NERC CYBER - Implementing Application Whitelisting - Tatera
NERC CYBER - Implementing Application Whitelisting - Tatera
PUBLIC
Overview of PG&E
Investor Owned Utility Gas &
Electric Service incorporated in
1905
Based in San Francisco, PG&E
delivers some of the nation’s
cleanest energy to nearly 16
million people in Northern and
Central California.
AWL does have limitations and should be considered as one layer in a defense-in-
depth cybersecurity strategy rather than a sole solution.
Probably the most notable limitation is that AWL does not protect systems from
exploitation attacks that target vulnerabilities in trusted applications. These
applications are on the AWL approved list and are allowed to execute.
Examples of exploitation attacks include SQL injection, cross-site scripting (XSS), and
memory corruption attacks such as buffer overflows.
Source: https://ics-cert.us-
cert.gov/sites/default/files/documents/Seven%20Steps%20to%20Effectively%20Defend%20Industrial%20Control%20Systems_S508C.pdf
1. Initiate the Solution. The first phase involves identifying current and future needs for application whitelisting; specifying requirements
for performance, functionality, and security; and developing necessary policies.
2. Design the Solution. The second phase involves all facets of designing the application whitelisting solution. Examples include
architectural considerations, whitelist management, cryptography policy, and security aspects of the solution itself.
3. Implement and Test a Prototype. The next phase involves implementing and testing a prototype of the designed solution in a lab or test
environment. The primary goals of the testing are to evaluate the functionality, management, performance, and security of the solution.
4. Deploy the Solution. Once the testing is completed and all issues are resolved, the next phase includes the gradual deployment of the
application whitelisting technology throughout the enterprise.
5. Manage the Solution. After the solution has been deployed, it is managed throughout its lifecycle. Management includes solution
maintenance and support for operational issues. The lifecycle process is repeated when enhancements or significant changes need to be
incorporated into the solution.
Source: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf
Source: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf
• Verify that specific I/O device drivers work properly with selected whitelisting
software
DHS article “Application Whitelisting in an ICS Environment, DHS ICS-CERT Monitor July, August, September
2013.
https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Jul-Sep2013.pdf
GridSecCon 2017