You are on page 1of 2

Cyber Security And The

Byres
Pipeline Control System
By Eric J. Byres, P.Eng., Lantzville, BC, Canada

I
n the winter of 2002-2003, and MS-Word®, many control sys-
Venezuela found itself in the tems have unusual operating systems
grip of the largest and lon- and applications such as VxWorks or
gest strike in Latin American RSLogix™. This means that many of
history. Lasting from Dec. 2 the proven IT security solutions will
until Feb. 2, the strike paralyzed the not function correctly or, if they do
oil industry through work stoppages run, may interfere with the SCADA
and acts of sabotage. According to operations.
a published report at the time, Ali A good example of this was
Rodriguez, the head of Petróleos de reported at an ISA Industrial Security
Venezuela, S.A. (PDVSA), stated: Conference in Philadelphia a few
“[...] we have suffered many acts years ago. When an emergency shut-
of sabotage at the terminals, the down system on a boiler failed to
refineries, and even to some well- operate correctly, investigators dis-
heads in Lake Maracaibo. There covered that anti-virus software had
were even instances of computer been installed on the computer used
hacking which did a lot of damage to configure the safety system. This
since much of the operation is cen- Attack routes taken. In 75 incidents from 2002 to 2006, attackers and software blocked the proper opera-
trally controlled by computer.” viruses infiltrated SCADA systems via secondary pathways nearly tion of the safety system, putting the
Details of the cyber attacks on 50% of the time. (Source: Industrial Security Incident Database, June 2006) entire plant at risk. There was nothing
PDVSA’s systems were slow to wrong with the safety system or the
emerge, but it seemed that hackers were able settings to produce pressures far beyond those anti-virus software on their own, but together
to penetrate the SCADA system responsible acceptable to pipeline joints and welds.” they made a life-threatening combination.
for tanker loading at a marine terminal in By creating an explosion with the power of The result is that many IT departments
eastern Venezuela. Once inside, the hackers a three-kiloton nuclear weapon, the U.S. man- quietly wash their hands of a security respon-
erased the programs in the programmable aged to disrupt supplies of gas and consequen- sibility once a piece of network or computer
logic controllers (PLCs) operating the facil- tial foreign currency earnings of the Soviet hardware is attached to the SCADA network.
ity, preventing tanker loading for eight hours. Union for over a year. And if the SCADA operations/engineering
Fortunately for PDVSA, the tactics of attack- These instances of computer hacking were team doesn’t take up cyber security as its
ers were unsophisticated, making detection of the first public examples of the susceptibility responsibility, this leaves a nice gap that the
the problem relatively easy, and backups of of oil and gas operations to deliberate external hacker or virus can silently slip though.
the PLC programs were unaffected, making cyber attacks on control systems. For many
recovery straightforward. companies it forced a complete re-evaluation Wrong Assumptions
Two years later a book by Thomas Reed, of what cyber security meant when it came to Many managers also assume that all cyber-
senior U.S. national security official, made oil and gas SCADA-control systems. security problems arise from outside the com-
it clear that not all pipeline operators are so pany premises, generally from hackers. Next,
lucky. In his book, “At The Abyss,” Reed Misunderstanding The Risk they assume those problems that attempt to
reported how the U.S. allowed the USSR Internal surveys at several major oil compa- enter the company SCADA system come
to steal pipeline control software from a nies indicated that managers often misunder- through obvious pathways that can be man-
Canadian company. Unknown to the Russians, stand the situation they face when it comes to aged by a single Bastion Firewall between the
this software included malicious code (known SCADA security. First, many believe that the business network and the SCADA network.
as a Trojan horse) that caused a major explo- Information Technology (IT) group automati- Unfortunately, when problems originate from
sion of the Trans-Siberian gas pipeline in June cally looks after SCADA security as well. This within the company, as they often do, the
1982. The Trojan ran during a pressure test on is rarely the case. Bastion firewall does little to help, leaving the
the pipeline and massively increased the usual While IT departments are very good at pro- SCADA system an easy target for disruption.
pressure, causing the explosion. Reed writes: viding security for systems they understand, To understand where the Bastion model
“In order to disrupt the Soviet gas supply, its such as Windows® servers and accounting fails, it is helpful to look at an Internet worm
hard currency earnings from the West, and the databases, the critical control systems that run called the Slammer Worm and study how it has
internal Russian economy, the pipeline soft- the pipelines and refineries day in and day out affected control systems since its creation in
ware that was to run the pumps, turbines, and are forbidding beasts to the IT professional. 2003. According to records in the Repository
valves was programmed to go haywire, after a For example, instead of the typical IT operat- for Industrial Security Incidents (RISI), this
decent interval, to reset pump speeds and valve ing systems and applications like Windows® one worm has been responsible for more

58 Pipeline & Gas Journal / February 2009 / www.pgjonline.com


documented incidents of process disruption Control Systems Security Program,” approved Defense In Depth
than any other source. A few of its dubious and published recently by the American Sound strategy, regardless of whether
achievements include interrupting power dis- National Standards Institute (ANSI). This it is for military, physical or cyber secu-
tribution SCADA systems, infecting the safety readable standard lays out seven key steps rity, relies on the concept of “defense
parameter display system (SPDS) in a nuclear for creating a Cyber Security Management in depth.” Effective security is created
plant and curtailing oil production operations System (CSMS) for use on SCADA and con-
by layering multiple security solutions
in the Gulf of Mexico. trol systems.
What is particularly interesting is that the The steps in ISA-99.02.01 are divid- so that if one is bypassed another will
Slammer Worm has used at least five different ed into three fundamental categories: Risk provide the defense. This means not over-
pathways to get to its control-system victims. Analysis, Addressing Risk with the CSMS, and relying on any single technology such as
In one case it got into a petroleum control Monitoring and Improving the CSMS. The first a firewall. Firewalls aren’t bad technol-
system via a maintenance laptop that was used category lays out the stages a company needs ogy. In fact, they are a fantastic tool in
at home (and infected) and then brought into to follow to both assess its current security the security toolbox. But, industry has
the plant. In another case it infected a paper situation and determine what security goals it misused them by believing they will solve
machine human machine interface (HMI) via wants to achieve. all security ills.
a dial-up modem that was used for remote sup- The second category outlines the processes Defense in depth begins by creating
port. In the third case it passed right through to define security policy, security organization
a proper electronic perimeter around
a poorly configured firewall. In all these and security awareness in the company and
examples there were firewalls in place, but the provides recommendations for security coun- the SCADA or control system and then
worm either bypassed them by using a second- termeasures to improve SCADA security. The hardening the devices within. The secu-
ary pathway, or it took advantage of some flaw core idea in this section is a concept known as rity perimeter for the control system is
in the firewall’s deployment. Defense-in-Depth, where security solutions are defined both by policy and technology.
Slammer is just one example. An analysis of 75 carefully layered to provide multiple hurdles to First, policy sets out what truly belongs
security incidents against control systems between attackers and viruses. on the control system network and what
2002 and 2006 shows that more than half the The final category describes methods to is outside. Next, a primary control-system
external attacks come through secondary pathways make sure a SCADA system not only stays firewall acts as the choke point for all
such as dial-up connections, wireless systems and in compliance with the CSMS but follows a
traffic between the outside world and the
mobile devices. In these cases, the firewall did its continuous improvement program.
control system devices.
job, but the security strategy failed.
More Than Just Once the electronic perimeter of the
The Leaky Data Pipeline Improved Security control system is secured, it is necessary to
The third cause of SCADA insecurity is The benefits for oil and gas companies that build the secondary layers of defense on the
a flaw in SCADA network design. For many have followed the ISA-99.02.01 program (or a control system itself. Control components
years, just keeping systems communicating similar program) extend far beyond just reduc- like HMIs and data historians that are based
was a primary challenge for the SCADA engi- ing the possibility of attack from a hacker on traditional IT-operating systems such as
neer. Communications technology was expen- or virus. By cleaning up both the corporate
Windows and Linux should take advantage
sive and rather unreliable, so any network that processes concerning SCADA systems and
better managing the actual traffic on the con- of the proven IT strategies of patch and anti-
promised to solve these issues was welcome.
trol system networks, many companies have virus management. However, this requires
The emergence of Ethernet, TCP/IP and Web
technologies radically changed this equation. realized significant improvements in overall prior testing and care.
The result was the creation of “control system reliability. For devices like PLCs and SCADA
networks” that acted as common pathways for One senior manager of a European oil com- controllers — where patching or anti-
all industrial control communications. When pany recently noted that each time they put a virus solutions are not readily available
a new control application needed a network refinery through a SCADA security-improve- — most security experts
to transport its data on, too often the answer ment program, the increase in production recommend the use
was “we’ll connect it to the control network.” reliability justifies the cost of industrial security
Within a few years, any clear understanding of the security program
appliances. This rap-
of exactly what devices were attached to most alone. The increased
security ends up being idly evolving security
corporate “control networks” or what traffic
just an extra benefit. solution deploys low-
was traveling over the network, was impos-
sible. For example, after one U.S. refinery On the other hand, cost security modules
conducted an analysis of it control systems failure to adapt corporate directly in front of each
traffic as part of security review, the systems SCADA systems to the group of control devices
manager commented: changing threats and vul- needing protection. The
“We discovered misconfigured comput- nerabilities of the cyber security modules then
ers and devices generating traffic that never world will leave compa- provide tailored security
should have been on our control system.” nies exposed to increas-
services like “personal
Like an unattended pipeline in a third-world ing numbers of secu-
rity incidents. The con- firewalling” and mes-
country, well-intentioned staff had been “tap- sage encryption to the
ping” into the control system network for sequences unfortunately
could include a marred otherwise unprotected
years to add or access network traffic. Over
time the result was an unreliable and insecure reputation, environmental control devices. 䡲
SCADA system. releases, production and
financial loss, and per-
haps even human injury Low-cost industrial
Getting SCADA security appliances are
Security Under Control or death. P&GJ
designed to protect
How does a company ensure its SCADA Author: Eric Byres, SCADA and control
system is secure? The answer is spelled out in P.Eng., is chief technology devices by providing
a new standard called “ISA-99.02.01, Security officer of Byres Security defense-in-depth protec-
for Industrial Automation and Control Systems: Inc., Lantzville, BC, Canada. tion. (Source: Honeywell)
Establishing an Industrial Automation and He can be reached eric@ByresSecurity.com.

Pipeline & Gas Journal / February 2009 / www.pgjonline.com 59

You might also like