dramaticly reducing attack surface · 9/2/2020  · national existential risk æ sec™ critical...

37
æSecæSecæSecThe power of verifiable protection™ æSecThe power of verifiable protection™ Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel Dr. Roger R. Schell, PhD President and founder of Aesec Corporation [email protected] (831) 657-0899 CERIAS 2020 Seminar Purdue University West Lafayette, IN Streamed live on the Web September 2, 2020 4:30pm EDT

Upload: others

Post on 07-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™æSec™The power of verifiable protection™

æSec™The power of verifiable protection™

Dramatically Reducing Attack SurfaceUsing Integrity MAC Security Kernel

Dr. Roger R. Schell, PhD

President and founder of Aesec Corporation

[email protected]

(831) 657-0899

CERIAS 2020 SeminarPurdue UniversityWest Lafayette, INStreamed live on the WebSeptember 2, 2020

4:30pm EDT

Page 2: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Presentation Outline

• Problem: national existential risk

• Towards a Reusable Trusted Device (RTD)

• Control Systems: PLC Commercialization

2

Page 3: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Presentation Outline

• Problem: national existential risk −Poor Cyber Physical Systems (CPS) resilience−Vulnerable critical cyber-physical components

• Towards a Reusable Trusted Device (RTD)

• Control Systems: PLC Commercialization

3

Page 4: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™National Existential Risk Poor CPS Resilience

• Leon Panetta, former SecDef & CIA Director−“Biggest nightmare is of a computer virus

- that attacks and disables US infrastructure”

−“Could result in millions of lost lives” [Mar 2019]

• EO 13920 – US Bulk Power: National Emergency

• National Commission on Grid Resilience (NCGR)−“OEMs are targets for malware that can lie in wait”−Cyberthreat electric sector investment [Aug 2020]

• Washington Post – “Power Grid Collapse”−“Russia cause[d] physical damage from afar”−“China has already implanted malware” [Aug 2020]

4

Page 5: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™National Existential Risk Critical Device Physical Damage

• Computer systems all use operating system(OS)−Programmable Logic Controllers (PLC) have an OS

• Science: secure system requires trustworthy OS−Must withstand witted adversary cyber attacks

• Current commercial PLCs use untrustworthy OSs−One of a few common OSs – none trustworthy−Evident by stream of regular “security patches”

• Cyberattacks inflict permanent physical damage−STUXNET destroyed Iranian enrichment centrifuges −Crash Override for physical Ukraine grid destruction−Triton aimed for Saudi refinery destruction

5

Page 6: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Presentation Outline

• Problem: national existential risk

• Towards a Reusable Trusted Device (RTD)−Security kernel technology−Verifiable Integrity Mandatory Access Control (MAC)−OpenPLC on GEMSOS demonstration−Mature subversion mitigation

• Control Systems: PLC Commercialization

6

Page 7: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Security Kernel TechnologySolution Concept Introduction

• Seminal (1972) concept description“a compact security ‘kernel’ of the operating system and supporting hardware – such that an antagonist could provide the remainder of the system without compromising the protection provided.”

• Early (1983) IEEE article characterization“the security kernel approach provides controls that are effective against most internal attacks – including some that many designers never consider.”

• Consistent history of mitigating attacks“half dozen security kernel-based operating systems ran for years (even decades) in the face of nation-state adversaries without a single reported security patch ”

7

Page 8: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Security Kernel TechnologySolution Concept Introduction

“The only way we know . . . to build highly secure software systems of any practical interest is the kernel approach.”

-- ARPA Review Group, 1970s (Butler Lampson, Draper Prize recipient)

TCSEC Glossary: ‘“Security Kernel - The hardware, firmware, and software elements of a Trusted Computing Base that implement the reference monitor concept.”’

Still true today. Codified in TCSEC Class A1

8

Page 9: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Security Kernel TechnologySolution Concept Introduction

Reusable

Trusted

Device

Security Kernel

Designed to meet Class A1

“The only way we know . . . to build highly secure software systems of any practical interest is the kernel approach.”

-- ARPA Review Group, 1970s (Butler Lampson, Draper Prize recipient)

Hardware Platform(Segmentation & Rings)

StorageNetwork Monitor/

Keyboard

Reusable Trusted Device: ‘“The hardware, firmware, and software elements implement the reference monitor concept.”

Still true today. Codified in TCSEC Class A1

9

Page 10: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Security Kernel TechnologySolution Concept Introduction

Security

Services

Appliances

Programmable Logic Controllers (PLC)

Operating

System

Services

Reusable

Trusted

Device

Security Kernel

Designed to meet Class A1

“The only way we know . . . to build highly secure software systems of any practical interest is the kernel approach.”

-- ARPA Review Group, 1970s (Butler Lampson, Draper Prize recipient)

Hardware Platform(Segmentation & Rings)

StorageNetwork Monitor/

Keyboard

Truly a paradigm shift: no Class A1 security patches for kernel in years of use

10

Page 11: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Security Kernel TechnologyStrategic Approach to Protection

11

• Controlled sharing between integrity domains−Enforce Mandatory Access Controls (MAC) policies

• Verifiable Design required for MAC enforcement−Add on security by test and analysis has failed

- Threat/vulnerability detection & response never finish

−Build in security by Construction is successful - Reference Monitor basis of the TCSEC Class A1 approach

• Mitigate subversion, e.g., malware (STUXNET)−To protect distribution of software & commands

- Protect installed code, configuration settings & data

All required for Secure Operating System

Page 12: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Security Kernel TechnologyCyber Defense Triad

• MAC policies required−To secure information

flows

• Reference Monitor −Only known verifiable

protection technology

• Deal with Subversion−tool of choice for

witted adversaries

12

Page 13: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Design for MACNIST: Reference Monitor Concept

• NIST highlights in flagship SP-800-160v1−“Trustworthy Secure System Development ”

• Reference Monitor Concept“provides an abstract security model of the necessary and sufficient properties that must be achieved by any system mechanism claiming to securely enforce access controls.”

• Security Kernel defined as its implementation

• Integrity-MAC is access control policy13

Page 14: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Design for MACSecure by Construction

14

Source CodeLayering & info hidingCode correspondence

TrustedDistribution

Implementation Design Documents

Formal Top LevelLevel Spec (FTLS)

Descriptive Top Level Spec

Product End Item

Formal Security Policy Model [linchpin]

Security PolicyPhilosophy and Design of Protection

System Specifications

Development Specifications

Product Specifications

Mappings

Deliverable Product

Covert channel analysis

Security Features Users GuideTrusted Facility Manuals

(FSPM) For Reference Monitor. i.e., security kernel API

With hardware propertiesvisible at interface

E.g

., H

ard

ware

Segm

enta

tion

Page 15: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Design for MACIneffective Shortcuts

• Reference Monitor & FSPM are long, hard work−Omitted by unwary/lazy for “plausible” shortcuts

• “Verified OS” – for functionality, not policy FSPM−Example: seL4 – need to verify info flow outside OS

• “Partition Kernel” lacks FSPM for kernel API−Example: MILS – explicitly excludes from kernel

• “Verified capability hardware” – missing a FSPM−Examples: DARPA-sponsored CRASH and CHERI

• Static code analysis – lacks FSPM for API of OS−Example: LDRA Testbed

• Shortcuts cannot enforce Integrity MAC for PLC15

Page 16: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Integrity MACMAC Reduces CPS Attack Surface

16

PhysicalDevice

Page 17: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Integrity MACMAC Reduces CPS Attack Surface

17

Public Networks • Public Networksaccess of any kind gives adversaries a huge attack surface

PhysicalDevice

Page 18: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Integrity MACMAC Reduces CPS Attack Surface

18

Public Networks

Distributed Control

• Public Networksaccess of any kind gives adversaries a huge attack surface

• Distributed control is vulnerable to insider attack

PhysicalDevice

Page 19: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Integrity MACMAC Reduces CPS Attack Surface

19

Public Networks

Distributed Control

SCADA

• Public Networksaccess of any kind gives adversaries a huge attack surface

• Distributed control is vulnerable to insider attack

• SCADA and other adaptable control systems can be sabotaged

PhysicalDevice

Page 20: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable Integrity MACMAC Reduces CPS Attack Surface

20

Public Networks

Distributed Control

SCADA

Cyber PhysicalControl

• Public Networksaccess of any kind gives adversaries a huge attack surface

• Distributed control is vulnerable to insider attack

• SCADA and other adaptable control systems can be sabotaged

• Cyber Physical Control requires protection of Safe Regions (e.g., Power System Settings) only Mandatory Access Controls provide

PhysicalDevice

Page 21: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOSNIST Calls Out Solution Concept

NIST calls out “kernel” in flagship SP-800-160v1−“Electric Grid – Industrial/process control systems”

• PLC typically controls critical physical component“Trustworthy components within ICS, including for example, highly assured, kernel-based operating systems in Programmable Logic Controllers” [PLC]

• Kernel MAC controls integrity security domains“can help achieve a high degree of system integrity and availability through domain separation with control over cross-domain flows and use of shared resources. ”

21

Page 22: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOSReproducible Research Setup

22

Intel x.86 NetworkSecurity

Kernel

SCADA Public Networks

Cyber Physical Control

Ring 0

Ring 2

Ring 5

DistributedControl

Intel x86 ArchitectureHardware Protection Levels(Protection Rings)

Concentric ring diagram taken from Intel® 64 and IA-32 Architectures Software Development’s Manual, Volume 3A: System Programming Guide, Part 1, (order number 253668)

OS

ApplicationsLevel 3

Level 2

Level 1

Level 0

Ring 7

MACSupport

Highest ------Criticality------ Lowest- - - - - - - MAC Integrity Domains - - - - - - -

• Essential Hardware Properties− Hardware Rings – more than 2− Memory Segmentation vs Paging− Strong Process Model

• NSA TCSEC/TNI Class A1 –Verified Design

GEMSOS Class A1 “M-component”

Intel x.86 Network

Operating System Services

Security Services, e.g. Crypto

MAC Integrity Domains Criticality Attack Surface

Cyber Physical Control High Very Small

SCADA Medium Small

Distributed Control Medium-low Moderate

Public Networks Low Very Large

Page 23: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOSDemonstration Approach

23

Four distinct hierarchical integrity domains

1. Cyber physical system (CPS) control− Only domain with I/O access to physical hardware− Enforces “Pierson Safe Region” for physical device

2. Supervisory Control and Data Acquisition− SCADA domain – main PLC “Logic Loop”

3. Distributed control−Integrity-protected network interfaces

4. Untrusted public networks (e.g., Internet)

Page 24: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOS Open Source Research PLC

• Originated with Thiago Alves, Brazil−Developed at University of Alabama in Huntsville

- Prof. Tommy Morris-led team

−https://www.openplcproject.com

• Highly functional PLC for Windows, Linux, etc.

• Some commercial PLC vendors using

• Installed in Matt Bishop’s UCDavis Security Lab−On GEMSOS Developer’s Kit 24

Page 25: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOS4-Domains and CDS Transfers

SCADA Domain

PublicNetworks

Domain

Cyber PhysicalControl Domain

Key:Information ProcessesFlows Databases

R/WMutex

x3

DistributedControlDomain

25

Page 26: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOSCyber Physical System Control

mb_dbModbus

Database

Pierson Safe Region

cps_bufData_input

Data_output

log_bufData_output

Cross Domain

Service #1

High Integrity

PhysicalDevice

Medium IntegrityKey:InformationFlowsProcessesDatabases

R/WMutex

R/O Mutex

Update Buffers Out

Program Logic

Update Buffers In

RWMutex

RWMutex

RWMutex

Buffer Management

R/WMutex

R/WMutex

Remainderof OpenPLCR/W

Mutex RPC-CPS1Start

Lo

gic

Lo

op

A

RPC-CPS1Complete

26

Page 27: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™OpenPLC on GEMSOSReduced Attack Surface

27

Domain Processes Stripped Size (bytes)

Percentage of Whole

Cyber Physical Control

Phys Device Ctl 14,5560.7%

CDS #1 31,100

SCADA

Logic Loop 1,022,900

20.2%Modbus RPC 275,732

CDS #2 31,396

Distributed Ctl TCP/IP Stack 144,9602.7%

CDS #3 31,100

Public Networks

RTU Handler 25,032

76.4%External Network

> 5,000,000

0.7%

Page 28: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Mature Subversion MitigationNIST: Class A1 for Subversion

• NIST cites “Class A1” in flagship SP-800-160v1−“Application . . . to Commercial Products”

• Products are worked examples and use cases “highly trustworthy components and systems that have been verified to be highly resistant to penetration from determined adversaries”

• TCSEC Class A1 distinguished“by substantially dealing with the problem of subversionof security mechanisms.”

28

Page 29: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Mature Subversion MitigationTrusted Device Protects Itself

• Trusted Boot for software/configuration settings

• Vet Trusted Devices for unauthorized behavior

• Code Correspondence stop “dead code” malware

• Trusted Distribution avoids supply chain attacks

• Media integrity mitigates “parking lot” attacks

29

Page 30: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Mature Subversion MitigationIllustrative STUXNET Mitigation

30

Parking Lot USB, phishing payload, etc.Trusted DeviceSupplier

Trusted OEM Supplier:e.g., Siemens

Trusted SupplierSoftware

Trusted DeviceSoftware

Physical Device(e.g., Generator)

Lacks Seal

Crypto-Sealed

Crypto-Sealed

Customer Control Systems

= Trusted Hardware Root of Trust(e.g., Intel TPM or custom FPGA)

= OEM Distribution Keys

= Trusted Device Distribution Keys

• Class A1 Evaluation included use of a suitable Trusted Distribution Cryptographic Algorithm (e.g., Simmons)

• Suppliers AND Customers BOTH get Trusted Device updates via Trusted Distribution;

• OEM Supplier’s Keys not exposed

STUXNET

Applications

Trusted Device Trusted Device

Security Kernel

Trusted Device

Class A1 Trusted Distribution rejects installation of untrusted software (malware)by checking for authorized cryptographic seal

Page 31: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Presentation Outline

• Problem: national existential risk

• Towards a Reusable Trusted Device (RTD)

• Control Systems: PLC Commercialization−Original Equipment Manufacturer (OEM) model

31

Page 32: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™PLC Technology TransferTraditional OEM Model

32

• Security kernel vendor offers Trusted Device− Hardware & software domain-specific platform, e.g., motherboard, SOC− Trusted distribution, system security certification

• OEMs & manufacturers build PLC platforms− Trusted Device is part of any hardware product configuration

• VARs, ISVs, appliance vendors− Add applications and system services software, use OpenPLC source

• Solution providers and system integrators− Customization and integration for customers− Deliver complete solutions

10-15 yrs 2-3 yrs

SystemsIntegratorSolutions

VARs, ISVs, ApplianceVendors

Trusted Device

From Vendor

OEMS &Manufacturers

Page 33: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™PLC Technology TransferPrevious Evaluations Accelerate

• Former DIRNSA LtGen Linc Faurer note [2007]• “very high priority problem area”−“vulnerability of our network components and

- electronic credentials to software subversion”

−“convinced that an IC disaster looms”

• “demands that the first set of solutions”−“directly leverage the designs, architectures and

- rating maintenance plans [RAMP] which NSA has- previously evaluated at the Class A1 level of assurance”

−“this is the only practical way to be confident the- needed solutions can be operationally deployed in the- next couple of years.”

33

Page 34: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Presentation OutlineSummary

• Problem: national existential risk −Poor Cyber Physical Systems (CPS) resilience−Vulnerable critical cyber-physical components

• Towards a Reusable Trusted Device (RTD)−Security kernel technology−Verifiable Integrity Mandatory Access Control (MAC)−OpenPLC on GEMSOS demonstration−Mature subversion mitigation

• Control Systems: PLC Commercialization−Original Equipment Manufacturer (OEM) model

34

Page 35: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™Verifiable CPS Bottom Line

• Critical physical components need verifiable PLC−Limited system risk from remaining components

• Kernel makes CPS attack surface much smaller−Each integrity MAC domain protected from lower−Security kernel verified design for unknown attacks−Deals with subversion of security mechanisms

• PLC performance & functionality retained−OEM host PLC on trusted device with secure OS−PLC manufacturers can use OpenPLC prototype

• Mature OEM business model & support approach−Successful security kernel OEM delivery history

35

Page 36: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™CPS Cybersecurity Conclusion

Clear NEED for resilient CPS

Commercial TECHNOLGY available

Need PLC manufacturer ADOPTION

36

Page 37: Dramaticly Reducing Attack Surface · 9/2/2020  · National Existential Risk æ Sec™ Critical Device Physical Damage •Computer systems all use operating system(OS) −Programmable

æSec™æSec™æSec™The power of verifiable protection™

æSec™The power of verifiable protection™

Dramatically Reducing Attack SurfaceUsing Integrity MAC Security Kernel

Dr. Roger R. Schell, PhD

President and founder of Aesec Corporation

[email protected]

(831) 657-0899

CERIAS 2020 SeminarPurdue UniversityWest Lafayette, INStreamed live on the WebSeptember 2, 2020

4:30pm EDT