Lecture 6 - Securing The Smart Grid
Lecture 6 - Securing The Smart Grid
System Security
INSE 6640 – Securing the Smart Grid
(Lecture 6)
4
Other Security Models and
Existing Standards
5
IEEE 2030-2011
6
IEEE 2030 reference model
• IEEE 2030 models the Smart Grid, the various actors and influencers,
and the interconnection between systems
• IEEE 2030 primary concern is the interoperability more than security,
therefore, the provided mapping is slightly less comprehensive than
NISTIR’s.
• IEEE 2030 consider the following actors (“domains” in NISTIR 7628):
bulk generation, transmission, distribution, customer, service
provider, control and operations, and markets.
• Actors/domains are grouped in 3 main categories: power & energy,
communication, and information technology
7
IEEE 2030® Grid Framework
• Power & Energy: Defines the
numerous data flows necessary
for reliable, secure, bi-directional
flow of power and energy
• Communications: Identifies the
communications infrastructure
necessary for smart grid, from
high-speed synchrophaser data
to meter and customer
notification systems
• Information Technology (IT):
Defines the system-to-system
communications requirements
and data flow to leverage
individual systems into a system
of systems
8
ISA-62443 (also known as ISA99): zones and
conduits in Smart Grids
https://www.isa.org/intech/201810standards/
https://www.isa.org/isa99/
9
ISA 99 intent and ISA/IEC 62443
• The International Society of Automation (ISA) committee 99 originally
developed a road map for the creation of a series of standards,
guidelines for the security of industrial automation and control
systems.
10
ISA/IEC 62443 relevance
• Industrial automation is extensively used in the Smart Grid; therefore
this standard is very relevant!
• ISA-62443 security recommendations are based upon the physical
and logical separation of the systems that need to be protected.
• The standard applies the important “zone and conduit” model to
identify which systems by necessity or functions work as a group
(zones) and how they should be separated from other groups by
means of proper interfaces (conduits).
11
ISA/IEC 62443: reference model for multi-plant
zone separation
• This model isolates functional groups and
provides a single, controllable connection
path between them.
• It may be necessary to further subdivide a
zone into multiple “subzones” which allows
further segmentation of assets based on
common criteria (not shown in the figure).
• ISA-62443 considers that the first allocation
of zones could be based on the physical
grouping of assets. Next, additional subzones
can be created for a logical grouping of
assets in order to apply a specific set of
security requirements to these assets based
on the desired level of protection. Why?
12
Importance of subzones
• Example: the same types of security controls cannot be applied to:
• Embedded devices (PLCs, RTUs, IEDs)
• Windows-based devices (servers, HMIs).
• It is natural to provide compensating security measures based on the
subzone’s characteristics (which are shared amongst all the members in the
subzone).
• In windows-based asset subzones, application control technologies may be used to
mitigate the risk of malware
• In embedded device subzones we may focus more on deep packet inspection
technology to limit malicious commands from reaching these assets.
• ISA-62443 focuses on the importance of separating assets by level of
criticality. It prevents attackers from breaching less important (and
presumably less secured) systems and then pivoting from those systems to
more important targets.
13
Challenge of zones and conduits model (1/2)
• In many Smart Grid deployments, functionality that should exist in
different dedicated assets may be integrated into just one device:
• E.g. measurement systems, controllers, gateways may be integrated into a
single physical asset.
• A substation gateway provides remote connectivity, substation and field
services, automation control, protocol translation and measurements.
• These types of multi-function devices are common due to the various
economic benefits, but they present a challenge to the zone/conduit
model.
• Highly integrated devices must be very carefully deployed and
managed to ensure that the proper degree of separation is
accomplished.
14
Challenge of zones and conduits model (2/2)
15
Assets within Conduits (1/4)
• Assets are not only in the zones but also in the conduits!
• The conduits between zones can contain multiple communication
“channels” that represent the actual data.
• The channels for ISA-62443 are also assets and all channels within a
conduit should share the same security level (or requirements)
16
Assets within Conduits (4/4)
• The intent is to identify and protect each conduit based on its relative
security requirements (see e.g. the specifications in the NISTIR model).
• Some conduits may require simple site-to-site encryption and
authentication, while others may require additional security such as
content inspection, and threat management .
• The reference model wants to selectively implement security measures
in the conduits interconnecting zones. The same security measures
apply to all the channels within a conduit.
17
Assets within Conduits (3/4)
The problem is that with increased security and complexity also come
increased cost in terms of both equipment and maintenance and
support costs !
18
Siemens was the first company certified IEC
62443 on August 2016
19
Mapping security requirements to Smart Grid
environments
20
Security controls within Smart Grid: objectives
23
Simplified Smart Grid: Zones
24
Field Zones Protection
Field Zone Protection (1/3)
If traffic is encrypted in transit, make sure that the traffic can still be
monitored at both ends <------ Why?
Compromise: risk vs visibility
If traffic is encrypted in transit, make sure that the traffic can still be
monitored at both ends
• Intrusion prevention systems function just like an IDS. Moreover, they can
actively block traffic—often by dropping the offending packet, or by resetting
the TCP session.
• Application content inspection systems perform a hybrid function: they
inspect and decode the contents of a series of packets like an IDS and analyze
the contents like an Industrial Protocol filter.
• Transport layer security are cryptographic protocols designed to provide
communications security (privacy and data integrity). They are increasingly
supported by those devices intended for use in substations automation,
thanks to IEC 61850 and IEC 62351.
Network security: difficulties
• Without costly hardware tools, encrypted traffic is extremely difficult to
inspect.
• If the encryption occurs at the host, the host itself must be secured to
ensure the integrity otherwise an infected endpoint could authenticate and
send encrypted exploits without risk of detection
• It’s also not always possible to implement just any commercial off-the-shelf
security tool
• Many substations present extreme temperature conditions and high levels of
electromagnetic interference.
• Space may be limited, or other physical or environmental conditions might prevent
installation.
• Many network security tools today can be virtualized and installed as
software. While not as strong, virtualization offers more flexible
deployment options and (typically) lower cost
Securing the Supply Chain
Why should we care about the Supply Chain?
• It is quite likely for the composition of the zones to be reliant on third
parties
• The management of the zones (or part of them) may be entirely outsourced
to a third party.
• Many components are likely to be from third-party providers, even the
technical architecture of the zone is probably designed by a third party.