13.07.2015 Views

white paper on industrial automation security in fieldbus and

white paper on industrial automation security in fieldbus and

white paper on industrial automation security in fieldbus and

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

26filter<strong>in</strong>g is another barrier for prevent<strong>in</strong>g simpleattacks. URL filter<strong>in</strong>g may be applied <strong>in</strong> order toprevent pers<strong>on</strong>s <strong>in</strong>side the safe network z<strong>on</strong>esfrom access<strong>in</strong>g known, <strong>in</strong>secure c<strong>on</strong>tent <strong>in</strong> theInternet. Applicati<strong>on</strong>-level firewalls or <strong>on</strong>essupport<strong>in</strong>g stateful packet <strong>in</strong>specti<strong>on</strong> (SPI) canbe used to further <strong>in</strong>crease the level of <strong>security</strong>.Firewalls shall be c<strong>on</strong>figured <strong>in</strong> such a way that<strong>on</strong>ly the required functi<strong>on</strong>ality is open <strong>and</strong>enabled. Firewalls shall be used where needed,e.g. as required by the network <strong>security</strong> z<strong>on</strong>eswhich are setup for an organizati<strong>on</strong>. Firewallsfrom different vendors may be used <strong>in</strong> order toprovide some <strong>security</strong> due to diversificati<strong>on</strong>.Appropriate encrypti<strong>on</strong>s need to be used e.g. forwireless c<strong>on</strong>necti<strong>on</strong>s. As an example, manyWireless LAN (WLAN) routers support WEP,WPA <strong>and</strong> WPA2 encrypti<strong>on</strong>s. Of thesealternatives, WEP should not be used, WPA canbe used but WPA2 provides the best level of<strong>security</strong>. Furthermore, <strong>in</strong> order to <strong>in</strong>crease thelevel of <strong>security</strong>, WPA should be used <strong>in</strong> theenterprise mode (known as WPA-Enterprise orWPA-802.1X mode).Manufacturers’ recommendati<strong>on</strong>s regard<strong>in</strong>gwhich equipment works well together should befollowed. This is especially true if therecommendati<strong>on</strong> is based <strong>on</strong> <strong>security</strong>functi<strong>on</strong>ality.3.4.6 Network topologyIt is important to c<strong>on</strong>sider how the Ethernetnetwork is c<strong>on</strong>structed, <strong>in</strong> terms of topology.The bridg<strong>in</strong>g between networks of different<strong>security</strong>, e.g. between an Industrial Ethernetnetwork <strong>and</strong> an office- or IT-network, should becarefully c<strong>on</strong>sidered <strong>and</strong> c<strong>on</strong>figured.There is also a risk regard<strong>in</strong>g physical <strong>security</strong> ifthere are unused ports <strong>in</strong> Ethernet equipmentwhich can be used by an <strong>in</strong>truder to ga<strong>in</strong> accessto the network. Sometimes, unused ports <strong>in</strong>network<strong>in</strong>g equipment are used for portforward<strong>in</strong>g, which means that the traffic throughe.g. a switch or similar piece of equipment isforwarded to a certa<strong>in</strong>, unused port. This portcan be used for logg<strong>in</strong>g <strong>and</strong> traffic analysispurposes by e.g. c<strong>on</strong>nect<strong>in</strong>g a computer withsuitable capture software.Because Ethernet has become more popular <strong>in</strong>different automati<strong>on</strong> systems, there have alsoappeared a number of gateways <strong>and</strong> bridgeswhich allows c<strong>on</strong>necti<strong>on</strong> of Ethernet totraditi<strong>on</strong>al <strong>fieldbus</strong>es. These devices present anaccess po<strong>in</strong>t from an Ethernet network to <strong>fieldbus</strong>es, which were orig<strong>in</strong>ally designed to beclosed networks. The features of such gateways<strong>and</strong> bridges, such as <strong>in</strong>tegrated web <strong>in</strong>terfacesfor c<strong>on</strong>figurati<strong>on</strong> or m<strong>on</strong>itor<strong>in</strong>g with the purposeof allow<strong>in</strong>g simple c<strong>on</strong>figurati<strong>on</strong> possibly fromremote locati<strong>on</strong>s, may encourage the loosen<strong>in</strong>gof <strong>security</strong> c<strong>on</strong>figurati<strong>on</strong>s. As an example, thebrows<strong>in</strong>g of a web <strong>in</strong>terface generally requiresthe port 80, which is reserved for HTTPcommunicati<strong>on</strong>s, to be open. However, access tothe web server <strong>in</strong> a device from outside meansthat the HTTP port is also exposed to n<strong>on</strong><strong>in</strong>tendedusers, which may target attacks <strong>on</strong> it.Although this k<strong>in</strong>d of web <strong>in</strong>terface iscomm<strong>on</strong>ly protected by a username-passwordcomb<strong>in</strong>ati<strong>on</strong>, the default value is often listed <strong>in</strong>the device manual which is available <strong>on</strong>l<strong>in</strong>e.Although the password may be changed, it is notuncomm<strong>on</strong> that the new password has poorstrength, due to user/operator ignorance <strong>and</strong>/or<strong>in</strong>adequate <strong>in</strong>structi<strong>on</strong>s to choose the passwordcleverly. It is worth menti<strong>on</strong><strong>in</strong>g, that if an<strong>in</strong>truder manages to determ<strong>in</strong>e the password fora gateway (or some other network<strong>in</strong>g device) itmay be possible for the <strong>in</strong>truder to change thepassword, <strong>security</strong> sett<strong>in</strong>gs or other functi<strong>on</strong>alityrelated to the system.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!