About the Author |
|
xiii | |
About the Technical Editor |
|
xv | |
Foreword |
|
xvii | |
|
|
1 | (6) |
|
Book Overview and Key Learning Points |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
How This Book Is Organized |
|
|
3 | (2) |
|
Chapter 2 About Industrial Networks |
|
|
3 | (1) |
|
Chapter 3 Introduction to Industrial Network Security |
|
|
4 | (1) |
|
Chapter 4 Industrial Network Protocols |
|
|
4 | (1) |
|
Chapter 5 How Industrial Networks Operate |
|
|
4 | (1) |
|
Chapter 6 Vulnerability and Risk Assessment |
|
|
4 | (1) |
|
Chapter 7 Establishing Secure Enclaves |
|
|
4 | (1) |
|
Chapter 8 Exception, Anomaly, and Threat Detection |
|
|
4 | (1) |
|
Chapter 9 Monitoring Enclaves |
|
|
5 | (1) |
|
Chapter 10 Standards and Regulations |
|
|
5 | (1) |
|
Chapter 11 Common Pitfalls and Mistakes |
|
|
5 | (1) |
|
|
5 | (2) |
|
Chapter 2 About Industrial Networks |
|
|
7 | (24) |
|
Industrial Networks and Critical Infrastructure |
|
|
7 | (5) |
|
|
8 | (3) |
|
Critical versus Noncritical Industrial Networks |
|
|
11 | (1) |
|
Relevant Standards and Organizations |
|
|
12 | (6) |
|
Homeland Security Presidential DirectiveSeven/HSPD-7 |
|
|
12 | (1) |
|
NIST Special Publications (800 Series) |
|
|
13 | (1) |
|
|
13 | (1) |
|
Nuclear Regulatory Commission |
|
|
13 | (2) |
|
Federal Information Security Management Act |
|
|
15 | (1) |
|
Chemical Facility Anti-Terrorism Standards |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Common Industrial Security Recommendations |
|
|
18 | (7) |
|
Identification of Critical Systems |
|
|
18 | (2) |
|
Network Segmentation/Isolation of Systems |
|
|
20 | (3) |
|
|
23 | (1) |
|
|
24 | (1) |
|
The Use of Terminology Within This Book |
|
|
25 | (3) |
|
Networks, Routable and Non-routable |
|
|
25 | (1) |
|
Assets, Critical Assets, Cyber Assets, and Critical Cyber Assets |
|
|
25 | (1) |
|
|
26 | (1) |
|
Electronic Security Perimeters |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (3) |
|
Chapter 3 Introduction to Industrial Network Security |
|
|
31 | (24) |
|
The Importance of Securing Industrial Networks |
|
|
31 | (3) |
|
The Impact of Industrial Network Incidents |
|
|
34 | (2) |
|
|
34 | (1) |
|
Consequences of a Successful Cyber Incident |
|
|
35 | (1) |
|
Examples of Industrial Network Incidents |
|
|
36 | (5) |
|
|
38 | (3) |
|
|
41 | (1) |
|
|
41 | (11) |
|
The Advanced Persistent Threat |
|
|
43 | (1) |
|
|
44 | (1) |
|
Emerging Trends in APT and Cyber War |
|
|
45 | (4) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (2) |
|
Chapter 4 Industrial Network Protocols |
|
|
55 | (34) |
|
Overview of Industrial Network Protocols |
|
|
55 | (1) |
|
|
56 | (5) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (5) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Security Improvements over Modbus |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (7) |
|
|
66 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (5) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (2) |
|
|
77 | (1) |
|
Other Industrial Network Protocols |
|
|
78 | (5) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (3) |
|
Chapter 5 How Industrial Networks Operate |
|
|
89 | (22) |
|
|
89 | (8) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (2) |
|
Business Information Consoles and Dashboards |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (2) |
|
Control System Operations |
|
|
100 | (6) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Business Information Management |
|
|
104 | (2) |
|
Control Process Management |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
109 | (2) |
|
Chapter 6 Vulnerability and Risk Assessment |
|
|
111 | (36) |
|
|
111 | (12) |
|
|
112 | (4) |
|
Targeting an Industrial Network |
|
|
116 | (6) |
|
|
122 | (1) |
|
Accessing Industrial Networks |
|
|
123 | (9) |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (5) |
|
|
132 | (1) |
|
Determining Vulnerabilities |
|
|
132 | (8) |
|
Why Vulnerability Assessment Is Important |
|
|
133 | (4) |
|
Vulnerability Assessment in Industrial Networks |
|
|
137 | (1) |
|
Vulnerability Scanning for Configuration Assurance |
|
|
138 | (1) |
|
Where to Perform VA Scans |
|
|
139 | (1) |
|
Cyber Security Evaluation Tool |
|
|
140 | (1) |
|
|
140 | (4) |
|
|
141 | (2) |
|
|
143 | (1) |
|
Device Removal and Quarantine |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
Chapter 7 Establishing Secure Enclaves |
|
|
147 | (42) |
|
Identifying Functional Groups |
|
|
148 | (13) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (3) |
|
Using Functional Groups to Identify Enclaves |
|
|
159 | (2) |
|
|
161 | (5) |
|
Identifying Enclave Perimeters |
|
|
161 | (3) |
|
|
164 | (1) |
|
Enclaves and Security Policy Development |
|
|
164 | (1) |
|
Enclaves and Security Device Configurations |
|
|
164 | (2) |
|
Securing Enclave Perimeters |
|
|
166 | (15) |
|
Selecting Perimeter Security Devices |
|
|
166 | (3) |
|
Implementing Perimeter Security Devices |
|
|
169 | (3) |
|
Intrusion Detection and Prevention (IDS/IPS) Configuration Guidelines |
|
|
172 | (9) |
|
Securing Enclave Interiors |
|
|
181 | (4) |
|
Selecting Interior Security Systems |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
186 | (3) |
|
Chapter 8 Exception, Anomaly, and Threat Detection |
|
|
189 | (26) |
|
|
190 | (2) |
|
Behavioral Anomaly Detection |
|
|
192 | (7) |
|
|
192 | (2) |
|
|
194 | (5) |
|
|
199 | (6) |
|
|
199 | (1) |
|
|
200 | (2) |
|
Application Behavior Whitelists |
|
|
202 | (3) |
|
|
205 | (8) |
|
|
206 | (5) |
|
Correlating between IT and OT Systems |
|
|
211 | (2) |
|
|
213 | (1) |
|
|
213 | (2) |
|
Chapter 9 Monitoring Enclaves |
|
|
215 | (34) |
|
Determining What to Monitor |
|
|
216 | (13) |
|
|
217 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
User Identities and Authentication |
|
|
223 | (2) |
|
|
225 | (3) |
|
|
228 | (1) |
|
Successfully Monitoring Enclaves |
|
|
229 | (7) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (3) |
|
Information Collection and Management Tools (Log Management Systems, SIEMs) |
|
|
233 | (3) |
|
Monitoring Across Secure Boundaries |
|
|
236 | (1) |
|
|
236 | (6) |
|
|
237 | (3) |
|
|
240 | (1) |
|
|
241 | (1) |
|
Incident Investigation and Response |
|
|
241 | (1) |
|
Log Storage and Retention |
|
|
242 | (3) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (1) |
|
|
246 | (3) |
|
Chapter 10 Standards and Regulations |
|
|
249 | (54) |
|
Common Standards and Regulations |
|
|
250 | (4) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Mapping Industrial Network Security to Compliance |
|
|
254 | (39) |
|
Perimeter Security Controls |
|
|
255 | (1) |
|
|
255 | (24) |
|
Security Monitoring Controls |
|
|
279 | (14) |
|
Mapping Compliance Controls to Network Security Functions |
|
|
293 | (1) |
|
Common Criteria and FIPS Standards |
|
|
293 | (7) |
|
|
293 | (7) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (3) |
|
Chapter 11 Common Pitfalls and Mistakes |
|
|
303 | (10) |
|
|
303 | (2) |
|
Vulnerability Assessments vs. Zero-Days |
|
|
303 | (1) |
|
Real Security vs. Policy and Awareness |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (3) |
|
Default Accounts and Passwords |
|
|
306 | (1) |
|
Lack of Outbound Security and Monitoring |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (2) |
|
|
308 | (1) |
|
The "One Week Compliance Window" |
|
|
309 | (1) |
|
|
310 | (2) |
|
|
310 | (1) |
|
Insufficiently Sized Security Controls |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
Glossary |
|
313 | (10) |
Appendix A |
|
323 | (2) |
Appendix B |
|
325 | (4) |
Appendix C |
|
329 | (2) |
Index |
|
331 | |