© Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC....

24
© Copyright 2012 OSIsoft, LLC. 1

Transcript of © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC....

Page 1: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC. 1

Page 2: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

Presented by

© Copyright 2012 OSIsoft, LLC.

Have you done enough with Cyber Security?

Bryan Owen, OSIsoft Joel Langill, SCADAhacker

Page 3: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Agenda

Moore’s Law

Attack Patterns and Demo

Domain Services in a DMZ

3

Page 4: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

HD Moore’s Law

Corollary: Metasploit won’t tell you you’ve done “enough” but it just might prove if you haven’t.

4

Page 5: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Anatomy of an Attack Information Gathering

Covering Tracks

Maintaining Access

Turning point … When a threat becomes an attack!

Gaining Access

Scanning Enumeration

Fingerprinting

5

Page 6: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Source: US DHS Control System Security Program Cyber Security for Control Systems Engineers and Operators

Attack Process Attacker

6

Page 7: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Metasploit

Client Side Infection

Credentials or Hashes

Remote Exploit

Escalate Privileges

Dump Hashes

Take Control

Port forwarding and routing through compromised target

Pivot

Mission Objective

Pivot Attacks

7

Page 8: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Pivot using “Pass the Hash”

fn(Hash,Challenge)

Request Access

Random Challenge

LMhash=fn(“password”) NThash=fn(“password”)

Stolen hash is as good as a password! Windows password hashes are protected except: •  Administrators and users with ‘Debug programs’ rights •  Processes with ‘Act as part of the operating system’ rights

8

Page 9: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC. 9

Page 10: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Finding the ‘Right’ Balance •  Access to Information, Ease of Administration

–  Many companies are moving the direction of a “single sign-on” or SSO approach

–  Authentication and Credential Management remain as a top vulnerability within manufacturing systems

•  Network segmentation, Domain services –  Enterprise and control are often separated by a “DMZ” network –  Administration, Cost and Compliance burden are top concerns

10

Page 11: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Control

DMZ

Manufacturing Info Data Flow

Office

High Levels of Authentication

Little or No Authentication

Consumer 1

Producer 1 + Consumer 2

Producer 2 + Consumer 3

Producer 3

ENTERPRISE “ZONE”

PRODUCTION “ZONE”

11

Page 12: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

DMZ

Trust and the 3-Zone Model Office

Control

O-Users Resources for O/D

Resources for O/C

C-Users O-Users “SSO” Resources for C

Trusted

Trusted

Trusting (Explicitly Managed)

Select O-Users Authenticated in C against C-Resources

O-Users Authenticated in O against D-Resources

C-Users Authenticated in C against D-Resources Trusted

12

Page 13: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Network Segmentation Standards DHS CSSP, ISA 99, NERC CIP, NIST 800-82

13

Page 14: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

PI System DMZ Practices •  Terminate cross boundary traffic in DMZ

–  No thru traffic bypass exceptions –  Block DMZ to internet –  Restrict local logons and RDP

•  Control network –  PI Interface node with buffering –  Minimize office and web protocols –  Monitor DMZ traffic –  Separate logon authority

14

Page 15: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Considerations for Authentication •  Active Directory Domains and Forests

–  Levels of Autonomy (trust) vs Isolation (no trust) –  Differences in Group Policies –  Separation of “General” & “Administrative” Rights

•  Network –  Active Directory Replication (Global Catalog Integrity) –  Kerberos or NTLM

15

Page 16: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

SSO Authentication Options 1.  Synchronized Credentials (Password Managers)

2.  Integrated Forest – Single Domain

3.  Integrated Forest – Unique Domains

4.  Unique Forests

16

Page 17: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE FORESTS

Single Account to Manage No Yes Yes

Password Hashes Shared between Office/Production 2 1 n/a – Tickets

Segregation of Administrative Rights Yes No Yes

Trust Transitivity between Office/Production Domains n/a Transitive Non-Transitive

Trust Definition between Office/Production n/a Implicit Explicit None

Trust Direction n/a 2-way 1-way

Scope of Authentication Local Any Domain in Forest

Any Domain in Forest

Global Catalog / Schema n/a 1 2

Replication across Firewall n/a Yes No

Replication Requirements (DC to DC) 2 tcp / 2 udp 9 tcp / 3 udp (2003) 10 tcp / 6 udp (2008) 1 tcp / 1 udp

17

Page 18: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC. 18

Page 19: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC. 19

Page 20: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Call to Action •  Restrict access with DMZ and AD domain services

•  Caution on use of administrator accounts

•  Maintain applications, operating system, and network

•  Decide on an approach you can sustain –  Involve subject matter experts in your process

20

Page 21: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

[email protected] ICS Security Specialist SCADAhacker

Bryan Owen Joel Langill

Jim Davidson @bryansowen @davijim @SCADAhacker

[email protected] Cyber Security Manager 510-347-2630

[email protected] Security Products Manager 208-520-2806

21

Page 22: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Additional References •  Active Directory Replication Over Firewalls

http://social.technet.microsoft.com/wiki/contents/articles/active-directory-replication-over-firewalls.aspx

•  How to Configure a Firewall for Domains and Trusts http://social.technet.microsoft.com/wiki/contents/articles/active-directory-replication-over-firewalls.aspx

•  Active Directory Domain Services in the Perimeter http://technet.microsoft.com/en-us/library/dd728034(WS.10).aspx

•  Windows Security Requirements for PI Server 3.4.380.36 and later (OSIsoft KB00354)

22

Page 23: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC.

Brought to you by

Page 24: © Copyright 2012 OSIsoft, LLC. › corp › en › media › ...© Copyright 2012 OSIsoft, LLC. FEATURES vs AUTHENTICATION OPTIONS SYNCHRONIZED CREDENTIALS SINGLE FOREST MULITPLE

© Copyright 2012 OSIsoft, LLC. 24