When designing control system networks in a secure fashion,
it is important to note the different requirements that exist between various
business networks. Control systems vary
widely from corporate network resources in need for speed, reliability and
uptime. Control systems rely on
real-time operations and therefore must remain highly reliable. Business networks, on the other hand, operate
over low-cost Ethernet to provide fast access to resources using TCP/IP. SCADA systems operate between these two
networks to relay information from one to the other and need specific
components from each network to function.
SCADA systems must be able to operate in real-time while using TCP/IP to
communicate data to the business.
These obvious demarcation points on the network are great
spots to segregate networks when developing a secure control system network
design. The SCADA system should sit on a
DMZ, a security zone located between the business and control system
networks. It is not ideal to place
business applications on the same network as the control systems because legacy
systems within control are vulnerable to malware and malicious traffic, while
operating across insecure protocols, such as Modbus. A firewall placed on either side of the DMZ
protects the control system and the business network from vulnerabilities and
threats found within each. Placement of
intrusion prevention systems and other perimeter security devices between the
SCADA network and each other network is best practice.
Systems within the control system network include RTUs,
PLCs, and HMI systems. The SCADA network
will also host HMI systems plus data historians, MTUs, and ICCP clients. The network containing business applications
will include popular business software programs, as well as supervisory
workstations for monitoring SCADA systems.
Placement of the control system network devices in the most
secure zone, or deepest layer, is another best practice. Traffic should flow from the higher security
zone to lower zones, but not in the other direction. Information within the control system network
should be enabled through the firewall to the DMZ as needed, and the SCADA DMZ
equipment should communicate through the firewall out to the business
networks. Traffic should not traverse
the firewalls directly from the control networks to the business LANs. The DMZ acts as intermediary communication
center, taking in information to its systems from the control network and
passing information along to the business network. This same design must be used for any traffic
that needs to reach control from the business networks.
Set up file shares and patch management servers within the
DMZ to capture information from one network before passing the authorized
information along to the receiving network.
This will prevent malicious code from traversing directly to a targeted
host because, theoretically, a different port and IP address should be used
from the DMZ host to pass traffic. The
important considerations when designing security into control system networks
is to segregate the vulnerable control network as much as possible from the
highly volatile business LAN. The DMZ
acts as a buffer to double check that traffic is traveling to approved
resources, and infection in the DMZ is less intrusion and detrimental than an
attack of the control system resources themselves.
No comments:
Post a Comment