SCADA Xom 1
SCADA Xom 1
Agenda
What is ICSR Scope - ICSE Brief history Paradigm Shift ICSR Sections Lessons Learned from Cold Eyes Review Defense in Depth: The Layers of Security
WHAT IS ICSR
is a global standard for Process Control Systems Security merges OIMS expectations and SMC standards as they relate to Industrial Control Systems Environment (ICSE) provides requirements for cost-effective risk-reduction controls and associated procedures that reduce risk to acceptable levels Applies to the ICSE in the following ExxonMobil business units - Downstream Refining (excluding JV not operated by EM) - Downstream Pipeline North American Operations - Chemicals Manufacturing (excluding JV not operated by EM) - Upstream Production Company - Upstream Development Company - Lubricants and Petroleum Specialties Has been recently endorsed and approved by Robert Olsen, Executive VP for Production, August 2008
3
SMC
CIMS
040-009 Systems Computing & Networks
OIMS
MAP
Measurement & Analysis for Production
ICSR SCOPE:
Industrial Control Systems Environment (ICSE)
L4 Business Network
Internet
L3 Advanced Control
L2 Supervisory Control
L3 Backbone Switch Standalone System L1/L2 Workstation L2 DCS Server L2/L3 Network Control Point Subsystem Server Subsystem Workstation
L1/L2 Subsystem Network (PLC, EHM, TGS, Metering, Analyzer, Subsea, Ballast Control, etc)
L1 Basic Control
Packaged System
Metering
Process
L0 Field Devices
L1 Basic Control
In Scope
Protective System
PS Switch
10
ICSR SECTIONS
1. Management Leadership, Commitment and Accountability 2. Risk Assessment and Management 3. Facilities Design and Construction 4. Information Availability and Protection 5. Personnel and Training 6. Operation and Maintenance 7. Management of Change 8. Third Party Services 9. Incident Investigation and Analysis 10. Community Awareness and Emergency Preparedness 11. Assessment and Improvement 12. Control System Networks 13. Operating Systems
11
12
13
14
15
16
17
Management of change
7.1 Management of Change
18
19
20
21
22
23
Operating systems
13.1 13.2 13.3 13.4 13.5 13.6 Operating System Setup Naming Conventions Windows Domains Security Policies Virus Protection Operating Patches and Security Updates
24
ICSR SECTIONS
1. Management Leadership, Commitment and Accountability 2. Risk Assessment and Management 3. Facilities Design and Construction 4. Information Availability and Protection 5. Personnel and Training 6. Operation and Maintenance 7. Management of Change 8. Third Party Services 9. Incident Investigation and Analysis 10. Community Awareness and Emergency Preparedness 11. Assessment and Improvement 12. Control System Networks 13. Operating Systems
25
Planning and Coordination: Scheduled CER 2 mos. prior to PUs Audit Requested Network Diagrams, Equipment Inventory, Gap Analysis Met with PU contact to discuss technical scope, review scope and logistics Developed review schedule Met with CER team to finalize schedule, technical scope, review scope, CER strategy, areas of responsibilities Sent documentation request to PU contact
Total # of Production Units (PU) evaluated: Total # of PU sites visited (~ 2.5 sites per PU): Timeline: 13 33 6 mos.
26
27
A comprehensive controls evaluation and analysis takes into consideration the following:
Internet Network Control Point
Internet
L4 Desktop
L3 Control Systems Network L3 Backbone Switch L2/L3 Network Control Point Subsystem Server Subsystem Workstation
Modem
DCS Controller
L1/L2 Subsystem Network (PLC, EHM, TGS, Metering, Analyzer, Subsea, Ballast Control, etc)
Packaged System
In Scope
Process
Protective System
PS Switch
March 7, 2008 - Hatch Nuclear Power Plant Shutdown (US) A nuclear power plant in Georgia was recently forced into an emergency shutdown for 48 hours after a software update was installed on a single computer. The trouble started after an engineer from Southern Company, which manages the technology operations for the plant, installed a software update on a computer operating on the plant's business network. October 2006 Harrisburg Water Systems Incident (US) An infected laptop PC gave hackers access to computer systems at a Harrisburg, Pa., water treatment plant . The plant's systems were accessed in early October after an employee's laptop computer was compromised via the Internet and then used as an entry point to install a computer virus and spyware on the plant's computer system. March 2007 TJMaxx incident, Believed Largest Hack ever (US) A hacker or hackers stole data from at least 45.7 million credit and debit cards of shoppers at off-price retailers including T.J. Maxx and Marshalls in a case believed to be the largest such breach of consumer information.
29
Questions?