Checkpoint Firewall OT ICS Solution For CI and Industrial
Checkpoint Firewall OT ICS Solution For CI and Industrial
Mati Epstein
Global sales manager
Critical Infrastructure and ICS
… and we rely on it every day for our basic functions and needs.
©2016 Check Point Software Technologies Ltd. 2
Facts and Reality
Dec 2014
German Steel Mill was hacked by Spear Phishing – Massive damage to
the factory
Dec 2015
Blackout across western Ukraine due to BlackEnergy Spear Phishing
malware attack (And again on January 19th)
March 2016
Hackers breached a water utility’s control system and changed the levels
of chemicals being used to treat tap water (Kemuri Water Company)
(Cyberscoop)
December, 2017 Triton Malware - Affecting S.E. Triconex Safety Controllers, which are
used widely in critical infrastructure . Threat actors deployed malware
capable of manipulating emergency shutdown systems
(Schneider Electric)
Critical
Manufacturing
22%
Transportation
Systems 5%
Government
Communication Facilities 6%
21%
Water
6%
Energy 20%
ATTACKERS?
State Actors EXAMPLES OF
BlackEnergy, CrashOverride INDUSTRY ATTACKS
OVER THE
PAST YEARS
Insiders
Maroochy County Sewage
Teenagers
Lodz Tram
Activists
Operation Green Rights
©2016
©2016 Check
CheckPoint
Point Software
Software Technologies
TechnologiesLtd.
Ltd. 6
Why Are These Attacks Possible?
Secure Both
Clear Segmentation between
OT and IT OT and IT/Internet
Environments
Deploy Specialized ICS/SCADA
Security Technologies
Ruggedized
Visibility of Enforcement of SCADA-Aware Appliances for
ICS/SCADA Traffic ICS/SCADA Traffic Threat Prevention Harsh
Environments
Network
Control Network Traffic
Level 0
Field Devices
OPC
CIP
IoT DA & UA
MMS Profinet
IEC 60870-5-104
BACNET
Siemens
Step7
Ruggedized
Visibility of Enforcement of SCADA-Aware Appliances for
ICS/SCADA Traffic ICS/SCADA Traffic Threat Prevention Harsh
Environments
Pre-defined Anomaly
Policies Detection
Combined Enforcement of
Pre-Defined + Anomaly-Based analysis
©2016 Check Point Software Technologies Ltd. 20
Setting the Baseline
Granular level logging of SCADA traffic –
DETAILED
Detailed forensics for
incident investigations
ANALYZED
by
Check Point
SMARTLOG &
SMARTEVENT
GROUPED
Ruggedized
Visibility of Enforcement of SCADA-Aware Appliances for
ICS/SCADA Traffic ICS/SCADA Traffic Threat Prevention Harsh
Environments
NSS Labs
Highest Rating
Ruggedized
Visibility of Enforcement of SCADA-Aware Appliances for
ICS/SCADA Traffic ICS/SCADA Traffic Threat Prevention Harsh
Environments
• CrashOverride malware is an extensible platform that could be used to target critical infrastructure sectors,
specifically using IEC104 and IEC61850 protocols.
̶ The malware issues valid commands directly to RTU’s.
̶ Using Check Point protocols visibility and baselining would detect and alert on None-Baseline protocols and commands
• Could exploit Siemens SIPROTEC relay denial-of-service (DoS) vulnerability, leading to a shutdown of the
relay.
̶ Using CVE-2015-5374 to Hamper Protective Relays
̶ Check Point published on June 20th an IPS signature for virtual patching protection of the DoS vulnerability
AAD
HMI
1200R 1200R
Main Control
AAD
Center
SCADA
Server
HMI
HVAC
Lighting
Elevators
Water
Perimeter DPI of BMS
Segmentation Protocols
Functional Zone
Segmentation SCADA/IoT And more…
MQTT, BACNET
Security
NAC
Gateway
MQTT Over Ethernet
SCADA
Server Building
BACNET WLAN /
Control Network
LAN
ICS Visibility
Elevator AC Water
Protocol ?
Company’s service
center
Building
Security
Gateway
IED
Backup Site
SCADA
Server
Smart Event
Data
Center
that it easily fit in every • Gained high availability and reliability across integrated
security infrastructure
environment we needed to • Increased security team efficiency and effectiveness through
place it.” single-pane-of-glass management
• Created a robust incident response plan for the entire
company
Based in Ramsey, Minnesota, Connexus Energy is — Melissa Kjendle, Cybersecurity
Minnesota’s largest electric cooperative. and Senior Infrastructure Analyst
2
MPLS
3
Server
High
PLC
MODBUS
Smart Event Availability
Data
Center
IT Zone
1200R
Communication cloud PLC
Ethernet/IP/MPLS
MODBUS
SCADA Cellular
Server
Smart Event
Data
Center
1200R
MODBUS
PLC
VPN
Compagnie Nationale
du Rhone
PLC PLC
MODBUS
MODBUS
SCADA Server
OPC
PLC
Management integration
With Leading SIEM systems:
Q-Radar, ARCSight, Splunk
And more like Predix and
others
REPORTED
by
Check Point
Real-time assessment of
COMPLIANCE BLADE compliance with major regulations
Enforcement
Detection - Identify Deviations and Attacks / Anomaly Detection
Based on the defined rules, time of day, attack patterns, Behavior deviation
Check Point offers complete security suite from Mobile, End-Point to the
Cloud – including Private cloud for separation of IT from OT