atrc_website:scada_security_monitoring_service
Differences
This shows you the differences between two versions of the page.
| atrc_website:scada_security_monitoring_service [2022/07/20 12:29] – created wikiadmin | atrc_website:scada_security_monitoring_service [Unknown date] (current) – external edit (Unknown date) 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== ICS/SCADA Scanning ====== | ||
| + | |||
| + | |||
| + | Increasingly, | ||
| + | |||
| + | For most industrial environments, | ||
| + | |||
| + | For active scanning, we have ICS/SCADA Smart Scanning. This capability discovers and thoroughly assesses IT-based systems (e.g., supervisory, | ||
| + | |||
| + | **Measuring Cyber Exposure across the entire converged IT/OT environment** | ||
| + | |||
| + | With the combination of ICS/SCADA Smart Scanning and passive network monitoring, we safely measure Cyber Exposure across the entire converged IT/OT environment, | ||
| + | |||
| + | OT devices like programmable logic controllers (PLCs) and remote terminal units (RTUs) that monitor the activity and state of machinery (e.g., pumps, valves and motors) and environmental factors (e.g., temperature, | ||
| + | |||
| + | Limited CPU power: They can be overwhelmed by too many requests because they’re designed to do only one thing at a time and may be less powerful than tablets. | ||
| + | |||
| + | Real-time communications: | ||
| + | |||
| + | Design tradeoffs: OT devices are designed to be resilient to power disruptions, | ||
| + | |||
| + | Custom operating system and software: OT devices generally do not run widely used and widely tested operating systems, such as Windows or Linux. They may include a small HTTP server, but it is limited in feature set. When a vulnerability scanner attempts to check for SSL issues, the embedded HTTP server can crash. Since the device is only designed to do one thing at a time, this usually means the entire device reboots – causing costly downtime and potentially unsafe working conditions. | ||
| + | |||
| + | Set it and forget it: Unlike desktops, it may be months or years before someone looks at a physical OT device. It could be operating marginally, covered in dust and close to failure. The additional load of a full vulnerability scan can cause it to reach the overload point. | ||
| + | |||
| + | Because of the risk of degradation and/or disruption, the common practice within OT environments is to avoid using active scanning approaches with OT devices. Instead, passive monitoring is used, and because passive monitoring does not interact with the sensitive devices, the devices are not impacted by it. | ||
| + | |||
| + | IT/OT convergence has resulted in many IT-based systems being deployed in the OT environment. These IT-based systems may be Windows computers running human machine interface (HMI), SCADA monitoring and historian applications. Additionally, | ||
| + | |||
| + | Typically, these IT-based systems are discovered and assessed with active scanning because active scanning can deliver much deeper insight about installed software (and related vulnerabilities), | ||
| + | |||
| + | **Potential problem** | ||
| + | |||
| + | Ideally, sensitive OT would be logically separated from IT-based OT systems, such as Windows computers. However, in reality, such segmentation may not exist. The potential problem is that if an existing OT device’s IP address changes or a new OT device is added, and that device is not omitted from the active scan, the scan could cause an outage. So we have to be extra careful to make sure all devices are configured correctly before any scans. | ||
| + | |||
| + | **ICS/SCADA Smart Scanning** | ||
| + | |||
| + | ICS/SCADA Smart Scanning is a new attribute that is used. Existing scan parameters (e.g., IP ranges to be scanned/not scanned, ports, schedules and other settings) do not need to be modified. | ||
| + | |||
| + | **Fragile Devices OT Scan** | ||
| + | |||
| + | ICS/SCADA Smart Scanning cautiously identifies OT devices and stops scanning them once they’re discovered. | ||
| + | |||
| + | Here’s how it works: | ||
| + | |||
| + | Smart Scanning pings the IP address to determine if a device is using that address. | ||
| + | |||
| + | Smart Scanning runs probes against open known OT ports/ | ||
| + | |||
| + | * Siemens S7 | ||
| + | * Modbus | ||
| + | * BACnet | ||
| + | * Omron FINS | ||
| + | * Ethernet CIP | ||
| + | * 7T IGSS | ||
| + | * ICCP COTP | ||
| + | |||
| + | ICS/SCADA Smart Scanning reduces the types of scahs required against devices by 90%. This eliminates the scans that put the greatest load on the device, including HTTP and SSH testing. | ||
| + | |||
| + | For all OT port/ | ||
| + | |||
| + | |||
| + | **Note** | ||
| + | |||
| + | We cannot guarantee that ICS/SCADA Smart Scanning will not cause issues. Therefore, it should only be used after it has been tested with each device type in a laboratory environment and when it is known not to conflict with warranties and service agreements. | ||
| + | |||
| + | |||