implementation of operator authentication processes onauthentication processes on … · presenter...

24
Implementation of Operator Authentication Processes on Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company

Upload: others

Post on 17-Apr-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Implementation of Operator Authentication Processes onAuthentication Processes on an Enterprise Level

Mark HeardEastman Chemical Company

Page 2: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Presenter

Mark Heard, Eastman Chemical Company• Control System EngineerControl System Engineer• Experience with several kinds of automation systems, especially

networking with other plant systems• General interest in security and admin issues for MCSy

Work on Eastman Cybersecurity teams• Process Control Network Security, 2003-• Network Segmentation 2004-Network Segmentation, 2004• Cybersecurity Vulnerability Assessment, 2005-• Process Automation Systems Authentication, 2006-• Systems Integrity 2008-Systems Integrity, 2008

Working with ISA, ChemITC (formerly CIDX) since 2002

Operator Authentication Processes

Page 3: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Brief History of Control System SecurityIn The Good Old Days…• Proprietary or VAX/VMS O/S

D di t d O t W k t ti• Dedicated Operator Workstations• Physical Key Access Controls

• Operator/Supervisor/Engineer• Easily shared• Easily shared• Hard to duplicate• Obvious if lost or stolen

Make way for Windows!• Inexpensive standardized hardware• UserID/Password Access ControlConnect to ProcessControl

• Group Accounts• Maintain process visibility & control• Diminished access control

Operator

Connecting to ProcessControl.com

Operator Authentication Processes

• Loss of accountability

Page 4: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

CIA and AIC Security Models

• For Information Systems• Confidentiality is #1y• Integrity is #2• Availability is #3

• For Control Systems• Availability is #1• Integrity is #2• Integrity is #2• Confidentiality is #3

• All Systems Must Protecty• People• Property

Operator Authentication Processes

• Information

Page 5: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Corporate Team FormedAssessment of DCS Security by I/T based Auditors revealed a potential riskTeam formed to address the risk• Combination of DCS and I/T backgrounds on teamCharge from Executive Team• Address Control Room Operator Authentication

Is It Possible?Is There 1 Optimal Solution?What is the Cost?Lead Instead of Wait and See

Process Control Systems Involved• Honeywell TDC, TPS, Experion• NovaTech D/3• Emerson WDPF, Ovation, DeltaV

Operator Authentication Processes

Page 6: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Challenges

Different Hardware/Software Configurations for E h DCS V dEach DCS VendorProprietary Input DevicesSecurity Model Delivered by DCS VendorsSecurity Model Delivered by DCS VendorsSegmented NetworksEase of Use vs SecurityEase of Use vs SecurityHigh Availability, RobustnessImplementation

Operator Authentication Processes

Page 7: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Review of DCS Vendor Security Models

Find out what was in place and what is plannedMost Vendors are waiting for Customer DemandIndustry "Best Practice" guidance recommends

iti V d d l d l tiwaiting on Vendor developed solutionsCatch 22 Scenario

Operator Authentication Processes

Page 8: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Authentication Requirements

Musts:• A th ti t t l t t b• Authenticates process control system operators by

Eastman domain UserID and Password. • Runs without a network connection in cached credentials

d ( t ti )mode (automatic).• Verifies user authorization before allowing interaction with

the process control system.• Supports emergency unlock (login bypass) with notification

to designated system administrators.• Process control displays remain visible at all times

(transparent).

Operator Authentication Processes

Page 9: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Authentication Requirements (Continued)

Musts• Can onl be config red disabled or stopped b a thori ed• Can only be configured, disabled or stopped by authorized

administrators.• Uses standard Windows domain authentication (Eastman

network UserID's and Passwords)network UserID's and Passwords).High Priority Needs:• Logs all user authentication and authorization activity.• Locks out user again after a predetermined period of user

inactivity.• Supports remote administration and reporting through remote

registry/event-log connection

Operator Authentication Processes

Page 10: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Authentication Requirements (Continued)

Needs:• Logs all user control system activity tagged with the• Logs all user control system activity tagged with the

UserID

Honeywell's Sign-on Manager was the best fit to most of our requirements

Operator Authentication Processes

Page 11: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Group Account Transparency Enabler

AccountabilityAccountabilityAccess ControlAudit TrailsTransparencyE f UEase of UseGATE

Operator Authentication Processes

Page 12: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

GATE Operator Authentication InterfaceOperator Authentication (Domain Login)

Logoff Current User

Hide Login FormEmergency Unlock We could just make everyone

logon to Windows…

Not a popular option!

Identifying…

LogonLog Me OutConfigure Service

Very CoolVery Fast

Configure ServiceReview Activity LogsRegister Fingerprints

Operator Authentication Processes

Service Configuration & Login History Reviewe y ast

Very Easy

Page 13: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

GATE Authentication Service Architecture

Operating System

Keyboard and M

ouse E

vents

Operator WorkstationFingerprint Reader

ALARM

Keyboard

Mouse Ev

Event

Log

GATE is implemented as a low level hook into the Windows Operating System It flies below

GATE Operator Authentication Service

All Other

and vents

the Windows Operating System. It flies below radar and does not interact directly with applications running on the workstation. Keyboard and Mouse events are blocked until an authorized operator authenticates with U ID/P d bi t i fi i t

Operator Authentication Processes

Applications UserID/Password or biometric fingerprint identification.

Page 14: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

GATE Key Design Considerations

User Interface• M st be almost completel int iti e Not reasonable to e pect a• Must be almost completely intuitive. Not reasonable to expect a

lengthy enrollment process.• Must be fast! Cannot get in the way during an emergency

situationsituation.• Must not block visibility of process control graphics.• Use existing EMN UserID's and Passwords. Nothing new to

remember!• Enroll once. Use everywhere.

Operator Authentication Processes

Page 15: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

GATE Key Design Considerations (Continued)

Technology• Don't monkey around with GINA and take chances withDon t monkey around with GINA and take chances with

Windows stability!• Don't make any changes to DCS vendor software. Maintain

process isolation! Don't plan on having 24x7 99 999%process isolation! Don t plan on having 24x7, 99.999% connectivity to the corporate network. Must stand alone!

• Provide facility for remote configuration and maintenance.• Log everything in a place where the users cannot easily• Log everything in a place where the users cannot easily

corrupt or delete the data.

Operator Authentication Processes

Page 16: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

GATE Key Design Considerations (Continued)

Auditability• M st be able to identif ho had control at hat time• Must be able to identify who had control at what time.• Must be able to annotate activity logs. (Management

responsibility when emergency unlock is used)• Must be able to export logs for auditors.• Auditors may not have administrative rights.

Operator Authentication Processes

Page 17: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

GATE Failsafe MechanismsSoftware Crash Gate fails "open" (unlocked)

Network Outage Gate operates from locally cached dataNetwork Outage Gate operates from locally cached data

Forgotten Password Use the fingerprint reader or Emergency Unlock feature

Fingerprint Reader Failure Login by UserID/Password

Software Freeze Logon or Unlock remotely from another workstationSoftware Freeze Logon or Unlock remotely from another workstation – reboot option is always available

Data Loss/Corruption Synchronize with data from another workstation

Can't wait for Logon!!! EMERGENCY

Click on the Emergency Unlock button twice or use Control/Alt/End hotkey.

Operator Authentication Processes

Page 18: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Biometric User Registration and AuthenticationSelf Registration

• User must authenticate by UserID and password immediately before p yregistering fingerprint images.

• Fingerprints are stored by simply touching a finger on the reader.

Users sho ld store m ltiple• Users should store multiple fingerprint images (at least 4) to insure reliable recognition. Up to 10 images can be stored for each user. Different fingers can be used forDifferent fingers can be used for each image.

Authentication

• Fingerprint recognition is equivalent to entering UserID and Password for gaining system access.

• Recognition and logon will normally take less than 1 second.

Operator Authentication Processes

Page 19: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Peer-to-Peer Synchronization Architecture

IP Sockets layer messaging on a fi ll t i t d tfirewall restricted access port.

Operator WorkstationFingerprint Reader Operator Workstation

Fingerprint Reader

• Application configuration and user authentication data is shared across all

• An operator can login once to a defined group of workstations is shared across all

workstations on a DCS network.

• All workstations are capable of operating in stand-alone

on a DCS network.

• Peer-to-Peer data synchronization occurs on an IP port that is blocked at the

Operator WorkstationFingerprint Reader

p gmode with no network connectivity.

• Data synchronization will normally occur within a few

control network firewall.

• Workstations will periodically verify data synchronization and "catch-up" any machines that h b ffli

Operator Authentication Processes

yseconds of any change. have been offline.

Page 20: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Costs

One Time Software Purchases• Fingerprint Recognition SDK < $5000• Fingerprint Recognition SDK < $5000• Virtual Serial Port SDK < $500

Per Operator Workstation• Fingerprint Reader < $40• USB E t i C bl (if d d) < $10• USB Extension Cable (if needed) < $10

Operator Authentication Processes

Page 21: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Project Status

Piloted in manufacturing areas:• Tested on Novatech D/3, Emerson Ovation, DeltaV, and

Honeywell TPS, Experion• Testing in all areas of Kingsport, TN Siteg g p ,

Fully Operational in the Corporate Network Control Center

U d b t h i i i th t l t• Used by technicians in the control center• Systems monitor I/T computers and networks

Deployed 2H2007 to Manufacturing Control Roomsp y g

Operator Authentication Processes

Page 22: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Enhancements

Network fault toleranceGATE S i f t t d d iGATEway Service for non-trusted domains or workgroupsGATE Usage Reports and Analyzer (automated)GATE Usage Reports and Analyzer (automated)Automatic software updates (no reboot!)Future• Vista support• 2 factor authentication

Operator Authentication Processes

Page 23: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Where Do We Go From Here

Operator Authentication is Here to StaySi l U i Wi d A th ti ti i NOT Ad tSimply Using Windows Authentication is NOT Adequate for Control SystemsEngage Vendors to Integrate Solutions into the StandardEngage Vendors to Integrate Solutions into the Standard Product

Operator Authentication Processes

Page 24: Implementation of Operator Authentication Processes onAuthentication Processes on … · Presenter Mark Heard, Eastman Chemical Company • Control System EngineerControl System Engineer

Questions?

Contact Information:Mark HeardMark Heard

[email protected]

Operator Authentication Processes