Best Practices For Securing An Intelligent Building Management System
Best Practices For Securing An Intelligent Building Management System
Best Practices For Securing An Intelligent Building Management System
an Intelligent Building
Management System
System integrators, network administrators,
and facilities personnel need to apply best practices
for securing an iBMS throughout its lifecycle.
Introduction ........................................................................................................ 3
Appendix ...........................................................................................................15
White Paper
Introduction
The goal is to provide responsible parties with the basic knowledge to develop a
comprehensive plan that addresses the iBMS security needs of their organization.
The information presented is general and should not be interpreted as a one-size-
fits-all approach to security. Any well-balanced security plan takes into account
the size of the facility, the impact of a potential breach, and projected installation
and operation costs. Each organization should evaluate its tolerance for risk,
quantify its willingness to invest in mitigation measures, and act accordingly.
The primary focus of the design phase is to establish a boundary around the iBMS
and provide ways to control and monitor access. The decisions made during this
phase determine many of the security options available in later phases. Therefore,
The mantra of any good
security engineer is Security is
it is essential to solicit input from the people who will be responsible for the
installation and operation of the system. Physical security, network infrastructure,
not a product, but a process.
Bruce Schneier,
and device selection are important elements of the design process.
Security Specialist and Author
Physical Security
No security plan is complete unless it addresses the need for physical security.
Physical security prevents unauthorized access to the iBMS devices, networks,
and information. Without it, intruders have the means to circumvent all other
methods of protection.
Network Infrastructure
The network is the conduit that allows information to flow between the iBMS,
the enterprise system, and the outside world. Intruders able to tap into the
network can disrupt the flow of information. The example architecture diagram
on the next page illustrates these practices.
FIRE ENTERPRISE
Outside World
WALL
Internet
Wireless DMZ VPN
FIRE
access WALL Remote
point
Corporate
Sites
Public access servers (web, reports, email)
Vendors
BUILDING and Partners
VLAN
Isolate the iBMS as much as possible. Locating it on a virtual local area network (VLAN), for example, ensures
that building traffic, including broadcasts to all nodes, remains within the logical boundary you establish.
Think carefully before granting outside access. Each network entry and exit point must be secured. By
granting access only when a valid reason exists, you can minimize risk and keep security costs down.
Place a firewall at every transition point into or out of the iBMS network.
Providing recommendations for the proper selection and placement of firewalls is a detailed endeavor and is
beyond the scope of this document.
Consider stronger authentication methods for critical host devices such as: Behavior and content control (email, web)
Two-Factor Authentication limits access to users with both a password Application level proxy server
and a physical token.
Deep packet inspection
Restrict Remote Access
Requires special expertise for proper
Providing iBMS access to remote users presents a unique set of security selection and configuration
challenges. Addressing these challenges requires building additional protections
into the network infrastructure. Even then, remote access should only be
considered for systems that already have sufficient protection against external
threats. Best practices for providing remote access include:
Use secure protocols and applications such as HTTPS, SSH, and SCP/SFTP
whenever possible and avoid Telnet and FTP.
Consider the following best practices when selecting advantages over wired technology including lower
unreadable to unauthorized users. Integrity and support for the highest level of encryption
Removable media, such as USB memory sticks and compact discs, are often
the source of malicious software. The safest solution is to prevent the use of
all removable media, by mechanically blocking ports, for example. For those
applications where removable media is necessary, take measures to restrict
port access and enforce media checking procedures (i.e. anti-virus scans).
Enable the security features built into each device including encryption,
firewall capability, access control, intrusion detection and prevention,
and user authorization.
Host Devices
Disable every users access to the system by default and add permissions
only as required.
Create logs to monitor all aspects of the system including physical access,
network activity, device activity, and firewall configuration. Consider system
performance when setting logging parameters and collect log files in a central
location to prevent unauthorized modification.
If you are using an intrusion detection system, take the time to thoroughly
understand the capabilities and limitations of the system you selected before
configuring the alerts and active response rules that will govern its operation.
Configuration rules should reflect the operating behavior of your network
which may differ significantly from those of a typical enterprise network.
Operate Securely
The need to address security does not end once a system has been installed.
System monitoring, account management, patch management, and firewall An annual report on data breaches, a subset
maintenance are all important to operating a system securely. of the overall security landscape, highlights the
importance of system monitoring.
Monitor the System
Out of 141 confirmed data breaches in 2009:
Through vigilant monitoring of system parameters, you can detect security
breaches earlier and take steps to limit the spread of damage. Monitoring 86% of the victims had log files
guidelines include: containing evidence of a breach
Treat alerts from intrusion detection systems with the highest priority. 61% were discovered by someone
other than the victim
Proactively scan the network for new hosts and out-of-date systems.
Verizon 2010 Data Breach Investigations Report, Verizon RISK
Team in cooperation with the United States Secret Service
Routinely review system logs for irregular activities. Indicators such as
numerous failed login attempts, unusual credential card use, and increases in
network load can provide early signs of a breach.
Take Inventory
Make a list of the devices that will require periodic security updates. The list
should include network devices such as routers, firewalls, and VPN concentrators,
as well as application and operating system software.
Use vendor issued firmware updates, service packs, and hot fixes.
A method of prioritizing patches. Most patches are routine updates that can
be implemented according to a schedule. Others require immediate action to
close a critical gap in security.
Security training works best if participation is mandated and the training itself is
monitored for effectiveness.
Checks to verify that security procedures are being followed and security
systems are not being bypassed
Summary
Appendix
Additional Resources
Hardening Windows-based Host Devices
The Microsoft Security Compliance Manager is a free tool for hardening a Windows
based system: http://technet.microsoft.com/en-us/library/cc677002.aspx.
References
Guide to Industrial Control Systems (ICS) Security - National Institute of Standards
and Technology (NIST), Keith Stouffer, Joe Falco, Karen Scarfone 2008
Protecting Industrial Control Systems from Electronic Threats, Joseph Weiss, 2010
Schneider Electric All brand names, trademarks and registered trademarks are the property of their respective owners.
Information contained within this document is subject to change without notice.
One High Street,
North Andover, MA 01845 USA
Telephone: +1 978 975 9600
Fax: +1 978 975 9674
www.schneider-electric.com/buildings