Grrcon 2012 – Amol Sarwate – Scada Security

Description: Synopsis:This talk will present original research on technical security challenges faced by organizations that have SCADA, critical infrastructure or control systems installations. The talk will identify avenues of attack and explain how critical infrastructure can be compromised. It will also provide mitigation strategies and security controls to secure against exploitation. The talk will release an updated version of an open-source tool to help identify vulnerabilities and inventory SCADA systems. The presentation will begin by introducing SCADA systems under the hood including RTU, IED, PLC, FEP, PCS, DCS, HMI, sensors, data historians and other SCADA components. Amol will categorize these components into distinct groups based on the functionality provided by each component. He will review security implications on each of these groups and identify where most of the threats lie. We’ll be dissecting packets for SCADA protocols like MODBUS and DNP3 and study their security implications.

More importantly Amol will release an updated version of an open-source tool to identify and inventory SCADA systems using the protocols discussed in this presentation. He will then focus on real world examples of successful and not-so-successful implementations of security controls with SCADA systems. This will include examples of what some large organizations have done, and a discussion about why SCADA security cannot be deciphered just by tools or technical solutions. The presentation will conclude with guidance on how control system owners can start implementing additional measures to get to an acceptable security level.

Attendees who are in charge of control system infrastructure will get insight on what worked and what did not for other organizations. Engineers who are in-charge of security for control systems will get a better technical insight of SCADA protocols and components and can use the open source tool that will be released. Attendees who are new to control systems will get an excellent overview of security complexities in the SCADA world.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s