SlideShare ist ein Scribd-Unternehmen logo
1 von 52
 
AMI Security Workshop ,[object Object],[object Object],[object Object],[object Object],[object Object]
Presenters Slade Griffin  – Penetration Testing & Incident Handling Engineer, EnerNex Kevin Brown  – RF & Embedded Security Engineer, EnerNex Ido Dubrawsky  – Security Engineering Team Lead, Itron Robert Former  – Head of Security Research and Testing, Itron Stephen Chasko  – Principal Security Engineer, Landis+Gyr Edward Beroset  – Director of Technology and Standards, Elster Robert Humphrey  – Lead IT Security Analyst, Duke Energy
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gartner Hype Cycle – Where Are We? You Are Here
Merging Two Infrastructures Electrical Infrastructure “ Intelligence” Infrastructure
The Smart Grid
Utility WAN NAN HAN Securing Communications
IT-based & Web-based WAN RF & Embedded Technologies & Protocols
Smart Meters and Infrastructure
AMI Concerns (consumers)
AMI    HAN Concerns
AMI Security for Sale ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SDL Requirements and Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Embedding Security Into Software And Culture Delivering secure software requires ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Executive commitment    SDL a mandatory policy Source: Microsoft, 2009 ,[object Object],Ongoing Process Improvements    6 month cycle
Software Development Lifecycle (SDL) Models ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: Microsoft, 2009
Security Development Lifecycle  vs. Traditional Development Lifecycle Threat Modeling Complete and Mitigations Reflected in Specifications Product Code Complete Final Release Candidate Requirements Design Implementation Verification Release Support & Servicing Feature Lists Quality Guidelines Architecture Docs Schedules Functional Specifications Design Specifications Testing and Verification Development of  New Code Bug Fixes Code Signing & Signoff RTM Product Support Service Packs/QFEs Security Updates Security Kickoff Security  Design Best  Practices Security  Architecture & Attack Surface  Review Threat Modeling Use Security Development Tools &  Security Best  Dev & Test Practices Create Security  Documentation And Tools  for Products Prepare  Security Response  Plan Security Push Pen Testing Final Security Review Signoff On Security Requirements Security Servicing & Response Execution Security Training
What Products Should Apply SDL? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Security Framework :  SD 3 +C ,[object Object],[object Object],[object Object],Source: Microsoft, 2009 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack Surface Reduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack Surface Example Source: Microsoft, 2009
Threat Modeling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developing Attack Trees ,[object Object],[object Object],[object Object],[object Object]
Example Attack Tree Source: Schneier, Bruce, Attack Trees, Dr. Dobbs Journal, December 1999, accessed at:  http://www.schneier.com/paper-attacktrees-ddj-ft.html
Coding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Final Security Review ,[object Object],[object Object],[object Object],[object Object]
Maintenance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-Generational Equipment Issues ,[object Object],[object Object],[object Object],[object Object]
Meter Design Lifecycle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack Tree Threat Assessment Security Goals Privacy Assessment Incident Response Periodic Threat Assessment Process Audits Security Test Results Audit against threat model External Penetration Testing Process Compliance Release Verification Peer Review Resolution Automated Review Results Tool Review Security Architecture Cryptography Review Security Test Plan – Attacks, Cryptography, Functionality Coding Practices
Selecting Penetration Testers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Focus and AMI Security Goals
Some Initial Truths ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outside the Fence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security vs Operations Mount the Box How High?
Security vs Operations Mount the Box How High?
Security vs Operations Mount the Box How High?
Security vs Operations Mount the Box How High?
Security vs Operations Mount the Box How High?
Inside the Box Memory   Coms  Module Coms Module USB Serial Sensor Relay Switch Actuator
The Cyber-Physical Line Memory   Coms  Module Coms Module USB Serial Sensor Relay Switch Actuator
We Are Secure…It Is Encrypted ,[object Object],[object Object],[object Object]
Embedded-OS's  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Perform Vulnerability Testing? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Things To Consider ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internal Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
External Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Findings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Tips ,[object Object],[object Object],[object Object],[object Object]
Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLCTjylen Veselyj
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsCodenomicon
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Technical Writing for Consultants
Technical Writing for ConsultantsTechnical Writing for Consultants
Technical Writing for ConsultantsDilum Bandara
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlcAvancercorp
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...John M. Willis
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best PracticesClint Edmonson
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIshrath Sultana
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...GoQA
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 

Was ist angesagt? (19)

Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Technical Writing for Consultants
Technical Writing for ConsultantsTechnical Writing for Consultants
Technical Writing for Consultants
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Introduction to Application Security Testing
Introduction to Application Security TestingIntroduction to Application Security Testing
Introduction to Application Security Testing
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 

Andere mochten auch

Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSOAndy Bochman
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateAndy Bochman
 
Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot projectcanaleenergia
 
Krysten’S Convergence Project
Krysten’S Convergence ProjectKrysten’S Convergence Project
Krysten’S Convergence Projectkej923
 
Desktop publishing units of study
Desktop publishing    units of studyDesktop publishing    units of study
Desktop publishing units of studylc0810
 
ISTQB Agile Extension
ISTQB Agile ExtensionISTQB Agile Extension
ISTQB Agile ExtensionDavis Thomas
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
Microsoft Surface Overview Deck
Microsoft Surface Overview DeckMicrosoft Surface Overview Deck
Microsoft Surface Overview Deckguest92840fe
 
Working Smart With Microsoft Outlook
Working Smart With Microsoft OutlookWorking Smart With Microsoft Outlook
Working Smart With Microsoft Outlookpeter_chevis
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
microsoft Surface computer
microsoft Surface computer microsoft Surface computer
microsoft Surface computer Ashish Singh
 
Transforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsTransforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsSteve Ray
 
Microsoft Smart Buildings White Paper
Microsoft Smart Buildings White PaperMicrosoft Smart Buildings White Paper
Microsoft Smart Buildings White PaperMicrosoft India
 
Setting SMART Goals and Objectives
Setting SMART Goals and ObjectivesSetting SMART Goals and Objectives
Setting SMART Goals and ObjectivesThe Pathway Group
 
Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016
Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016
Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016sitecmy
 

Andere mochten auch (20)

Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
61850easy Test Tool 2013
61850easy Test Tool 201361850easy Test Tool 2013
61850easy Test Tool 2013
 
Krysten’S Convergence Project
Krysten’S Convergence ProjectKrysten’S Convergence Project
Krysten’S Convergence Project
 
Desktop publishing units of study
Desktop publishing    units of studyDesktop publishing    units of study
Desktop publishing units of study
 
ISTQB Agile Extension
ISTQB Agile ExtensionISTQB Agile Extension
ISTQB Agile Extension
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
Microsoft Surface Overview Deck
Microsoft Surface Overview DeckMicrosoft Surface Overview Deck
Microsoft Surface Overview Deck
 
Working Smart With Microsoft Outlook
Working Smart With Microsoft OutlookWorking Smart With Microsoft Outlook
Working Smart With Microsoft Outlook
 
Surface computer
Surface computerSurface computer
Surface computer
 
Surface computer
Surface computerSurface computer
Surface computer
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
microsoft Surface computer
microsoft Surface computer microsoft Surface computer
microsoft Surface computer
 
Transforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsTransforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid models
 
Microsoft Smart Buildings White Paper
Microsoft Smart Buildings White PaperMicrosoft Smart Buildings White Paper
Microsoft Smart Buildings White Paper
 
Setting SMART Goals and Objectives
Setting SMART Goals and ObjectivesSetting SMART Goals and Objectives
Setting SMART Goals and Objectives
 
Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016
Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016
Day 1 Session 3: Cytron @ Selangor Smart City Intl Conference 2016
 

Ähnlich wie AMI Security Workshop Addresses Challenges of Securing Smart Grid Infrastructure

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)Olle E Johansson
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutionsguest609a5ed
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And SolutionsHannan Ahmed
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRhys A. Mossom
 
MSRC - Funcionamiento
MSRC - FuncionamientoMSRC - Funcionamiento
MSRC - FuncionamientoChema Alonso
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how bdemchak
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...John Kinsella
 

Ähnlich wie AMI Security Workshop Addresses Challenges of Securing Smart Grid Infrastructure (20)

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Pa awwa2006 presentationrev1fin_feb
Pa awwa2006 presentationrev1fin_febPa awwa2006 presentationrev1fin_feb
Pa awwa2006 presentationrev1fin_feb
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
 
MSRC - Funcionamiento
MSRC - FuncionamientoMSRC - Funcionamiento
MSRC - Funcionamiento
 
Active Testing
Active TestingActive Testing
Active Testing
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
 
shaabani-Final-NC
shaabani-Final-NCshaabani-Final-NC
shaabani-Final-NC
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
 

AMI Security Workshop Addresses Challenges of Securing Smart Grid Infrastructure

  • 1.  
  • 2.
  • 3. Presenters Slade Griffin – Penetration Testing & Incident Handling Engineer, EnerNex Kevin Brown – RF & Embedded Security Engineer, EnerNex Ido Dubrawsky – Security Engineering Team Lead, Itron Robert Former – Head of Security Research and Testing, Itron Stephen Chasko – Principal Security Engineer, Landis+Gyr Edward Beroset – Director of Technology and Standards, Elster Robert Humphrey – Lead IT Security Analyst, Duke Energy
  • 4.
  • 5. Gartner Hype Cycle – Where Are We? You Are Here
  • 6. Merging Two Infrastructures Electrical Infrastructure “ Intelligence” Infrastructure
  • 8. Utility WAN NAN HAN Securing Communications
  • 9. IT-based & Web-based WAN RF & Embedded Technologies & Protocols
  • 10. Smart Meters and Infrastructure
  • 12. AMI  HAN Concerns
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Security Development Lifecycle vs. Traditional Development Lifecycle Threat Modeling Complete and Mitigations Reflected in Specifications Product Code Complete Final Release Candidate Requirements Design Implementation Verification Release Support & Servicing Feature Lists Quality Guidelines Architecture Docs Schedules Functional Specifications Design Specifications Testing and Verification Development of New Code Bug Fixes Code Signing & Signoff RTM Product Support Service Packs/QFEs Security Updates Security Kickoff Security Design Best Practices Security Architecture & Attack Surface Review Threat Modeling Use Security Development Tools & Security Best Dev & Test Practices Create Security Documentation And Tools for Products Prepare Security Response Plan Security Push Pen Testing Final Security Review Signoff On Security Requirements Security Servicing & Response Execution Security Training
  • 18.
  • 19.
  • 20.
  • 21. Attack Surface Example Source: Microsoft, 2009
  • 22.
  • 23.
  • 24. Example Attack Tree Source: Schneier, Bruce, Attack Trees, Dr. Dobbs Journal, December 1999, accessed at: http://www.schneier.com/paper-attacktrees-ddj-ft.html
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Attack Tree Threat Assessment Security Goals Privacy Assessment Incident Response Periodic Threat Assessment Process Audits Security Test Results Audit against threat model External Penetration Testing Process Compliance Release Verification Peer Review Resolution Automated Review Results Tool Review Security Architecture Cryptography Review Security Test Plan – Attacks, Cryptography, Functionality Coding Practices
  • 32.
  • 33. Security Focus and AMI Security Goals
  • 34.
  • 35.
  • 36. Security vs Operations Mount the Box How High?
  • 37. Security vs Operations Mount the Box How High?
  • 38. Security vs Operations Mount the Box How High?
  • 39. Security vs Operations Mount the Box How High?
  • 40. Security vs Operations Mount the Box How High?
  • 41. Inside the Box Memory Coms Module Coms Module USB Serial Sensor Relay Switch Actuator
  • 42. The Cyber-Physical Line Memory Coms Module Coms Module USB Serial Sensor Relay Switch Actuator
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.

Hinweis der Redaktion

  1. And applications. As utilities begin to trust the information and availability of these systems the are being automated; taking the human out of the loop. Vulnerabilities are constantly changing - algorithms broken - faster computers, cloud computing, parallel computing at desktop (graphics cards) - increased availability to commodity components - etc., etc.
  2. May indicate this as Risk Management.. this is an ongoing process too.
  3. I get the notion that many utilities get just one person to do their testing vs. selecting a team where each brings value within a given skill set. Even if a utility picks a company to do their testing, only one person gets assigned. I think it is important to get the diverse skill set: power systems understanding, understanding regulation, standards, and best practices for the given industry, embedded security, network security, platform security, project management and so on. I think another thing for external engagements is knowing what the information sharing agreement is. I treat the Duke-EnerNex relationship as a closed one. Meaning we do not disclose any findings or information except to Duke. I’ve noticed in some instances where the researcher wants to retain rights to the information or set a time-limit on when they can release their findings to the general public. Another arrangement would be where there is open information sharing between the utility and vendor. In whatever the case, I think utilities should know what they are signing up for.