Sunday, January 28, 2018
IoT Security: Essential Requirements
Friday, January 26, 2018
Real technology needs
Monday, January 15, 2018
IoT Security - accept and handle failure
Tuesday, January 02, 2018
IoT Security - a primer
Requirement
/ Attribute
|
Objective
|
Availability
|
Ensures that
data is timely and reliable available to authorized entities when it is
needed
|
Integrity
|
Protect data
from modification without authorization to ensure accuracy and completeness
|
Confidentiality
|
Protect
disclosure and data access from unauthorized entities
|
Information
and Data Privacy
|
Management
of data according to legal regulations and public expectations
From an
individual perspective, privacy is the right to control what information may
be collected, processed and stored and by what entity, and to whom that
information may be disclosed.
|
Saturday, December 30, 2017
Monday, December 18, 2017
We do read a lot about Artificial Intelligence (AI) these days. AI seems to get in nearly everything. Just pick the right chip and you can put the AI sticker on your product. But is it really that easy? Where is the difference between AI and Machine Learning? And, is the term Intelligence the correct notion anyhow to describe a computer based system? Is it a qualitative or quantitative property?
Depending on the answer, is it something we can measure?
Would it be feasible to create a questionnaire for machines to found out about AI?
Thursday, January 27, 2011
Security Architecture – moving forward with an approach to outline a framework
It is a key success criteria in system development and architecture to improve and extend models, procedures and underlying frameworks. This is especially needed when it comes to cyber security of complex systems. I started recently to improve my framework for a robust security architecture. Many stakeholders tend to start with the details in such complex systems which may result in missing overall requirements and ramifications. Security in the scope of vast, distributed systems needs to be specified, designed, implemented and operated based on a solid framework – let’s call it a Security Architecture. I have seen many approaches in order to cover this tricky task. Many of them tend to be too complex. Unfortunately, complexity is not a driver for security (in contrast to simplicity). On the other hand, it’s a tough job to keep the Security Architecture for huge systems simple. Beside the need for a simple approach, transparency and clearness in the scope of Security Architecture are important attributes that should be addresses as key-objective. Security controls need to be structured and encapsulated in the relevant components of the Security Architecture in a clear and traceable manner. I prefer a structure consisting of the following main components:
- Security Infrastructure [ Communication and Network Security, Perimeter Security, …]
- System Security Services [ Access Control, Identity Management, Credential Management, Audit, Backup and Recovery, …]
- Application Security [ Operation Systems, Databases, Web and Application Server, SaaS, Enterprise Applications, Collaboration, and Messaging, … ]
- Service Security [ System Maintenance, System Operation, Change Management, Incident Management, Event Management and Forensics, Stakerholder & User Feedback, ...]
- Security Management [ Policies and Roles, Risk Management, Training and Awareness, Secure Coding, Design Principles, Algorithms]
Monday, January 10, 2011
Fachtagung Informationssicherheit im Netz- und Anlagenbetrieb der elektrischen Energieversorgung
TC 57 / WG 15 und IEC 62351
Intro
§ Die Working Group 15 (Data and Communication Security) ist im Rahmen des IEC innerhalb des TC 57 tätig.
§ Das TC 57 [Technical Committee] trägt den Titel “POWER SYSTEMS management and associated information exchange”.
§ Das TC 57 entwickelt internationale Standards für Energie-systeme (EMS, SCADA, DA, Teleprotection und andere):
http://tc57.iec.ch/index-tc57.html
§ Die WG 15 …
… hat ca. 55 Mitglieder und trifft sich zweimal im Jahr.
… ist für die Standards IEC 62351 (Part 1-8) federführend.
… ist für die Security von Protokollen innerhalb des TC 57 verantwortlich (z.B.: IEC 61850, ICCP/TASE.2).
… adressiert auch das Thema End-to-End Security!
TC 57 / WG 15 und IEC 62351
IEC 62351: Inhalt der Teile 1 bis 8 im Überblick
§ Part 1: Einführung (Übersicht zum Thema Cyber Security, Besonderheiten innerhalb der TC 57 Domäne)
§ Part 2: Begrifflichkeiten (Glossary, Ziel: besseres Verständnis basiert immer auf einheitlicher Terminologie)
§ Part 3: Security für Protokolle mit Profilen beruhend auf TCP/IP (z.B.: ICCP/TASE.2, IEC 61850 Client/Server)
§ Part 4: Security für Protokolle mit Profilen beruhend auf MMS [Manufacturing Messaging Specification] (z.B.: ICCP/TASE.2)
§ Part 5: Security für Protokolle der Reihe IEC 60870-5 u. Derivate
§ Part 6: Security für IEC 61850 (GOOSE, SV, MMS), SNTP (RFC 2030) und VLAN [Virtual Local Area Network] Technologien
§ Part 7: Security MIB’s [Management Information Base] für Netzwerk- und Systemmanagement (à TC 57 spezifische MIBs)
§ Part 8: RBAC [Role Base Access Control] für Energiesysteme
(à Rechte, Rollen, Access Control)
TC 57 / WG 15 und IEC 62351
WG 15: Kooperation, Interaktion, Wahrnehmung
§ Die Standards der Reihe IEC 62351 werden in Dokumenten und anderen Standards als relevant für die Security in der Energieversorgung und im Rahmen von Smart Grids erwähnt (Beispiele: NIST, IEC SG3 Roadmap).
§ Das NIST hat IEC 62351 kommentiert (Änderungen erforderlich).
§ Das NIST hat FERC die IEC 62351 Standards als relevant für Cyber Security empfohlen.
§ Die Umsetzung in Produkten ist momentan eher überschaubar.
§ Es gibt eine Vielzahl von Kooperationen und Koordinationen mit anderen Organisationen (z.B.: IEEE, CIGRE, ISA, ISO, …).
§ Mitglieder der WG 15 arbeiten aktiv an Standards wie NERC CIP und NIST IR 7628 „Guidelines for Smart Grid Cyber Security” mit.
TC 57 / WG 15 und IEC 62351
WG 15: Aktivitäten und Ausblick
§ Mehrere Teile des Standards werden momentan überarbeitet und angepasst. (à Machbarkeit, Cipher Suites)
§ Die WG-15 spezifiziert die Security für den Standard 61850-90-5 (“Use of IEC 61850 to transmit synchrophasor information”) mit dem Ziel eines Technical Reports.
§ Die WG-15 arbeitet weiterhin an einem Technical Report (“Security Architecture Guidelines”).
§ Geplante Aktivitäten:
§ Der Teil 9 “Schlüsselmanagement” ist momentan im Status eines NWIP [New Work Item Proposal].
§ Unterstützung der WG-10 (à IED, IEC 61850) bei der Definition der “Security für System Management”.
§ Eventuell Unterstützung des NIST zum Thema “Security Requirements for Field-Deployed Devices” (à IED, Zähler)
TC 57 / WG 15 und IEC 62351
Finale
Vielen Dank für Ihre Aufmerksamkeit!
Dipl.-Ing. Maik G. Seewald
[maseewal@cisco.com]
Frankfurt am Main, 20-Januar-2011
Fachtagung Informationssicherheit im Netz- und Anlagenbetrieb der elektrischen Energieversorgung
Fachtagung Informationssicherheit im Netz- und Anlagenbetrieb der elektrischen Energieversorgung
TC 57 / WG 15 und IEC 62351
Intro
§ Die Working Group 15 (Data and Communication Security) ist im Rahmen des IEC innerhalb des TC 57 tätig.
§ Das TC 57 [Technical Committee] trägt den Titel “POWER SYSTEMS management and associated information exchange”.
§ Das TC 57 entwickelt internationale Standards für Energie-systeme (EMS, SCADA, DA, Teleprotection und andere):
http://tc57.iec.ch/index-tc57.html
§ Die WG 15 …
… hat ca. 55 Mitglieder und trifft sich zweimal im Jahr.
… ist für die Standards IEC 62351 (Part 1-8) federführend.
… ist für die Security von Protokollen innerhalb des TC 57 verantwortlich (z.B.: IEC 61850, ICCP/TASE.2).
… adressiert auch das Thema End-to-End Security!
TC 57 / WG 15 und IEC 62351
IEC 62351: Inhalt der Teile 1 bis 8 im Überblick
§ Part 1: Einführung (Übersicht zum Thema Cyber Security, Besonderheiten innerhalb der TC 57 Domäne)
§ Part 2: Begrifflichkeiten (Glossary, Ziel: besseres Verständnis basiert immer auf einheitlicher Terminologie)
§ Part 3: Security für Protokolle mit Profilen beruhend auf TCP/IP (z.B.: ICCP/TASE.2, IEC 61850 Client/Server)
§ Part 4: Security für Protokolle mit Profilen beruhend auf MMS [Manufacturing Messaging Specification] (z.B.: ICCP/TASE.2)
§ Part 5: Security für Protokolle der Reihe IEC 60870-5 u. Derivate
§ Part 6: Security für IEC 61850 (GOOSE, SV, MMS), SNTP (RFC 2030) und VLAN [Virtual Local Area Network] Technologien
§ Part 7: Security MIB’s [Management Information Base] für Netzwerk- und Systemmanagement (à TC 57 spezifische MIBs)
§ Part 8: RBAC [Role Base Access Control] für Energiesysteme
(à Rechte, Rollen, Access Control)
TC 57 / WG 15 und IEC 62351
WG 15: Kooperation, Interaktion, Wahrnehmung
§ Die Standards der Reihe IEC 62351 werden in Dokumenten und anderen Standards als relevant für die Security in der Energieversorgung und im Rahmen von Smart Grids erwähnt (Beispiele: NIST, IEC SG3 Roadmap).
§ Das NIST hat IEC 62351 kommentiert (Änderungen erforderlich).
§ Das NIST hat FERC die IEC 62351 Standards als relevant für Cyber Security empfohlen.
§ Die Umsetzung in Produkten ist momentan eher überschaubar.
§ Es gibt eine Vielzahl von Kooperationen und Koordinationen mit anderen Organisationen (z.B.: IEEE, CIGRE, ISA, ISO, …).
§ Mitglieder der WG 15 arbeiten aktiv an Standards wie NERC CIP und NIST IR 7628 „Guidelines for Smart Grid Cyber Security” mit.
TC 57 / WG 15 und IEC 62351
WG 15: Aktivitäten und Ausblick
§ Mehrere Teile des Standards werden momentan überarbeitet und angepasst. (à Machbarkeit, Cipher Suites)
§ Die WG-15 spezifiziert die Security für den Standard 61850-90-5 (“Use of IEC 61850 to transmit synchrophasor information”) mit dem Ziel eines Technical Reports.
§ Die WG-15 arbeitet weiterhin an einem Technical Report (“Security Architecture Guidelines”).
§ Geplante Aktivitäten:
§ Der Teil 9 “Schlüsselmanagement” ist momentan im Status eines NWIP [New Work Item Proposal].
§ Unterstützung der WG-10 (à IED, IEC 61850) bei der Definition der “Security für System Management”.
§ Eventuell Unterstützung des NIST zum Thema “Security Requirements for Field-Deployed Devices” (à IED, Zähler)
TC 57 / WG 15 und IEC 62351
Finale
Vielen Dank für Ihre Aufmerksamkeit!
Dipl.-Ing. Maik G. Seewald
[maseewal@cisco.com]
Frankfurt am Main, 20-Januar-2011
Fachtagung Informationssicherheit im Netz- und Anlagenbetrieb der elektrischen Energieversorgung
Wednesday, December 22, 2010
Tuesday, December 14, 2010
Tuesday, October 19, 2010
Friday, October 15, 2010
Security must be based on a solid (security) architecture
Wednesday, July 28, 2010
Robustness and resilience of large distributed applications and networks
In the area of clouds and large distributed automation and control networks, we need to deal with a vast number of (growing) endpoints integrated in the (dynamic) system. It is probably a misconception to assume that all these peers could be protected comprehensively at any time. Hence, it must be an important objective that the protection of the entire system must not depend on the security status (pertaining integrity, confidentiality and availability) of each and every endpoint. In other words, a compromised node must not affect or infect the stability and protection of the entire distributed system. This shall be adressed in the system and security architecture and needs to be defined (and tested !) as a crucial requirement. A (layered) defense in depth, as a general design principle, can help to meet this requirement. In addition, intrusion detection, prevention and a quick isolation of the compromised node can help to minimize the overall impact. Plan for failure is the underlying principle to implement this efficiently. Beside these classical security precautions and controls, a robust design as well as adequate redandancy mechanisms for critical subsystems can support the system stability.
Tuesday, June 22, 2010
Security in large distributed networks (aka Smart Grids)
Wednesday, June 02, 2010
Test your security!
- Document all functional and non-functional requirements and develop use case scenarios base on it (a picture helps a lot !)
- Invite security professionals for support and guidance
- Conduct a comprehensive threat assessment based on a well documented system architecture and (preferable) a security architecture (invite all relevant stakeholders: product management, architects, developer, test folks, …)
- The architecture must support flexible patch and update management
- Review the resulting design, at least the security relevant components
- Check on all 3rd party components in detail to identify known weaknesses; if so, look for alternatives
- Provide and teach (!) secure coding and secure design principles to the team
- Make sure that the team has enough time to learn and to apply such rules and principles (project management must plan accordingly!)
- Test all functional security requirements accoring to your test specification (use well documented requirements and use case scenarios to specify test cases)
- Use tools to check your code to identify flaws and derivations from your guidelines mentioned above
- Apply code review if tools are not sufficient
- Use a realistic test environment (set up) to run a kinda black box test based on tools (fuzzer, etc.)
- Test especially all user interface (focus on web based interfaces) as well as communication stacks
- Document all testing results and establish a rating based on criticality
- Communicate and share your experience
Friday, April 23, 2010
Divide and Protect
Divide and protect is one option to secure large distributed systems. The concept of Divide and Protect is about the compartmentation of a system into functional blocks with identical requirements in terms of security and privacy. It supports a defense in depth strategy, and it helps to handle the complexity of large installations. The compartmentation of a given system leads to security zones with different levels of trust that should be outlined in a digram. Based on such diagram (red = not trusted, .., green = trusted), the system architecture can be developed in a comprehensive manner. This is especially true for the communication architecture and the selection of appropriate protocols. By using this approach, non-functional requirements can be addressed in the early beginning of the product development process which means no change (requests) later on.
Thursday, January 21, 2010
Failure is an option
Tuesday, November 24, 2009
Success criterions for development projects
- Precise, high quality requirements based on strong user involvement
- A motivated and skilled team with the ability to learn constantly
- Flexible and realistic project management
- An open and innovative environment which understands the fact that software development is a heuristic process and which accepts failure
Saturday, October 31, 2009
Security Architecture – an approach to outline a framework
- Security Infrastructure [ Communication and Network Security, Perimeter Security, …]
- System Security Services [ Access Control, Identity Management, Credential Management, Audit, Backup and Recovery, …]
- Application Security [ Operation Systems, Databases, Web and Application Server, SaaS, Enterprise Applications, Collaboration, and Messaging, … ]
- Service Security [ System Maintenance, System Operation, Change Management, Incident Management, Event Management and Forensics, …]
- Security Management [ Policies and Roles, Risk Management, Training and Awareness, … ]