POWER May 2016 - 48

INSTRUMENTATION & CONTROL
2. Remote access attack. The Ukraine grid attack was made possible by a simple first
step. Courtesy: Michael Toecker
same goes for poor cybersecurity infrastructure.
The industry has been lucky that motivated
attackers are spending more time on
credit cards and personal data than on compromising
control systems.
The Vendor Challenge
Remote service providers/vendors actually
present a larger risk than those existing
at an individual power plant. Vendors who
remotely access generation facilities usually
have contracts with multiple facilities
and routinely install their own methods
for remote access to the site. Methods of
access provided by remote vendors are
often very poor. Vendor-installed remote
access gains this distinction by a combination
of:
generators, 24/7, always available, remote
access by critical personnel can mean the difference
between being in the red and being
in the black.
Additionally, there are now service providers
that offer remote services to support generators
from afar. These services range from
very mundane predictive maintenance to full
engineering and control system work, all
done via the Internet, all using some form of
interactive remote access. Service providers
in this area are even more interesting because
they have the potential to access many different
generation facilities remotely, and, presumably,
use the passwords for that remote
access from their own corporate systems.
Remote Access Vulnerability in
Power Generation
When vulnerability assessments are conducted
on generation systems, it's the
North American Electric Reliability Corp.
Critical Infrastructure Protection (NERC
CIP)-regulated entities that are the most
resilient to this sort of attack. NERC requires
two-factor authentication, a method
stronger than just a password. The two-factor
approach is very resistant to password
stealing, as it requires a password plus access
to a physical token (Figure 3). An at3.
A two-factor authentication token.
Courtesy: Wikipedia Contributor Kharitonov
tacker
can steal the password by infecting
your desktop system, but the physical token
cannot be captured as easily. There are
other means of providing two-factor authentication,
but this is the standard NERC
implementation used by many utilities and
owners of power infrastructure.
The physical token generates a unique
string of numbers every 30 to 60 seconds.
The unique numbers are the output of a timebased
function, which is also stored and computed
on your security systems. When users
want remote access, they enter their username,
password, and unique numbers. If all
three are correct, then they are allowed into
the system.
For generation facilities that are nonNERC,
of which there are many, the vulnerability
assessment is not as promising.
Without the NERC requirements for two-factor
authentication, many generation facilities
have extremely poor security for their remote
access, generally one of the methods shown
in Figure 4.
Because the remote access infrastructure
isn't a direct part of the revenue stream, generators
treat remote access with a very casual
attitude. On the one hand, they will often
consider remote access to be a vital business
need, paramount to maintaining production
by allowing personnel to troubleshoot from
anywhere, at any time. Then, often in the
same breath, generation owners will refuse
to invest in a reasonable and standards-based
method of ensuring that their vital remote access
is reliable and secure.
If engineers bought and installed protective
relays with the same attitude used when
buying infrastructure for remote control via
the Internet, there would be more broken and
unreliable generation facilities. A poor protection
relay might work pretty well under
normal conditions, but it would likely fail
to protect equipment in a real-world event,
where conditions are less predictable. The
48
www.powermag.com
■ Poor proposal requirements for security.
■ A vendor's need for fast, simple, and
cheap-where security isn't welcome.
■ A budget need to award the support contract
to the cheapest vendor.
Here's one example (some details have
been changed to obscure the vendor and implementation).
Years ago, I was conducting a
vulnerability assessment at a facility where
the remote access router had been installed
for use by the facility's distributed control
system (DCS) vendor. It used a strong virtual
private network (VPN), the equivalent of
a deadbolt on a good steel door, and used a
physical key to enable and disable remote access.
While it was not two-factor authentication,
this was a reasonable method, on paper,
for remotely accessing the facility. Vendor
personnel would call in and request access,
and an operator would " turn the key " in order
to allow the vendor to access the systems. At
the end of the need, the vendor would call
back in and let the operator know to disable
the remote access by literally turning the key
to the lock position.
Problems with this method became apparent
quickly:
■ Facility personnel routinely forgot to turn
the remote access off, so it would stay enabled
for months at a time, directly connected
to the vendor's internal network via
that same VPN connection.
■ The vendor would often forget to call the
operators when the work was complete.
■ There were also no procedures specifying
time limits for the remote access, nor any
regular checks to ensure it was turned off
when not in use.
■ The equipment was not open to inspection
by the generator-it was part of a secret
sauce in the remote support market.
POWER | May 2016
http://www.powermag.com

POWER May 2016

Table of Contents for the Digital Edition of POWER May 2016

Contents
POWER May 2016 - Cover1
POWER May 2016 - Cover2
POWER May 2016 - Contents
POWER May 2016 - 2
POWER May 2016 - 3
POWER May 2016 - 4
POWER May 2016 - 5
POWER May 2016 - 6
POWER May 2016 - 7
POWER May 2016 - 8
POWER May 2016 - 9
POWER May 2016 - 10
POWER May 2016 - 11
POWER May 2016 - 12
POWER May 2016 - 13
POWER May 2016 - 14
POWER May 2016 - 15
POWER May 2016 - 16
POWER May 2016 - 17
POWER May 2016 - 18
POWER May 2016 - 19
POWER May 2016 - 20
POWER May 2016 - 21
POWER May 2016 - 22
POWER May 2016 - 23
POWER May 2016 - 24
POWER May 2016 - 25
POWER May 2016 - 26
POWER May 2016 - 27
POWER May 2016 - 28
POWER May 2016 - 29
POWER May 2016 - 30
POWER May 2016 - 31
POWER May 2016 - 32
POWER May 2016 - 33
POWER May 2016 - 34
POWER May 2016 - 35
POWER May 2016 - 36
POWER May 2016 - 37
POWER May 2016 - 38
POWER May 2016 - 39
POWER May 2016 - 40
POWER May 2016 - 41
POWER May 2016 - 42
POWER May 2016 - 43
POWER May 2016 - 44
POWER May 2016 - 45
POWER May 2016 - 46
POWER May 2016 - 47
POWER May 2016 - 48
POWER May 2016 - 49
POWER May 2016 - 50
POWER May 2016 - 51
POWER May 2016 - 52
POWER May 2016 - 53
POWER May 2016 - 54
POWER May 2016 - 55
POWER May 2016 - 56
POWER May 2016 - 57
POWER May 2016 - 58
POWER May 2016 - 59
POWER May 2016 - 60
POWER May 2016 - 61
POWER May 2016 - 62
POWER May 2016 - 63
POWER May 2016 - 64
POWER May 2016 - 65
POWER May 2016 - 66
POWER May 2016 - 67
POWER May 2016 - 68
POWER May 2016 - 69
POWER May 2016 - 70
POWER May 2016 - 71
POWER May 2016 - 72
POWER May 2016 - Cover3
POWER May 2016 - Cover4
https://www.nxtbook.com/accessintelligence/POWER/pwr_october-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr-re-tech_september-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_september-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_august-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_june-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_july-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_may-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_april-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_march-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_february-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_january-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_december-2023
https://www.nxtbook.com/accessintelligence/POWER/pwr_november-2023
https://www.nxtbook.com/accessintelligence/POWER/power-october-2023
https://www.nxtbook.com/accessintelligence/POWER/re-tech-supp-to-power-september-2023
https://www.nxtbook.com/accessintelligence/POWER/power-september-2023
https://www.nxtbook.com/accessintelligence/POWER/power-and-re-tech-supp-september-2023
https://www.nxtbook.com/accessintelligence/POWER/power-august-2023
https://www.nxtbook.com/accessintelligence/POWER/power-july-2023
https://www.nxtbook.com/accessintelligence/POWER/power-june-2023
https://www.nxtbook.com/accessintelligence/POWER/power-may-2023
https://www.nxtbook.com/accessintelligence/POWER/power-april-2023
https://www.nxtbook.com/accessintelligence/POWER/power-march-2023
https://www.nxtbook.com/accessintelligence/POWER/power-february-2023
https://www.nxtbook.com/accessintelligence/POWER/power-january-2023
https://www.nxtbook.com/accessintelligence/POWER/power-december-2022
https://www.nxtbook.com/accessintelligence/POWER/power-november-2022
https://www.nxtbook.com/accessintelligence/POWER/Power-October-2022-140th-Anniversary-Supp
https://www.nxtbook.com/accessintelligence/POWER/Power-October-2022-and-Anniversary-Supp
https://www.nxtbook.com/accessintelligence/POWER/power-and-re-tech-supp-september-2022
https://www.nxtbook.com/accessintelligence/POWER/power-september-2022
https://www.nxtbook.com/accessintelligence/POWER/power-august-2022
https://www.nxtbook.com/accessintelligence/POWER/Power-July-2022-Intl
https://www.nxtbook.com/accessintelligence/POWER/power-july-2022
https://www.nxtbook.com/accessintelligence/POWER/power-june-2022-intl
https://www.nxtbook.com/accessintelligence/POWER/power-june-2022
https://www.nxtbook.com/accessintelligence/POWER/power-may-2022
https://www.nxtbook.com/accessintelligence/POWER/power-may-2022-intl
https://www.nxtbook.com/accessintelligence/POWER/power-april-2022
https://www.nxtbook.com/accessintelligence/POWER/Power-April-2022-Intl
https://www.nxtbook.com/accessintelligence/POWER/power-march-2022
https://www.nxtbook.com/accessintelligence/POWER/power-february-2022
https://www.nxtbook.com/accessintelligence/POWER/power-january-2022
https://www.nxtbook.com/accessintelligence/POWER/power-december-2021
https://www.nxtbook.com/accessintelligence/POWER/power-top-plants-supp-december-2021
https://www.nxtbook.com/accessintelligence/POWER/power-november-2021
https://www.nxtbook.com/accessintelligence/POWER/power-october-2021
https://www.nxtbook.com/accessintelligence/POWER/power-september-2021
https://www.nxtbook.com/accessintelligence/POWER/power-august-2021
https://www.nxtbook.com/accessintelligence/POWER/power-july-2021
https://www.nxtbook.com/accessintelligence/POWER/power-june-2021
https://www.nxtbook.com/accessintelligence/POWER/power-may-2021
https://www.nxtbook.com/accessintelligence/POWER/power-april-2021
https://www.nxtbook.com/accessintelligence/POWER/power-march-2021
https://www.nxtbook.com/accessintelligence/POWER/power-february-2021
https://www.nxtbook.com/accessintelligence/POWER/power-january-2021
https://www.nxtbook.com/accessintelligence/POWER/power-december-2020
https://www.nxtbook.com/accessintelligence/POWER/power-november-2020
https://www.nxtbook.com/accessintelligence/POWER/power-october-2020
https://www.nxtbook.com/accessintelligence/POWER/power-september-2020
https://www.nxtbook.com/accessintelligence/POWER/power-august-2020
https://www.nxtbook.com/accessintelligence/POWER/power-july-2020
https://www.nxtbook.com/accessintelligence/POWER/power-june-2020
https://www.nxtbook.com/accessintelligence/POWER/power-may-2020
https://www.nxtbook.com/accessintelligence/POWER/power-april-2020
https://www.nxtbook.com/accessintelligence/POWER/power-march-2020
https://www.nxtbook.com/accessintelligence/POWER/power-february-2020
https://www.nxtbook.com/accessintelligence/POWER/power-january-2020
https://www.nxtbook.com/accessintelligence/POWER/power-december-2019
https://www.nxtbook.com/accessintelligence/POWER/power-november-2019
https://www.nxtbook.com/accessintelligence/POWER/power-october-2019
https://www.nxtbook.com/accessintelligence/POWER/power-september-2019
https://www.nxtbook.com/accessintelligence/POWER/power-august-2019
https://www.nxtbook.com/accessintelligence/POWER/power-july-2019
https://www.nxtbook.com/accessintelligence/POWER/power-june-2019
https://www.nxtbook.com/accessintelligence/POWER/power-may-2019
https://www.nxtbook.com/accessintelligence/POWER/power-april-2019
https://www.nxtbook.com/accessintelligence/POWER/power-march-2019
https://www.nxtbook.com/accessintelligence/POWER/power-february-2019
https://www.nxtbook.com/accessintelligence/POWER/power-january-2019
https://www.nxtbook.com/accessintelligence/POWER/power-december-2018
https://www.nxtbook.com/accessintelligence/POWER/power-november-2018
https://www.nxtbook.com/accessintelligence/POWER/power-october-2018
https://www.nxtbook.com/accessintelligence/POWER/power-september-2018
https://www.nxtbook.com/accessintelligence/POWER/power-august-2018
https://www.nxtbook.com/accessintelligence/POWER/power-july-2018
https://www.nxtbook.com/accessintelligence/POWER/power-june-2018
https://www.nxtbook.com/accessintelligence/POWER/power-may-2018
https://www.nxtbook.com/accessintelligence/POWER/power-april-2018
https://www.nxtbook.com/accessintelligence/POWER/power-march-2018
https://www.nxtbook.com/accessintelligence/POWER/power-february-2018
https://www.nxtbook.com/accessintelligence/POWER/power-january-2018
https://www.nxtbook.com/accessintelligence/POWER/power-december-2017
https://www.nxtbook.com/accessintelligence/POWER/power-november-2017
https://www.nxtbook.com/accessintelligence/POWER/power-october-2017
https://www.nxtbook.com/accessintelligence/POWER/power-september-2017
https://www.nxtbook.com/accessintelligence/POWER/power-august-2017
https://www.nxtbook.com/accessintelligence/POWER/power-july-2017
https://www.nxtbook.com/accessintelligence/POWER/power-june-2017
https://www.nxtbook.com/accessintelligence/POWER/power-may-2017
https://www.nxtbook.com/accessintelligence/POWER/power-april-2017
https://www.nxtbook.com/accessintelligence/POWER/power-march-2017
https://www.nxtbook.com/accessintelligence/POWER/power-february-2017
https://www.nxtbook.com/accessintelligence/POWER/power-january-2017
https://www.nxtbook.com/accessintelligence/POWER/power-december-2016
https://www.nxtbook.com/accessintelligence/POWER/power-november-2016
https://www.nxtbook.com/accessintelligence/POWER/power-october-2016
https://www.nxtbook.com/accessintelligence/POWER/power-september-2016
https://www.nxtbook.com/accessintelligence/POWER/power-august-2016
https://www.nxtbook.com/accessintelligence/POWER/power-july-2016
https://www.nxtbook.com/accessintelligence/POWER/power-june-2016
https://www.nxtbook.com/accessintelligence/POWER/power-may-2016
https://www.nxtbook.com/accessintelligence/POWER/power-april-2016
https://www.nxtbook.com/accessintelligence/POWER/power-march-2016
https://www.nxtbook.com/accessintelligence/POWER/power-february-2016
https://www.nxtbook.com/accessintelligence/POWER/power-january-2016
https://www.nxtbook.com/accessintelligence/POWER/power-december-2015
https://www.nxtbook.com/accessintelligence/POWER/power-november-2015
https://www.nxtbook.com/accessintelligence/POWER/power-october-2015
https://www.nxtbook.com/accessintelligence/POWER/power-september-2015
https://www.nxtbook.com/accessintelligence/POWER/power-august-2015
https://www.nxtbook.com/accessintelligence/POWER/power-july-2015
https://www.nxtbook.com/accessintelligence/POWER/power-june-2015
https://www.nxtbook.com/accessintelligence/POWER/power-may-2015
https://www.nxtbook.com/accessintelligence/POWER/power-april-2015
https://www.nxtbook.com/accessintelligence/POWER/power-march-2015
https://www.nxtbook.com/accessintelligence/POWER/power-february-2015
https://www.nxtbook.com/accessintelligence/POWER/power-january-2015
https://www.nxtbook.com/accessintelligence/POWER/power-december-2014
https://www.nxtbook.com/accessintelligence/POWER/power-november-2014
https://www.nxtbook.com/accessintelligence/POWER/power-october-2014
https://www.nxtbook.com/accessintelligence/POWER/power-september-2014
https://www.nxtbook.com/accessintelligence/POWER/power-august-2014
https://www.nxtbook.com/accessintelligence/POWER/power-july-2014
https://www.nxtbook.com/accessintelligence/POWER/power-june-2014
https://www.nxtbook.com/accessintelligence/POWER/power-may-2014
https://www.nxtbook.com/accessintelligence/POWER/power-april-2014
https://www.nxtbook.com/accessintelligence/POWER/power-march-2014
https://www.nxtbook.com/accessintelligence/POWER/power-february-2014
https://www.nxtbook.com/accessintelligence/POWER/power-january-2014
https://www.nxtbook.com/accessintelligence/POWER/power-december-2013
https://www.nxtbook.com/accessintelligence/POWER/power-november-2013
https://www.nxtbook.com/accessintelligence/POWER/power-october-2013
https://www.nxtbook.com/accessintelligence/POWER/power-september-2013
https://www.nxtbook.com/accessintelligence/POWER/power-august-2013
https://www.nxtbook.com/accessintelligence/POWER/power-july-2013
https://www.nxtbook.com/accessintelligence/POWER/power-june-2013
https://www.nxtbook.com/accessintelligence/POWER/power-may-2013
https://www.nxtbook.com/accessintelligence/POWER/power-april-2013
https://www.nxtbook.com/accessintelligence/POWER/power-march-2013
https://www.nxtbook.com/accessintelligence/POWER/power-february-2013
https://www.nxtbook.com/accessintelligence/POWER/power-january-2013
https://www.nxtbook.com/accessintelligence/POWER/power-december-2012
https://www.nxtbook.com/accessintelligence/POWER/power-november-2012
https://www.nxtbook.com/accessintelligence/POWER/power-october-2012
https://www.nxtbook.com/accessintelligence/POWER/power-september-2012
https://www.nxtbook.com/accessintelligence/POWER/power-august-2012
https://www.nxtbook.com/accessintelligence/POWER/power-july-2012
https://www.nxtbook.com/accessintelligence/POWER/power-june-2012
https://www.nxtbook.com/accessintelligence/POWER/power-may-2012
https://www.nxtbook.com/accessintelligence/POWER/power-april-2012
https://www.nxtbook.com/accessintelligence/POWER/power-march-2012
https://www.nxtbook.com/accessintelligence/POWER/power-february-2012
https://www.nxtbook.com/accessintelligence/POWER/power-january-2012
https://www.nxtbook.com/accessintelligence/POWER/power-november-2011
https://www.nxtbook.com/accessintelligence/POWER/power-october-2011
https://www.nxtbook.com/accessintelligence/POWER/power-september-2011
https://www.nxtbook.com/accessintelligence/POWER/power-august-2011
https://www.nxtbook.com/accessintelligence/POWER/power-july-2011
https://www.nxtbook.com/accessintelligence/POWER/power-june-2011
https://www.nxtbook.com/accessintelligence/POWER/power-may-2011
https://www.nxtbook.com/accessintelligence/POWER/power-april-2011
https://www.nxtbook.com/accessintelligence/POWER/power-march-2011
https://www.nxtbook.com/accessintelligence/POWER/power-february-2011
https://www.nxtbook.com/accessintelligence/POWER/power-january-2011
https://www.nxtbook.com/accessintelligence/POWER/power-december-2010
https://www.nxtbook.com/accessintelligence/POWER/power-november-2010
https://www.nxtbook.com/accessintelligence/POWER/power-october-2010
https://www.nxtbook.com/accessintelligence/POWER/power-september-2010
https://www.nxtbook.com/accessintelligence/POWER/power-august-2010
https://www.nxtbook.com/accessintelligence/POWER/power-july-2010
https://www.nxtbook.com/accessintelligence/POWER/power-june-2010
https://www.nxtbook.com/accessintelligence/POWER/power-may-2010
https://www.nxtbookmedia.com