Monday, December 2, 2013

Secure Control System Network Design



When designing control system networks in a secure fashion, it is important to note the different requirements that exist between various business networks.  Control systems vary widely from corporate network resources in need for speed, reliability and uptime.  Control systems rely on real-time operations and therefore must remain highly reliable.  Business networks, on the other hand, operate over low-cost Ethernet to provide fast access to resources using TCP/IP.  SCADA systems operate between these two networks to relay information from one to the other and need specific components from each network to function.  SCADA systems must be able to operate in real-time while using TCP/IP to communicate data to the business.  

These obvious demarcation points on the network are great spots to segregate networks when developing a secure control system network design.  The SCADA system should sit on a DMZ, a security zone located between the business and control system networks.  It is not ideal to place business applications on the same network as the control systems because legacy systems within control are vulnerable to malware and malicious traffic, while operating across insecure protocols, such as Modbus.  A firewall placed on either side of the DMZ protects the control system and the business network from vulnerabilities and threats found within each.  Placement of intrusion prevention systems and other perimeter security devices between the SCADA network and each other network is best practice.  

Systems within the control system network include RTUs, PLCs, and HMI systems.  The SCADA network will also host HMI systems plus data historians, MTUs, and ICCP clients.  The network containing business applications will include popular business software programs, as well as supervisory workstations for monitoring SCADA systems. 
Placement of the control system network devices in the most secure zone, or deepest layer, is another best practice.  Traffic should flow from the higher security zone to lower zones, but not in the other direction.  Information within the control system network should be enabled through the firewall to the DMZ as needed, and the SCADA DMZ equipment should communicate through the firewall out to the business networks.  Traffic should not traverse the firewalls directly from the control networks to the business LANs.  The DMZ acts as intermediary communication center, taking in information to its systems from the control network and passing information along to the business network.  This same design must be used for any traffic that needs to reach control from the business networks.  

Set up file shares and patch management servers within the DMZ to capture information from one network before passing the authorized information along to the receiving network.  This will prevent malicious code from traversing directly to a targeted host because, theoretically, a different port and IP address should be used from the DMZ host to pass traffic.  The important considerations when designing security into control system networks is to segregate the vulnerable control network as much as possible from the highly volatile business LAN.  The DMZ acts as a buffer to double check that traffic is traveling to approved resources, and infection in the DMZ is less intrusion and detrimental than an attack of the control system resources themselves. 

No comments:

Post a Comment