Here's a draft of a Whitepaper I intend to submit to NERC.
Alt Title:
Alt Title:
More Problems With EACMS
Summary:
One of the topics entwined in the NEC
CIP virtualization discussion is the risk posed by the virtual
management consoles. This is related to consolidated interfaces and
automation where management console access can change or delete
entire infrastructures including virtual servers, networks, and
storage. A short-hand phrase has been coined calling this the
“Fewer, Bigger Buttons” problem.
Because this is a valid concern that is
not really addressed at all in NERC CIP, the scope of discussion
quickly grew to address similar Centralized Management Systems (CMS)
in the physical arena as well, and from there to all kinds of systems
which pose, or appear to pose similar risks.
Statement of the
Issues:
The 2016-02 SDT has been discussing
several options publicly. One option is to classify CMS (a
heretofore undefined term in NERC CIP, and not an industry standard
definition in Cyber Security either) as applicable systems and apply
specific security requirements to them.
Another option the SDT has discussed is
including CMS into the existing EACMS definition.
This is more or less by default the approach taken to date with all
of those legacy enterprise automation tools. Obviously, this
capability and risk has existed, largely unacknowledged in CIP
standards, for a long time without being confined to virtualized
environments. HP Openview, IBM Tivoli, Solarwinds Orion, and
CiscoWorks (to name just a few enterprise automation tools) have had
the ability to affect the entire enterprise all at once for literally
decades now.
Anti-malware and software patching
systems likewise. If a system in my network operates via a system
account with administrative privileges that allow it to modify the
configuration of a BCS, isn't that tool both a target and a potential
attack vector? And if such a system inside my network that performs
this function is an EACMS, then isn’t Microsoft’s Software Update
Services site, and Ubuntu’s Linux Repository, or Symantec or
McAfee’s antivirus signature update sites on the Internet as much
an EACMS as any SCCM or Anti-virus server inside my network?
However, this perpetuates and
exacerbates an issue where EACMS has become a "catch-all"
category of CIP-related Cyber Assets with one-size-fits-all
requirements regardless of the degree of risk or technical
constraints posed by the particular system.
An example is the Intermediate System.
In order to make the IS subject to CIP requirements it has to be
categorized somehow as a type of applicable system. To function as an
intermediate in practical terms (and by definition per the NERC
Glossary) it has to be outside the ESP. Apparently the IS has
therefore been categorized as an EACMS simply because that is the
only category currently available that allows for applicable systems
to be subject to CIP requirements outside the ESP.
Thus, the otherwise-unconnected phrase
“This includes Intermediate Systems” was tacked onto the end of
the EACMS definition. It is notable that no other examples had
previously been given.
The
Definition of Intermediate Systems:
“A Cyber Asset or collection of
Cyber Assets performing access control to restrict Interactive
Remote Access to only authorized users. The
Intermediate System must not be located inside the Electronic
Security Perimeter”
Here we see a presumably audit-able CIP
requirement set in the definition of Intermediate System rather than
in a table of requirements or in a security objective. We see a cyber
security function (Authentication and Authorization) defined
as a specific type of applicable device, and we see the
security benefit of such a function truncated to apply only to users
who interactively access Cyber Assets inside the ESP from outside the
ESP rather than applying the benefit of robust authentication,
authorization and accounting to all remote access.
Another example of the problem with the
one-size-fits-all approach to compliance requirements for EACMS is
what is known as the “hall of mirrors” effect. Specifically,
there may be some types of Ecyber Security Systems that should be
required to be protected behind a firewall. However, that
requirement can’t exist for all EACMS without defining a new
category because a firewall is itself an EACMS. Without defining a
new category, the result would be every EACMS needing to be inside an
ESP and protected by another EACMS which creates a recursive "hall
of mirrors" effect without end.
In addition to the catch-all and
recursive problems I've just noted, there is also a missing
component: Risk-based assessment and mitigation. For example, a
system that only monitors and logs access (such as monitoring systems
like Splunk, Tripwire, etc) does not pose the same level of risk as a
management console for a large virtualized Control Center
infrastructure. In addition, the technical controls to mitigate the
risk may differ. A SIEM system presents a risk of leaking BES Cyber
System Information;
an electronic access control (AAA) system presents a risk of
unauthorized access to or modification of a BES Cyber System’s
operational parameters; and a Centralized Management Console
(physical or virtual) presents an infrastructure reliability risk.
Risk-based assessments and mitigation
would help with this. It would allow for acknowledging that there are
a number of systems that both monitor and provide part of the
solution of controlling access, but which do not actually control
traffic at the point of entry. These devices or systems may or
may not benefit from being inside a protected boundary, or they may
form part of the strategy that protects BES Cyber Assets. The
technical means of implementing some multi-part systems may require
that components be outside or that they span the ESP.
All of this appears to be an
unfortunate artifact of the single-level security mindset inherent to
the ESP approach (hardened perimeter defense) and the “All-In”
nature of CIP Applicable Systems. Part of this problem (creeping
scope of applicability to increasingly peripheral systems) stems from
using the ESP to define scope of applicability, rather than using
risk to BES Cyber Systems and security objectives to define the scope
of necessary controls. FERC does not allow a Registered Entity to
assess and accept their own risks due to the interconnected nature of
risk to the BES. At the same time, NERC and the Regions have zero
incentive to accept risks on behalf of Entities. NERC and the Regions
bear none of the cost of mitigation, and would receive the lion's
share of criticism in the case of a failure of reliability or
security breach. It is very difficult to create standards that are
effective, comprehensible, and inclusive of different technical
capabilities, based upon the existing definition of EACMS or even new
definitions structured with the same ESP-as-hardened-perimeter
mindset. ESP is easy to visualize. Drawing a “red dotted line”
around assets needing protection is convenient. It’s simply not
sufficient. In contrast, a modern defense-in-depth, systems- rather
than device-based approach doesn’t require torturing definitions.
With these examples in mind, the issues
caused by having EACMS as a “catch all” category are obvious.
Some applicable systems were defined into existence for compliance
purposes and these standards are incompatible with broader
standardized cyber security best practices, and with
one-size-fits-all requirements applied to the whole artificial group.
Recommendations:
So
what do we do about it?
- The audit process needs to envision an approach more concerned with meeting an objective than a performance requirement. Then it doesn’t matter where something resides, as long as the applied combination of protections achieves the objective. It doesn’t matter much what is providing the control, as long as the assets needing protection receive the control. For example, the implied security objective of CIP 5 is not to “have inbound and outbound rules”. That is a limited method of achieving the real objective, which is to protect the BCS from unauthorized and potentially malicious traffic. If you have a better method, you should be allowed to use it.
- It might be necessary to break up the EACMS category of applicable systems into discrete functions (bullet points below) so that the appropriate security objective and requirements for each can be derived and applied whether the systems in question are physical or virtual.
- SIEM - Security Incident & Event Monitoring systems.
This
would subtract the “M” for “Monitoring” from EACMS. These
are systems that strictly monitor
and collect information
about the ESP and BES Cyber System electronic communications or
status but do not control access.
A great deal of literature, discussion, guidance, and best practices
are published across a broad range of industries as to how to
securely implement SIEM. The risk presented by compromise of these
systems revolves around the information (such as configurations and
event logs) they contain. The crux of the concept here is that the
protections already defined for BES Cyber Systems Information (BCSI)
are adequate and effective at providing protection for this
information, and it is the information
that needs protecting, not necessarily the SIEM system.
A
rather large issue with EACMS is CIP-004 and its applicability of
most personnel-oriented controls (training, background checks, etc.)
to anyone with potential access to an EACMS. This kills sharing any
service whatsoever (AAA, SIEM, etc.) because anyone with any form of
“access” to an EACMS gets sucked into CIP-004. Have an account
on a EACMS AAA server but NO access to any BCS? Too bad, you still
must have a CIP background check and be trained on the CIP program
(beyond your ‘need to know’). It’s a symptom of the “all-in”
issue.
Splitting
these monitoring systems out and adjusting the requirements would
may allow entities to more easily use outsourced managed security
service providers or global/enterprise-wide SIEM systems and
correlate event information in their CIP operational environments
with those in their non-CIP environments to provide increased
security and reliability benefits. The concern is that under current
standards the CIP program and device-level CIP audits might be
deemed to encompass Cyber Assets which do not actually affect the
reliable operation of the BES in the wider enterprise network or at
the service provider and could therefore dilute attention from BES
Cyber Security functions in favor of paperwork exercises.
- EACS - Electronic Access Control System. The fundamental defining characteristic of an Electronic Access Control system is that it performs authorization of traffic or users. This is the gatekeeper function- the classic Authentication and Authorization functions of standard AAA.
In many cases
these systems do not perform any active filtering of the traffic
passing through any particular interface. The primary duty of EACS
is to authenticate and authorize. Additional components of
electronic access security strategies are accounting (logging)
systems and gateways which actually pass or drop traffic. In
comparison to the SIEM discussion above, EACS & EAG move beyond
the risk of unauthorized access to meta-information about an
environment to unauthorized access to and modification of
operational parameters of the actual BES Cyber Systems.
In contrast, theoretically an application level IPS could send a
control signal from anywhere in the enterprise to anywhere in the
enterprise telling a specific host not to respond to a given type of
packet, with a certain payload, from a particular address- and it
could do this dynamically based upon heuristics rather than
signatures, but this outstanding security solution would not be a
compliant solution under our current regime.
Or a network level
intrusion protection system combined with dynamic firewall rules may
send a control message to a firewall instructing it to dynamically
change an Access Control List (ACL) in response to traffic patterns
indicating a threat. The IPS does not itself filter traffic in this
scenario, but it is involved in controlling access. An Active
Directory server may enforce a lock-out on a user account after hours
or subsequent to a number of incorrect password attempts. It is
involved in controlling access (authentication and authorization),
but it is not blocking traffic at layer 3 and from the current
NERC CIP ESP perspective is therefore irrelevant in boundary
protection. All boundary protection requires access controls, but not
all access control is boundary protection.
A metaphor for
Access Control Systems that do not reside in or on an ESP/ESZ is: a
pair of military units with interlocking fields of fire supporting
each other against frontal assaults and flanking movements. Defense
relies upon being positioned to assist one another, not on
“being inside a fence”. Electronic Access Control Systems (AAA)
can work to protect Cyber Assets inside the ESZ from anywhere.
- EAG - Electronic Access Gateway. The fundamental defining characteristics of an EAG are that it hosts the EAP and performs the active function of filtering or forwarding traffic at the demarcation point (boundary protection). Primarily it is firewalls and routers that perform gateway functions at the layer 3 ESP boundary demarcation point. Virtual firewalls and virtual routers inside a hypervisor perform the same function in the same manner. However, hypervisors themselves may not be EAGs if they are not configured with a virtual firewall or virtual router function to provide a gateway function.
Modern
security methods typically employ a defense in depth strategy using
distributed AAA (Authentication, Authorization, and Accounting)
systems to authenticate and authorize access to the Electronic
Security Zone based upon characteristics of the user and traffic,
while the EAG subscribes to the AAA service for user permissions and
filters (permits or denies) traffic based on the source, destination,
and port or protocol. Further, Electronic Access Control strategies
often employ multiple devices, each containing a part of the AAA
solution, such that compromise of one element of AAA does not result
in the entire system failing. Vendor and platform diversity within a
defense-in-depth systems-based approach to Access Control are
generally an element of securing the entire system from
vulnerabilities common to specific classes of devices (e.g.
all-Windows or all-Linux environments may have common configuration
or malware vulnerabilities). Often the Accounting (logging) function
is used to determine (and formulate a strategy to correct) any
failures in Authentication and Authorization.
Although some EAG
devices are also capable of performing various levels of functions to
authenticate and authorize traffic, many are not capable of complete
AAA solutions in themselves and therefore differ enough from EACS to
warrant different technical control measures. Requirements that
acknowledge the difference and allow for handling them differently
will prevent any "hall
of mirrors"
effects as described above only.
For conceptual discussion purposes
EAG acts somewhat like the legacy ESP as a logical demarcation point
for conceptual discussions to delineate PCA and BCS from
non-CIP-Applicable Cyber Assets. It may even be useful to replace ESP
completely using ESZ with EAG for demarcation points.
- CMS - Centralized Management System. System using an elevated privilege account either on behalf of an interactive user or in an automated fashion, allowing mass modification of BES Cyber Systems.
Proposed definitions:
AAA:
Authentication, Authorization and Accounting systems are Cyber
Systems that control ‘Gatekeeper’ functions (electronic access
methods and permissions,
e.g. authentication of users or control messages that alter
dynamic ACLs) for Cyber Systems.
CMS:
Centralized Management Systems are Cyber Systems that perform
automated management tasks and mass configuration of BCS whether
scheduled or on demand using a dedicated service account credential.
EACMS:
Deprecated.
EAG:
An Electronic Access Gateway is a Cyber Asset that performs active
electronic traffic control (filtering and/or forwarding) for ESZ
boundary protection based upon the criteria given to it.
EAP:
An Electronic Access Point is the logical interface on an EAG where traffic filtering operations take place.
ESZ: An Electronic Security Zone is the logical container providing separation or isolation from threats or attack vectors to grouped Cyber Assets, said Cyber Assets being characterized by similar operational criticality, or sensitivity to compromised data confidentiality and integrity, as well as needing similar access controls, audit logging and/or monitoring requirements.
SIEM:
Security Incident & Event Monitoring is a Cyber System that
performs electronic monitoring of Electronic Security Zone(s) or Cyber Systems.