OT/ICS Secure by Design

The pro’s don’t bother with vulnerabilities; they use features to compromise the ICS

Ralph Langner

This quote I found in Dale Peterson blog . I strongly agree with it, because many ICS/OT devices still suffer from insecure by design features. However, that doesn’t mean that NIST vulnerabilities and CVEs don’t matter ! It does matter and it could lead to serious harm sometimes. The goal in OT/ICS security is not to focus on NIST database only, but must also make a huge priority for design issues by doing something about it. Asset owners and vendors should focus on both types of vulnerabilities [2]. Relying on NIST CVEs for OT/ICS is only scratching the surface[2]. We security professionals should look for OT/ICS documents features that allow us to manipulate the system and try to change or hide these features that lead to an impact or a security incident.

There are other types of vulnerabilities not just design and CVEs of course. In fact according to NIST , it classifies them in its document 800-82 to 6 types:

  • Policy and Procedure vulnerabilities
  • Architecture and Design Vulnerabilities
  • Configuration and Maintenance Vulnerabilities
  • Physical Vulnerabilities
  • Software Development Vulnerabilities
  • Communication and Network Configuration Vulnerabilities

In this article, I try to focus on the design type. Why ? Recently I saw some OT/ICS vendors trying to develop secure by design features in their products. Also, I don’t want to forget the excellent project “Top 20 Secure PLC Coding Practices” that was a product of OT/ICS community cooperation, many thanks to them.So, back to the vendors, Big vendors such as Honeywell‘s implementation of secure boot and built-in firewall in its PLCs, Siemens application of communication encryption and other vendors who have started to add security features, please go there and have a look. I think they are working to overcome the most critical issue “insecure design” and prepare for more secure future towards its customers. Also, I saw a good white paper by Bedrock Automation, where they apply their concept “intrinsic security” , in another word “secure by design” to its products. They have listed their secure components as:

  • Metal (For protection)
  • Ports (remove or close unnecessary ports , otherwise authentication is required)
  • Pins and Electromagnetic Interference (EMI)
  • Electromagnetic Pulse and Cyber Defense (EMP)
  • Counterfeiting
  • Cryptography and Strong Encryption
  • Secure boot
  • True Random Numbers
  • Security Hardened Operating Systems
  • Evaluation Assurance Level
  • Anti-Tamper for Cyber Defense
  • Secure Supply Chain and Key Management System
  • Public Key Infrastructure (PKI)
  • Hardware Root of Trust

As we can see their specs vary from design , network , software and physical security. I’m not advertising any OT/ICS vendor , but I mention them because its part of what I do that is related to my area of research. I’m not going to rank or analyze these secure features. Maybe I will do it in another article. The point of this article , many of OT/ICS professionals in the past lost hope of seeing “secure by design”come to surface, see this 2013 blog post for example. This is over ! we are finally seeing efforts of OT/ICS vendors in this direction and that is excellent.

The security features mentioned above are implemented deeply at level 0-1 in the ics Purdue model. Other vendors have also started to monitor this level which could help those that don’t have the above new generation hardware such as Siga , Mission Secure , and Fortiphyd [1]. I haven’t covered all vendors by the way.Those vendors have developed solutions that identify process variable anomalies. Its like what our friends Nozomi , Claroty and others do, but at a lower level than our friends. Level 0-1 security was a topic of many OT/ICS experts such as Joe Weiss who has been shouting for securing level 0-1 for a long time [3].

Finally , I have left with you MITRE ATT&CK for ICS. It’s a great database of techniques and tools that are used by adversaries to attack OT/ICS. It lays out many types OT/ICS devices and how they get compromised. Go there, learn it and find out what applies to you. Maybe you don’t have “secure by design” OT/ICS system yet. This database can guide you on how to protect your assets from adversaries.

References:

  1. https://www.linkedin.com/pulse/pivot-process-variable-anomaly-detection-dale-peterson/
  2. https://www.langner.com/2019/03/what-does-insecure-by-design-actually-mean-for-ot-ics-security/
  3. https://www.controlglobal.com/blogs/unfettered/the-ot-paradigm-is-broken-technically-and-culturally-it-must-be-fixed

Comments are closed.