This mapping allows principal vulnerabilities to be quickly located and explained to personnel.
The coordinator will use it as a teaching tool to explain risks to the managers.
4.4.1 Wi Fi connection
The expansion project includes the implementation of a Wi Fi connection between the PLCs
handling the storage unit and the distribution unit. Installing optical fibre would be complex and
expensive due to the physical configuration of the site.
However, Wi Fi is not the recommended solution for sensitive systems. Risks for Wi Fi
are higher than those for "wired" connections, both in terms of availability (ease of causing
interference to radio signals) and integrity of upstream plant (ease of physical access).
The Wi Fi coverage area is often underestimated. Current technologies can capture Wi Fi
signals at significant distances (hundreds of metres or even several kilometres depending on
configurations). Wi Fi is sometimes used when it would be complex (or impossible) to use
optical fibre or other approaches. It is important to analyse the risks presented by this
type of solution and to implement measures to limit them.
Studies conducted with the safety managers show that to ensure the protection of assets and
individuals, the loss of the data connection between the PLCs of the storage unit and the
distribution unit must cause the safety valves at the storage unit to be closed (fail safe principle).
Cybersecurity risks identified for this connection are the disruption of the connection (hardware
failure or radio interference) and penetration of systems by exploiting a vulnerability in devices.
Disruption the connection would not impact safety functions.
Configuring a firewall behind the access point would be a positive step, but the PLCs use a layer
2 protocol (Ethernet frames) and for maintenance reasons, MAC address filtering is not desirable.
Protection is principally provided by the encryption in the WPA2 protocol and the configuration
of clients and Wi Fi access points. If the protocol is not properly implemented, it could introduce
numerous vulnerabilities.
It is essential to segregate the hazardous material distribution plant with respect to other
Analysis of devices' data streams and connections and monitoring of potential vulnerabilities for
Wi Fi devices are even more imperative, since the only protection is based on the WPA2 protocol.
An application firewall and installation of a Radius server are solutions under consideration to
raise the security level.
Although the new topology allows it, remote maintenance on safety PLCs via Web service access
to the CPU4 is out of the question.
Previous FMECA analyses and lessons learned show that, in most cases, failures of PLC plants
are due to the hardware. These failures require physical intervention on the system to return it to
service. There are few failures related to software bugs; after the intervention, the system must be
re qualified. For critical systems, even minor modifications are subject to a validation process that
cannot be conducted remotely.
This is why the acceptance process for systems requires comprehensive on site testing, sometimes
very intensive, to ensure that no anomalies remain.
The security study concluded that remote maintenance on critical plants is not acceptable
given the risks (e.g. the difficulty of establishing secure plants channels to the process plants,
the difficulty of guaranteeing the identity of the individual logging in, the complexity of
defining the limits of responsibility in case of incident). On the other hand, a remote
diagnosis solution could be implemented.
The coordinator had explained that it was necessary to deploy analytical and diagnostic tools.
These will allow SCADA and PLC events to be centralised at a work station in the control
room. This information can be accessed via a DMZ by remote maintenance teams that can
qualify the incident and, if an intervention is necessary, organise it more efficiently.
Data exchange with the MES system (Manufacturing Execution System) can use protocols such
4
CPU: Central Processing Unit. This is the part of the PLC containing the processor and the programme being executed.
The coordinator explains that, in general, the more the protocols are standardised and used by
a majority of people, the easier it is to master them and find personnel with pertinent skills.
This also leads to more rapid identification of vulnerabilities and availability of updates.
Still in collaboration with the IT department, he worked on an improved topology that would
reduce vulnerabilities by partitioning the network, while integrating new needs with an view to
the future:
allowing desktop PCs to access SCADA HMIs;
linking SCADA databases and corporate MES applications;
sending data from the storage zone to the control room;
deploying a data connection between the hazardous material storage zone and the
hazardous material distribution zone to benefit future plants;
potentially implementing remote maintenance.
These points will also be studied with plant safety managers. Also, improvements in physical
protection of devices should be made.
The work carried out with IT teams and various users led to the architectural proposal described
below. The urbanisation and segregation model for the network and systems is divided into zones
and Sections organised according to criticalities and functions.
This architecture will facilitate integration of future systems and will permit implementation of
the policy defined below.
The various networks in the industrial zone (ICS) can be implemented with LANs or VLANs. To
ensure high availability, firewalls can be deployed redundantly.
It is strongly recommended to create an "admin network" VLAN containing all ICS network
devices (for simplicity, this VLAN is not shown in the diagram).
The rules presented below set down basic principles and should be made more specific in view of
each plant needs.
Filtering example:
Each shop and unit will be connected to the SCADA network via a wiring closet connected in a
loop to improve availability. The wiring closets will be physically locked and a dry contact will
send an alarm to the SCADA system if one is opened.
Devices (PLC, OP, SCADA work stations) will be connected with copper cables to the switches in
the wiring closets.
Several VLANs will be created to implement the segregation proposed above. Routing between
VLANs will be complemented by filtering.
Interconnection with the office network will also pass through a firewall.
This topology will facilitate the addition of future plants.
5
Domain management can be complex and can be a source of significant vulnerabilities if not properly mastered. Appendix C
provides further explanations on domain architecture.
Finally, improvements are planned for SCADA applications. Some are simple, such as:
The coordinator proposes to call upon an external provider to audit the plant and perform
penetration tests once all improvements have been implemented. To avoid plants being affected
again during penetration testing, the audit protocol will be validated in advance.
As site management pointed out, the most important consequence is surely that personnel
now understand the overall importance of cybersecurity: in their everyday life, but especially
in the industrial context. They understand that it is a tool to promote availability and
dependability, an indispensable accompaniment to new technologies.
The company "re appropriated" its systems. Thanks to the studies carried out for this project,
users have a better understanding of the plants and the procedures to follow. Together with remote
diagnostics, this has reduced maintenance costs.
IT security policy is a continuous process. There are still many areas for possible improvement.
Other projects are planned:
analysing statistical data (e.g. sensors, actuators and alarms) to detect erratic behaviour;
further developing the "monitoring system" functions of the SCADA and PLCs;
deploying a centralised solution for updating PLCs, touch screens and other automation
components;
creating a plan to manage obsolescence, in order to progressively replace the oldest and
most vulnerable devices and software;
regularly planning non regression tests;
creating an audit plan based on attack scenarios and negligence scenarios;
planning exercises to test the alert hierarchy and the procedures for handling incidents;
studying virtualisation solutions for server applications, which, combined with thin
30 Cybersecurity for Industrial Control Systems – Use case
clients, can improve availability and quickly restore configurations in case of a disaster.
These solutions also facilitate the deployment of system updates.
All these projects will be led by the coordinator, who will be the cybersecurity contact for
industrial users. He is responsible for ensuring compliance with the rules that have been set down
and the consistency of actions with the IT department.
Disabling Autorun
There is a global catalog for all domains, plus a catalog per domain with replication mechanisms for certain
objects.
The user of one domain can access the other domains when they are authenticated on one of the domains.
The compromise of one domain compromises all the others. Example: a takeover of account Admin_SCADA1
would allow execution of administrative tasks in other domains.
The enterprise.com domain policies do not apply to domains SCADA1 and SCADA2.
The user of a domain can only access other domains if they are explicitly granted rights for the other domains.
Warning: if the admin_enterprise account is declared a member of the administrative groups in the
SCADA domains, a compromise of that account means that the SCADA domains are compromised.
Advantages:
A vulnerability in the "Internal" server can conduct to the takeover of the entire ICS
area.
Warning: taking control of the client (possible if the station is connected to the Internet or uses
email and has no hardening or has never be updated) provides legitimate access to the SCADA
Web server.
following the specific SCADA protocol (dynamic ports for example), the filtering for
the internal firewall can be "soft " ;
The takeover of the «External» server permits to send command to the PLC. If the
SCADA protocole is vulnerable, it allows execution of arbitrary code and provides full
access to the ICS area. Protocols used by SCADA were not originally designed to deal
with cyber-attacks and may be very vulnerable.
Warning: taking control of the client (possible if the station is connected to the Internet or use
email and has no hardening or has never be updated) provides legitimate access to the SCADA
Web server.
Advantages:
No incoming connections to the ICS area which complicates malicious access to this
area .
Disadvantages:
Possible to take the control of ICS network if the protocol used to " replicate " data to
this "external" server has some vulnerabilities.
Advantages:
No data coming from the area outside can enter the ICS zone.
Disadvantages:
and companies
This document is a courtesy translation of the guide Cybersécurité des systèmes industriels:
Maitriser la SSI pour les systèmes industriels. In case of divergence, the French version pre-
vails.