There is a growing need for remote access to industrial control systems by employees and vendors in order to perform monitoring, troubleshooting, and maintenance. As critical control networks grow more digitized and interconnected, there is a need for secure remote access to reduce the risk of a cyber attack pathway for critical industrial control networks such as those of power utilities.
Provided is a system for secure remote access to an industrial control system, such as that of electrical power utilities, using hardware based authentication, comprising secure user authentication; secure interactive remote access or secure machine-to-machine remote access or communication; and remote access services.
Also provided is a method for secure remote access to an industrial control system, comprising the steps of: providing a system for secure remote access to an industrial control system using hardware based authentication; performing secure user authentication; providing secure interactive remote access or secure machine-to-machine remote access or communication; and providing remote access services.
Provided is a system and method for secure remote access to an industrial control system using hardware based authentication, comprising secure user authentication, secure interactive remote access or secure machine-to-machine remote access or communication, and remote access services.
Secure user authentication is provided through secure two-factor authentication (2FA) or secure three-factor authentication (3FA) based on smart cards in a plastic identity card form factor with contact and contactless interface. Possession of the smart card and knowledge of the corresponding personal identification number (PIN) is required for two-factor secure user authentication. Three-factor authentication also implements biometrics, verification of a biological trait which may include but is not limited to retina scans, iris scans, fingerprint scans, finger vein scans, facial recognition, voice recognition, hand geometry, and earlobe geometry. This authentication enables a multistep verification with respect to session approval via third party verification. An additional factor, location, may be employed for four-factor authentication (4FA). Distributed keys and credentials secured within smart card hardware provide secure key management and storage, and enable NIST IAL 3 and AAL3 levels of identity proofing and authentication according to guidelines provided by NIST Special Publication 800-63-3 from the National Institute of Standards and Technology. An example of an appropriate smart card is a SideCard™ from Tyfone, Inc.
Secure interactive remote access may be provided through a secure hardened, stateless software appliance. A managed Remote-Access Appliance (RAA), comprising a virtual machine and software, is used to initiate the remote access to an industrial plant uniformly from any remote access workstation, which may be dedicated, managed or unmanaged. The underlying virtual machine of the appliance provides the controlled environment that can be managed by policy, even when invoked from an unmanaged workstation. The appliance can only be used with a smart card credential. The local authentication credential to the appliance is separated from the certificate based remote access authentication to the plant network, both of which are stored in the smart card. Secure interactive remote access may be provided through secure machine-to-machine remote access or communication.
Remote access services may include, but are not limited to, technical cyber-security control services that automate security policy and processes for user and token lifecycle management, software configuration management, access control and authorization using layered security, and audit trails of remote access. Layered security may provide for more than one individual to be involved in authorizing scheduled and unscheduled remote access to an industrial plant, and audit logs provide additional levels of control in the security policy of a plant that wishes to enable secure remote access to the plant infrastructure.
The smart card may comprise hardware endpoint security technology, and comprises ISO7816 Contact and ISO14443A Contactless interfaces, and a Bluetooth (BLE) interface, providing the flexibility to be used for omnichannel security for physical as well as all digital transactions across mobile and non-mobile devices. Platform agonistic low-level interface specifications and platform specific high-level API library are available for the smart card, which optionally interoperates with a digital security platform for identity and transactions, providing layered step-up security that supports all NIST levels of assurance, including the highest levels in the industry, while not compromising convenience and user experience. The smart card allows an organization to implement decentralized and distributed user authentication in a convenient, familiar form factor, providing strong authentication and increased safeguards, and significantly reducing cybersecurity risks and operational costs.
The smart card secure element (SE) provides the highest levels of built-in tamper resistance, secure storage and hardware encryption. The secure element allows storing of credentials, cryptographic keys, and X.509 certificates, making it non-extractable by hackers. The secure element stores the PIN and the RSA 2048-bit private key with the associated X.509 certificate. The PIN resides in the secure element's electrically erasable programmable read-only memory (EEPROM) as a PIN object and it is not extractable. The PIN cannot be stolen. The PIN can be changed if the older PIN is known. The private key resides in the secure element's EEPROM as a PrivateKey object and it is not extractable. The private key can be deleted, and a new one can be created if the PIN is known. The private key cannot be stolen. The secure element is NIST FIPS 140-2 certified and is tamper proof. The private key is used to sign transactions. Access to the secure element in the smart card is granted only after successful authentication using the PIN. The maximum number of incorrect PIN entries is limited. If the maximum number of PIN entries exceeds the set value, then the card is blocked and will have to be re-provisioned to the user by the administrator, such as by using a personalization kiosk.
Three types of smart cards may be provided according to the role of the individual with respect to the system, including one type for an administrator, one type for a supervisor, and one type for a remote user. All three types of cards are provisioned with client user certificates, generated on the secure element. The smart cards may communicate with other devices using a contact interface such as a smart card reader, or a contactless interface such as Bluetooth (BLE) or radio frequency identification (RFID).
Remote access services allow for management of the users, smart card tokens, and appliance (virtual machine and software) state, as well as remote access authorizations and policy, and layered-security controls. Remote access services implement technical cyber-security controls for managing and auditing interactive remote access. A mobile application for the supervisor implements layered-security controls for remote access authorization and access control, and two-factor authentication using smart cards is implemented on the mobile device. A mobile tablet application for the administrator implements layered-security controls for remote access authorization and access control, and two-factor authentication using smart cards is implemented on the mobile tablet device.
Remote access services are responsible for storing user-plant information and verification of access requests, with data exchange via a mutually authenticated Transport Layer Security (TLS) channel, and are also responsible for technical cyber-security control services. Security controls are according to the guidelines in the NIST SP800-53 rev 4 document from the National Institute of Standards and Technology. Technical cyber-security control services may include, but are not limited to, account management, access control, information flow enforcements, control of unsuccessful login attempts, system use notification, concurrent session control, session termination, permitted actions without identification or authentication, security attributes and transmission, remote access, auditable events, audit records and storage capacity, audit review and analysis, audit reporting, time stamps, non-repudiation, identification and authentication, denial of service protection, transmission integrity and confidentiality, use of cryptography, public key infrastructure certificates, protection of information at rest, virtualization techniques, malicious code protection, control of software and information integrity, information input restrictions, and protection against malware.
The account management system may comprise three types of roles, an administrator, a supervisor, and at least one end-user. An administrator can create, modify, or delete other administrators, supervisors or end-users. The administrator can also create access schedules for end-users that have to be authorized by the supervisor. The supervisor has the privilege to grant or deny access to a workstation for a user. The end-user can have scheduled or unscheduled access to a workstation. The identity of the individual is established using a smart card that is protected by a localized PIN. For access control, an administrator has access to set up plants, users, workstations and associate users to plants and workstations. The administrator also has access to a provisioning tool, which is used to create users and provision smart cards to users. The supervisor can access authorization requests via the supervisor application, and has the privilege to grant or deny scheduled or unscheduled access requests. The end-user can access a workstation if an access is scheduled or can request for an unscheduled access. The end-user cannot access the administrator and supervisor tools. The supervisor cannot access the administrator and end-user tools.
Certain actions may be permitted without identification or authentication. The supervisor and administrator applications allow the user of the applications to view notifications. However, no action can be performed on the notification until the user is authenticated using the smart card and the PIN. A session is created after a successful login, and terminated after a logout. Multiple concurrent sessions may be allowed. System use notifications are sent to the supervisor informing the supervisor of end-user login, logout and workstation access of the end-user. For unsuccessful login attempts, the access to the private key in the secure element of the smart card is protected by the PIN. If the PIN entered is incorrect then the user is asked to enter the PIN again. The maximum number of incorrect PIN entries is limited. If the maximum number of PIN entries exceeds the set value, then the card is blocked. The smart card will have to be re-provisioned to the user by the administrator such as by using the personalization kiosk.
Remote access to a workstation can be scheduled or unscheduled. However, prior authorization by the supervisor is required to access the workstation. Auditable events and content of audit records include all transaction events that are stored securely in a database, with a storage capacity that is limited only by the size allotted to the database server. Time stamps are stored according to coordinated universal time (UTC). Non-repudiation is achieved by using the RSA cryptosystem digital signature scheme, and the transaction information is stored in the database for auditing. For identification and authentication, during provisioning the administrator verifies the physical identification of the individual before assigning a smart card to the user. During authentication, the user has to provide a PIN to the smart card. The authentication happens over a mutually authenticated TLS channel where the user certificate and the server certificate are validated.
In certain embodiments, cryptographic standards are used according to Federal Information Processing Publication 140-2 (FIPS 140-2), titled “Security Requirements For Cryptographic Modules”. For public key infrastructure certificates, a valid certificate authority (CA) should provide user certificates. RSA (2048 bit key) X.509 certificates are used as user certificates. Virtualization techniques involve the remote access appliance (RAA) which runs in kiosk mode. Malicious code protection is accomplished through an application integrity check. Information input restrictions are designed for the input of sensitive data using the randomized software PIN pad. This protects the system against keylogging and screen scraping.
A simple high-level architectural illustration of an embodiment of the secure remote access to an industrial control system of a single plant network is shown in
According to certain illustrative embodiments, the key elements of the secure remote access to an industrial control system 10 in
In illustrative embodiments, internet access 104 with adequate bandwidth and latency characteristics enters into the plant administrative network 108 through a firewall 106, from the Remote Access (RA) device 102. The plant administrative network 108 may be connected to the Remote Access DMZ 112 network either via a direct connection or via a firewall gateway 110. If via a firewall gateway, the rules should be set as required to allow the necessary ingress and egress to the Remote Access DMZ 112. The Remote Access DMZ 112 may be connected to the plant control network via a firewall gateway 110, on which rules are set to allow ingress and egress from the DMZ to specific Engineering Workstations 124 as required. Plant operators will generally retain control of all firewalls and network monitoring, as ultimate responsibility for plant network security will lie with the plant operators. The plant control network 120 is isolated from other networks, and in particular does not include a path to the internet for either inbound or outbound traffic.
An end-user authorization flow diagram for the system and method for secure remote access to an industrial control system 20 is shown in
For step 1, the secure user with SideCard 200 inserts the smart card (SideCard) into a card reader and enters a PIN 201. The remote access appliance (RAA) virtual machine for secure interactive remote access 210 is opened, and in step 2 verifies the PIN and requests the certificate 202. For step 3, the smart card provides the user certificate 203 to the remote access appliance of secure interactive remote access 210. Using the user's certificate and the remote access services (RAS) 220 certificate, in step 4 a mutually authenticated TLS channel is established 211. The remote access services 220 comprises a server that includes plant information and u4ia digital security platform.
In step 5, the secure interactive remote access appliance (RAA) 210 sends the user certificate 212 to the remote access services (RAS) 220. In step 6, the remote access services 220 verifies the user certificate and sends user information object 213 to secure interactive remote access 210. In step 7, the secure interactive remote access 210 sends a request to the remote access services 220 to request plant and workstation details 214. In step 8, the remote access services 220 sends plant and workstations details 215 to the secure interactive remote access 210. In step 9, the secure interactive remote access 210 sends a scheduled workstation access request 216 to the remote access services 220. In step 10, the remote access services 220 checks the rule associated with the end-user and the workstation based on the time of access and determines that it is a scheduled access 217.
A scheduled request does not require authorization from the plant supervisor. In step 11, the secure interactive remote access 210 will connect to the virtual private network (VPN) and then to the remote desktop protocol (RDP) gateway and finally to the engineering workstation 218 in the plant control network 230. If the request was unscheduled, then the access to a workstation would have required the authorization of a plant supervisor.
The provided system and method for secure remote access to an industrial control system using hardware based authentication, comprising secure user authentication, secure interactive remote access or secure machine-to-machine remote access or communication, and remote access services, implements a number of important advantageous attributes. Distributed secure element physical tokens connected via either contact or contactless interfaces prevent bulk theft and remote credential harvesting, and allow for loss awareness so that a lost or stolen access card will be easily detected by a user. Strong encryption and the highest level of NIST 800-63 Authenticator Assurance Level (AAL)—Level 3 are enabled, layering defenses by routing traffic through multiple check points where asymmetric (NIST LOA3) strong cryptographic authentication is required.
The provided system and method for secure remote access to an industrial control system is a holistic solution, implementing industry best practices in a complete solution for control systems, and mitigating the possibility of a compromised host (user device) by utilizing a stateless guest operating system, verification of guest integrity, and hardened guest operating systems. Access control lists are used to filter inbound traffic and limit outbound traffic, and access control is independently authorized on a session-by-session basis, either scheduled or ad-hoc. The network is monitored, logging traffic and auditing traffic flows. Capabilities also include remote desktop protocol (RDP) shadowing, and forced session termination. The provided system and method for secure remote access utilizes a virtual private network (VPN) and is easily integrated with existing architecture.
By way of illustration, and without limitation, an example of the provided system and method for secure remote access to an industrial control system using hardware based authentication may comprise the following 40 component steps of secure user authentication, secure interactive remote access or secure machine-to-machine remote access or communication, and remote access services:
Therefore, in a first embodiment there is provided a system for secure remote access to an industrial control system using hardware based authentication, comprising:
secure user authentication;
secure interactive remote access or secure machine-to-machine remote access or communication; and
remote access services.
According to the first embodiment, the secure user authentication comprises two-factor authentication (2FA) or three-factor authentication (3FA) based on smart cards. According to the first and subsequent embodiments, the secure user authentication may comprise possession of a smart card and knowledge of the corresponding personal identification number (PIN) and, optionally, biometrics. According to the first embodiment and subsequent embodiments, the smart cards comprise secure element (SE) storing of credentials, cryptographic keys, and X.509 certificates. Also according to the first and subsequent embodiments, the smart cards for an administrator, a supervisor, and an end-user have different capabilities.
According to the first embodiment and subsequent embodiments, the secure interactive remote access comprises a managed remote-access appliance (RAA), comprising a virtual machine and software. According to the first embodiment and subsequent embodiments, the managed remote-access appliance (RAA) may only be used with a smart card credential.
According to the first embodiment and subsequent embodiments, the remote access services comprise technical cyber-security control services that automate security policy and processes for user and token lifecycle management, software configuration management, access control and authorization using layered security, and audit trails of remote access. According to the first embodiment and subsequent embodiments, the remote access services may comprise management of users, smart card tokens, remote-access appliance (RAA) state, remote access authorizations and policy, and layered-security controls.
In a second embodiment there is provided a method for secure remote access to an industrial control system, comprising the steps of:
providing a system for secure remote access to an industrial control system using hardware based authentication;
performing secure user authentication;
providing secure interactive remote access or secure machine-to-machine remote access or communication; and
providing remote access services.
According to the second embodiment, the step of performing secure user authentication comprises providing two-factor authentication (2FA) or three-factor authentication (3FA) requiring possession of a smart card and a personal identification number (PIN) and, optionally, biometrics. According to the second embodiment and subsequent embodiments, the step of providing secure interactive remote access may comprise authorizing a smart card PIN with a remote access appliance (RAA) comprising a virtual machine and software.
According to the second embodiment and subsequent embodiments, the step of providing remote access services comprises providing account management of the roles of an administrator, a supervisor, and at least one end-user. According to the second embodiment and subsequent embodiments, the step of providing remote access services may comprise providing non-repudiation by using the RSA cryptosystem digital signature scheme. According to the second embodiment and subsequent embodiments, the step of providing remote access services may comprise providing auditable records by securely storing all transaction events in a database.
According to the second embodiment and subsequent embodiments, the step of providing remote access services comprises limiting the number of incorrect PIN entries. According to the second embodiment and subsequent embodiments, the step of providing remote access services may comprise sending system use notifications to a supervisor informing the supervisor of end-user login, logout and workstation access of the end-user.
According to the second embodiment and subsequent embodiments, the step of providing remote access services may comprise providing identification and authorization processes. According to the second embodiment and subsequent embodiments, the step of providing remote access services may comprise requiring a supervisor to authorize user access to a workstation.
While the system and method for secure remote access to an industrial control system using hardware based authentication, comprising secure user authentication, secure interactive remote access or secure machine-to-machine remote access or communication, and remote access services have been described in connection with various illustrative embodiments, it will be understood that the embodiments described herein are merely exemplary, and that one skilled in the art may make variations and modifications without departing from the spirit and scope of the embodiments. All such variations and modifications are intended to be included within the scope of the embodiments as described hereinabove.
Further, all embodiments disclosed are not necessarily in the alternative, as various embodiments may be combined to provide the desired result. Therefore, the system and method for secure remote access to an industrial control system using hardware based authentication, comprising secure user authentication, secure interactive remote access or secure machine-to-machine remote access or communication, and remote access services shall not be limited to any single embodiment, but rather construed in breadth and scope in accordance with the recitation of the appended claims.