Control System Cyber-Security Workshop (CS)2/HEP

Europe/Zurich
Crowne Plaza Hotel

Crowne Plaza Hotel

Knoxville, Tennessee, USA
Stefan Lueders (CERN)
Description
The enormous growth of the worldwide "Internet" during the last decade offers computer users new means to share and distribute information and data. The High Energy Physics (HEP) community has even partially driven the success of the Internet. Today, modern Information Technologies (IT) are commonly used in accelerator and experiment control systems. Accelerator and experiment control system are based more and more on common-of-the-shelf hardware/software (VME crates, PLCs, VxWorks, LynxOS, network switches, networked controls hardware, SCADA, commercial middleware, etc.) or Windows/Linux PCs. Even customized hardware often comes with Ethernet adapters. This world-wide interconnectivity allows access to all this equipment remotely from the office, from home or from remote universities and institutes. Unfortunately, the adoption of modern IT standards by control systems also exposes the inherent vulnerabilities of the corresponding hardware and software to the world. This world is far more hostile than a local private controls network as the number and power of worms and viruses increases and hackers start to become interested in control systems. Furthermore, control PCs can not be patched as fast as office PCs. Even worse, vulnerability scans at CERN have shown that common-off-the-shelf automation systems often lack even fundamental security protection measures. The (CS)2/HEP workshop is intended to present, share and discuss counter-measures deployed in high energy physics laboratories in order to secure control systems. Potential Keywords and topics are: * Security, vulnerabilities and protective measures of front end devices (e.g. VME crates, LynxOS, VxWorks, PLCs, power supplies, networked controls hardware) * Control network security, network architectures, network segregation, firewalling and intrusion detection * SCADA security, PC installation and management schemes * Secure ("Kiosk") operation in multi-user environements (e.g. at light-sources, where users change quite frequently) * Authentication & Authorization of control systems * Remote operations and expert interventions * Security policies, security procurement language, official regulations and best practices * Security testing, disclosure and follow up
Summary Paper
Summary Talk
    • 09:00 09:05
      Welcome 5m
      Speaker: Dr Stefan Lueders (CERN)
    • 09:05 09:30
      Cyber-Threats, Cyber-Vulnerabilities, and Cyber-Risks 25m
      An emerging trend in Control Systems is the growing usage of general IT standards, tools, protocols, and methods. Due to this adoption, also common weaknesses and vulnerabilities have been inherited by those Control Systems. This presentation will cover the risk equation: threat, vulnerabilities, and consequences.
      Speaker: Dr Stefan Lueders (CERN)
      Slides
    • 09:30 10:00
      Network and computer security in the Fermilab Accelerator Control System 30m
      The balance between security and usability in the Fermilab Accelerator Control System will be presented. The control system contains a wide variety of systems, with varying abilities to protect themselves and varying risks to other systems on the network. The community of Physicists, Engineers, Computer Professionals and others who repair, maintain and constantly improve this control system need to have sufficient access to the systems to remain productive, while keeping out the unwanted traffic. We have achieved the current balance by using a wide range of tools and methods. This presentation will discuss these tools and methods.
      Speaker: Tim Zingelman (Fermi National Accelerator Lab)
      Slides
    • 10:00 10:30
      Control System Cyber Security Measures at the Advanced Photon Source 30m
      Large accelerator facilities such as the Advanced Photon Source (APS) typically are operated by a diverse set of integrated control systems such as IOCs, PLCs, and FPGAs. At APS, the supervisory controls software that connects and unifies these programmable units is Experimental Physics and Industrial Control System (EPICS). Layered on top of EPICS is the relational database Web- viewable software tool Integrated Relational Model of Installed Systems (IRMIS) that was designed and implemented at APS to provide intuitive and easily navigated views of the APS control system software and hardware components. This layered control system structure at APS comes with inherent cyber security risks. The software security measures that have been investigated and are available for the APS control system are presented in this paper.
      Speaker: Ms Deborah Quock (Argonne National Laboratory)
      Slides
    • 10:30 10:45
      Coffee Break 15m
    • 10:45 11:15
      Perspective on secure network for control systems in SPring-8 30m
      SPring-8, a third-generation open user facility of synchrotron radiation, accepts many experiment users coming from outside facilities. The users, which constructed their own control system at each beam-line, require a fast, stable and secure network environment to perform their experiments. At first, we installed firewall systems to protect the network from outer intrusion. However, the users connect own PCs to the network. If a PC is carriers of some kind of computer virus, there is a possibility that the network affects fatal damage, because a firewall have no effect on attack from the inside. The modern IT has a lot of risks against the network system for control and data acquisition. All risks cannot be avoided by only one method. To achieve a secure network environment, we adopted various approaches. Network segregation designing is the most important thing. The range and the scale of the network trouble are controlled by firewall and VLAN when an incident occurs. The network trouble is prevented from spreading, and we can defend other experiments and a facility operation. Intrusion detection and quarantine are also important. We installed intrusion protection system (IPS), because attacks for vulnerabilities are hard to protect by a firewall. Traditional SNMP monitoring system and newer sFlow analyzer help realtime analysis and restoration from problems of a network infrastructure. We introduced these traffic monitoring systems. In addition, we prepared patch management systems for major OS and carried out a vulnerability scan regularly. We will discuss details in the workshop.
      Speaker: Dr Toru OHATA (JASRI/SPring-8)
      Slides
    • 11:15 11:45
      Update on the CERN Computing and Network Infrastructure for Controls (CNIC) 30m
      Over the last few years, modern accelerator and experiment control systems are based more and more on commoncommercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. During the two years following the presentation of the CNIC security policy at ICALEPCS2005, a “defense-in depth” approach has been applied to protect CERN’s control systems. This presentation will give a review of its thorough implementation and its deployment. Particularly, measures to secure the controls network and tools for user-driven management of Windows and Linux control PCs will be discussed.
      Speaker: Dr Stefan Lueders (CERN)
      Slides
    • 11:45 12:15
      Remote Access to Alice 30m
      In the design of the control system for the ALICE experiment much emphasis has been put on cyber security. The control system operates on a dedicated network isolated from the campus network and remote access is only granted via a set of Windows Server 2003 machines configured as application gateways. The operator consoles are also separated from the control system by means of a cluster of terminal servers. Computer virtualization techniques are deployed to grant time-restricted access for sensitive tasks such as control system modifications. This paper will describe the global access control architecture and the policy and operational rules defined. The role-based authorization schema will also be described as well as the tools implemented to achieve this task. The authentication based on smartcard certificates will also be discussed.
      Speaker: Peter Chochula (CERN)
      Slides
    • 12:15 14:00
      Lunch Break 1h 45m
    • 14:00 14:30
      Security Experiences in SLAC Controls 30m
      The security implemented by each laboratory program and department is important to the laboratory as a whole, and to the health of each program. SLAC Controls team members work with central IT experts in security, networks, Oracle, Windows and UNIX, enhancing our ability to deliver secure control systems that meet project requirements. This talk presents some solutions and experiences at SLAC, including the need to design a secure architecture, servers, procedures, and to revise them throughout the project.
      Speaker: Terri Lahey (SLAC)
      Slides
    • 14:30 15:00
      Role Based Access Control for the Accelerator Control System at CERN 30m
      Given the significant dangers of LHC operations, access control to the accelerator controls system is required. This paper describes the requirements, design, and implementation of Role Based Access Control (RBAC) for the LHC & injectors controls systems. It is an overview of the two main components of RBAC: authentication and authorization, and the tools needed to manage access control data. We begin by stating the main requirements of RBAC and then describe the architecture and its implementation. RBAC is developed by LAFS a collaboration between CERN and Fermilab.
      Speaker: Mrs Suzanne Gysin (FNAL)
      Slides
    • 15:00 15:30
      WARCS -Wide Area Remote Control for SPring-8 30m
      WARCS (Wide Area Remote Control for SPring-8) is a system which allows experts to access machine control computers from the outside of SPring-8 campus. Computer network for SPring-8 machine control is strictly protected by firewalls from the internet. When a machine expert get a phone call from the operation crew at troble, he/she can access computers "making a tunnel" in the firewall with WARCS system. There are several tunnel tools available in the market, but we could not find one to meet our requirements. Requirements are as follows. 1.The experts can access under shift leader's permission. 2. No system access to the gateway server from outside. 3. Only one server account. 4. Easy operation. We build our own tunneling tool, WARCS, to satisfy above requests with combination of linux firewall system (iptables), secure ip tunnel program (Zebedee), http server (Apache), database program (SQLite) and glue scripts (python). We build client programs for multi operation system (Windows, Macintosh and Linux). WARCS deployed at the beginning of 2004. Since the it has been successfully operated safely.
      Speaker: Dr Akihiro Yamashita (SPring-8)
      Slides
    • 15:30 15:45
      Coffee Break 15m
    • 15:45 16:15
      Secure Remote Operation of Light Source Beamline Controls with FreeNX 30m
      In light source beamlines, there are times when remote operations from users are desired. This becomes challenging, considering cybersecurity has been dramatically tightened throughout many facilities. Remote X-windows display to Unix/Linux workstations at the facilities, either with straight x traffic or tunneling through ssh (ssh -XC), is quite slow over long distance, thus not quite suitable for remote control/operations. We implemented a solution that employs the open source FreeNX technology. With its efficient compression technology, the bandwidth usage is quite small and the response time from long distance is very impressive. The setup we have, involves a freenx server configured on the linux workstation at the facility and free downloadable clients (Windows, Mac, Linux) at the remote site to connect to the freenx servers. All traffic are tunneled through ssh, and special keys can be used to further security. The response time is so good that remote operations are routinely performed. We believe this technology can have great implications for other facilities, including those for the high energy physics community.
      Speaker: Mr Zhijian Yin (Brookhaven National Lab)
      Slides
    • 16:15 16:45
      Accelerator Control-System Network Security at Diamond Light Source 30m
      Diamond is a new third-generation light source, which has only recently been completed near Oxford in the UK. As a new facility, it was possible to implement an 'isolated' accelerator control system network right from the start of operation. Of course, isolating the network leads to inevitable usability issues. This presentation will give an overview of Diamonds control network, the trade-offs between security and usability that have been made and plans for improving security in the future.
      Speaker: Dr Mike Leech (Diamond Light Source)
      Slides
    • 16:45 17:15
      Control System Cyber-Security in Industry 30m
      HEP is not that particular with respect to control system cyber-security. Many standards have been already developed in Industry and by governmental agencies. This presentation will give a short summary of the efforts going on outside HEP.
      Speaker: Dr Stefan Lueders (CERN)
      Slides
    • 17:15 18:00
      Discussion 45m
      Speaker: Dr Stefan Lueders (CERN)