Cyber-security: Whitelisting with e-terra software solutions

Cyber-security: Whitelisting with e-terra software solutions

06/02/2016 - 3.36 pm
                  Array
    (
        [0] => Array
            (
                [tid] => 77
                [taxonomy_term] => stdClass Object
                    (
                        [tid] => 77
                        [vid] => 1
                        [name] => Cyber-security
                        [description] => 
                        [format] => filtered_html
                        [weight] => 0
                        [vocabulary_machine_name] => tags
                        [rdf_mapping] => Array
                            (
                                [rdftype] => Array
                                    (
                                        [0] => skos:Concept
                                    )
    
                                [name] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => rdfs:label
                                                [1] => skos:prefLabel
                                            )
    
                                    )
    
                                [description] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:definition
                                            )
    
                                    )
    
                                [vid] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:inScheme
                                            )
    
                                        [type] => rel
                                    )
    
                                [parent] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:broader
                                            )
    
                                        [type] => rel
                                    )
    
                            )
    
                    )
    
            )
    
        [1] => Array
            (
                [tid] => 34
                [taxonomy_term] => stdClass Object
                    (
                        [tid] => 34
                        [vid] => 1
                        [name] => Network management
                        [description] => 
                        [format] => filtered_html
                        [weight] => 0
                        [vocabulary_machine_name] => tags
                        [rdf_mapping] => Array
                            (
                                [rdftype] => Array
                                    (
                                        [0] => skos:Concept
                                    )
    
                                [name] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => rdfs:label
                                                [1] => skos:prefLabel
                                            )
    
                                    )
    
                                [description] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:definition
                                            )
    
                                    )
    
                                [vid] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:inScheme
                                            )
    
                                        [type] => rel
                                    )
    
                                [parent] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:broader
                                            )
    
                                        [type] => rel
                                    )
    
                            )
    
                    )
    
            )
    
        [2] => Array
            (
                [tid] => 79
                [taxonomy_term] => stdClass Object
                    (
                        [tid] => 79
                        [vid] => 1
                        [name] => Oil & Gas
                        [description] => 
                        [format] => filtered_html
                        [weight] => 0
                        [vocabulary_machine_name] => tags
                        [rdf_mapping] => Array
                            (
                                [rdftype] => Array
                                    (
                                        [0] => skos:Concept
                                    )
    
                                [name] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => rdfs:label
                                                [1] => skos:prefLabel
                                            )
    
                                    )
    
                                [description] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:definition
                                            )
    
                                    )
    
                                [vid] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:inScheme
                                            )
    
                                        [type] => rel
                                    )
    
                                [parent] => Array
                                    (
                                        [predicates] => Array
                                            (
                                                [0] => skos:broader
                                            )
    
                                        [type] => rel
                                    )
    
                            )
    
                    )
    
            )
    
    )
                
  • Cyber-security
  • Network management
  • Oil & Gas

Cyber-attacks are becoming increasingly frequent and virulent. The power networks need to have an in-depth defense strategy to protect them against such attacks. Whitelisting is a key component of such a strategy.

Source: ThinkStock
 
Wednesday December 23, 2015. 3.30 p.m. People in the Ivano-Frankivsk region of Ukraine were preparing to go home from work. Suddenly, three power distribution centers went mute, tripping some 60 substations. That left around 230,000 residents in the cold and dark. 
 
The outages were the result of an unprecedented cyber-attack—the first to take out a power grid—launched by some very skillful hackers. Despite the limited damage caused, the episode demonstrates that cyber-attacks to control systems have stepped up to another level—well planned, multiple-step and highly sophisticated.
 
The attacks have highlighted the need for very effective cyber-defense mechanisms to protect control systems. Whitelisting is a security solution that represents a key layer in a global defense strategy. Sharon Xia, GE Grid Solutions principal software architect, explains: “Whitelisting is the opposite of anti-virus software. The latter is a blacklisting solution, detecting and quarantining known—but not unknown—malicious code. On the other hand, whitelisting assumes that everything is bad unless told that the application is authorized and safe to run. It prevents malware because it refuses to allow all unwanted software—known or unknown. As a result, it is much more effective than the anti-virus approach.”

 

e-terra tested

To help utilities to protect their applications more tightly, GE Grid Solutions has tested the industry-leading whitelisting solution, Intel’s McAfee Application Control, on its e-terra Energy Management System and e-terrapipeline. “This was a proof-of-concept test,” Xia points out, “with the objective of verifying that McAfee Application Control is compatible with the Grid Solutions products.” The test results have demonstrated that it is technically feasible to use an application whitelisting solution in e-terra systems. Utilities can now deploy the McAfee solution in the knowledge that it will function correctly. “In fact, one e-terrapipeline customer has already deployed it,” says Xia, “and other customers have expressed interest, especially after the Ukraine attack.”
 

Setting up for security

There are, of course, a number of precautions to take when configuring a whitelisting solution. “This demands a certain investment in time and resources, but that is well worth the effort considering the benefits,” says Xia. The first step is to build an application whitelist on each host in the system. Some application whitelisting solutions are able to pull the list off the host automatically. However, the list should be reviewed to make sure that all required applications and binaries are listed, and none of the unused applications are in. It is a good opportunity to baseline the system while creating the whitelist. 
 
Another key step is testing. A thorough functional test is required to ensure system availability. Different application whitelisting solutions support different testing modes. The McAfee Application Control1 solution supports “Observe” mode. When running in this mode, it emulates “Enabled” mode, except that it records observations rather than preventing applications or code from running. Each observation is logged and corresponds to the action McAfee Application Control would take in “Enabled” mode. “We recommend that customers run the whitelisting solution in ‘Observe’ mode after the baseline whitelist is established, conduct a full functional test for e-terra applications, review the log, and adjust the security policies in Application Control, if necessary,” Xia explains.
 
Because application environments are dynamic, whitelisting deployment needs to be underpinned by a software patch and update process. This means that any application whitelisting solution has to be set up to allow planned software updates and patches, otherwise the system may simply stop working. The McAfee Application Control program includes mechanisms to do this. For example, after adding the Grid Solutions certificate as a trusted supplier, all software signed by that certificate can be run, including installation kits and upgrade kits. “However,” adds Xia, “to be on the safe side, we recommend a thorough functional test after each software update or patch. In fact, continuous monitoring of application health is crucial in ensuring that all applications run as they should. In any case, GE Grid Solutions consultants are available to help customers install, run and monitor the whitelisting solution.”
 

1: McAfee Application Control is a trademark of Intel

X

Sign In

Connectez-vous

You may login with either your assigned username or your e-mail address.

The password field is case sensitive.

Forgot your password? Click here

X

SEND TO A FRIEND

Your request has been registered!
X

Forget your password?

Fields marked with an asterisk (*) are mandatory