Secure remote management for ICS
When performing security assessments for ICS (industrial control system) customers, it is often noticed that several different remote access paths for suppliers are used for remote management purposes. Most of these are established through a separate DSL line. Makes sense, right? A solution like this makes it easier for the vendor to provide remote maintenance. The setup is simple for the customer and the IT department can be bypassed.
I disagree! Let me explain why this type of setup is worrysome, how it can be improved and why better designed remote access solutions are important.
Security and maintenance
There’s a reason that a security conscious IT department is usually very reluctant to set up remote access paths that bypass the regular network.
Sometimes those DSL lines have their own security measures built in. But usually, they don’t have any at all. This leaves the burden of securing these lines with the IT department again. And with added security comes complexity and an increase in maintenance efforts – usually for both vendor and client.
A vendor that has some operational responsibility over the installation, should be more concerned with the security of his devices. They are more easily accessible from insecure networks through the DSL. The vendor will have to put more effort into patching and updating them.
A risk-aware IT department will usually add some extra security measures to the mix. A firewall and a VPN solution are the bare minimum. Those require maintenance, patching and monitoring. If those measures are not added, the alternative is usually to limit the window of opportunity by only enabling the DSL line when the vendor needs access. This adds to the responsibilities of IT staff: a strict procedure has to be followed. If not, lines may be kept open indefinitely, exposing critical ICS systems to the world! This happens more often than you would expect and it is something we definitely look for when scanning for security problems..
To avoid breaches, our client has to verify the security of their ICT infrastructure on a regular basis. This can be done using recurring penetration testing and system analysis. Every remote connection in use has to be tested, be it DSL line, leased line or modem connection. That’s a lot of work. If weaknesses are discovered, the lack of monitoring on these access points makes it hard to figure out whether an intrusion may have already occurred.
A secure solution
There IS a manageable solution to this problem that is also secure.
A proper and secure remote management solution for process environments should be:
- centralised
- time based
- source IP controlled
- using strong user authentication
- monitored and logged