Policies
OT Security includes policies that define specific types of events that are suspicious, unauthorized, anomalous, or otherwise noteworthy that occur in the network. When an event occurs that meets all of the Policy Definition conditions for a particular policy, the system generates an event. The system logs the event and sends notifications in accordance with the Policy Actions configured for the policy.
-
Policy-based Detection — Triggers an event when the precise conditions of the policy, as defined by a series of event descriptors, are met.
-
Anomaly Detection — Triggers an event when OT Security detects anomalous or suspicious activity in the network.
OT Security features a set of predefined policies (out-of-the-box). In addition, you can edit the predefined policies or define new custom policies.
Note: By default, most policies are turned on. To turn Policies on/off, see Enable or Disable Policies.
Policy Configuration
Each policy consists of a series of conditions that define a specific type of behavior in the network. This includes considerations such as the activity, the assets involved, and the timing of the event. Only an event that conforms to all the parameters set in the policy triggers an event for that policy. Each policy has a designated Policy Actions configuration, which defines the severity, notification methods, and logging of the event.
Groups
An essential component in the definition of policies in OT Security is the use of Groups. When configuring a policy, each policy parameter belongs to a group as opposed to individual entities. This streamlines the policy configuration process. For example, if the Activity Firmware update is considered a suspicious activity when it is performed on a controller during certain hours of the day (for example, during work hours), instead of creating a separate policy for each controller in your network, you can create a single policy that applies to the Asset Group Controllers.
Policy configuration uses the following types of groups:
-
Asset Groups — The system comes with predefined Asset Groups based on asset type. You can add custom groups based on other factors such as location, department, criticality, and so on.
-
Network Segments — The system creates auto-generated Network Segments based on asset type and IP range. You can create custom Network Segments defining any group of assets having similar communication patterns.
-
Email Groups — Group multiple email accounts that receive email notifications for specific events. For example, grouping by role, department, and so on.
-
Port Groups — Group ports used in a similar manner. For example, ports that are open on Rockwell controllers.
-
Protocol Groups — Group communication protocols by the type of protocol (for example, Modbus), the manufacturer (for example, Rockwell allowed protocols), and so on.
-
Schedule Groups — Group several time ranges as a schedule group that has a certain common characteristic. For example, work hours, weekends, and so on.
-
Tag Groups — Group tags that contain similar operational data in various controllers. For example, tags that control furnace temperature.
-
Rule Groups — Group-related rules identified by their Suricata Signature IDs (SIDs). These groups are used as a policy condition for defining Intrusion Detection Policies.
Policies can only be defined using groups configured in your system. The system comes with a set of predefined groups. You can edit these groups and add your own groups, see Groups
Severity Levels
Each policy has a specific severity level assigned to it that indicates the degree of risk posed by the situation that triggered the event. The following table describes the various severity levels:
Severity | Description |
---|---|
None | The event is not cause for concern. |
Low | No immediate reason for concern. Should be checked out when convenient. |
Medium | Moderate concern that potentially harmful activity has occurred. Should be dealt with when convenient. |
High | Severe concern that potentially harmful activity has occurred. Should be dealt with immediately. |
Event Notifications
When an event occurs that matches the conditions of the policy, an event is triggered. The Events section shows All Events. The Policy page lists the event under the policy that triggered the event and the Inventory page lists the event under the affected Asset. In addition, you can configure policies to send notification of events to an external SIEM using the Syslog protocol and/or to designated email recipients.
-
Syslog Notification — Syslog messages use the CEF protocol with both Standard Keys and Custom Keys (configured for use with OT Security). For an explanation of how to interpret Syslog notifications see the OT Security Syslog Integration Guide.
-
Email Notifications — Email messages include details about the event that generated the notification and the steps to mitigate the threat.
Policy Categories and Sub-Categories
OT Security organizes the policies by the following categories:
-
Configuration Events — These policies relate to the activities that occur in the network. There are two sub-categories:
-
Controller Validation — These Policies relate to changes that take place in the controllers in the network. This can involve changes in the state of a controller as well as changes to the firmware, asset properties, or code blocks. The policies can be limited to specific schedules (for example, firmware upgrade during a work day), and/or specific controllers.
-
Controller Activities — These policies relate to specific engineering commands that impact controllers’ state and configuration. It is possible to define specific activities that always generate events or to designate a set of criteria for generating events. For example, if certain activities are performed at certain times and/or on certain controllers. Both block lists and allowlists of assets, activities, and schedules are supported.
-
-
Network Events — These policies relate to the assets in the network and the communication streams between assets. This includes assets added to or removed from the network. It also includes traffic patterns that are anomalous for the network or flagged as raising cause for concern. For example, if an engineering station communicates with a controller using a protocol that is not part of a pre-configured set of protocols (for example, protocols used by controllers manufactured by a specific vendor), the policy triggers an event. You can limit these policies to specific schedules and/or specific assets. Vendors organize vendor-specific protocols for convenience, while any protocol can be used in a policy definition.
-
SCADA Event Policies — These policies detect changes in set-point values, which can harm the industrial process. These changes may result from a cyber-attack or human error.
-
Network Threats Policies — These policies use signature-based OT and IT threat detection to identify network traffic that is indicative of intrusion threats. The detection is based on rules cataloged in Suricata's Threats engine.
Policy Types
Within each category and sub-category, there are a series of different types of policies. OT Security includes the predefined policies of each type. You can also create your own custom policies of each type. The following tables explain the various Policy Types, grouped by category.
Controller Activities relate to the activities that occur in the network. For example, the “commands” implemented between assets in the network. There are many different types of Controller Activity Events. The type of controller on which the activity occurs and the specific activity defines the Controller Activity type. For example, Rockwell PLC stop, SIMATIC code download, Modicon online session, and so on.
The policy definition parameters or policy conditions that apply to Controller Activity Events are Source Asset, Destination Asset, and Schedule.
The following table describes the various types of Controller Validation Events.
Note: Policy conditions relating to Affected Assets, Sources, or Destinations can be specified by selecting either an Asset Group or a Network Segment.
Event Type | Policy Conditions | Description |
---|---|---|
Change in key switch | Affected Asset, Schedule | A change to the controller state by adjusting the physical key position. Currently supports Rockwell controllers only. |
Change in state | Affected Asset, Schedule | The controller changed from one operational state to another. For example, running, stopped, test, and so on. |
Change in firmware version | Affected Asset, Schedule | A change to the firmware running on the controller. |
Module not seen | Affected Asset, Schedule | Detects a previously identified module that removed from a backplane. |
New module discovered | Affected Asset, Schedule | Detects a new module added to an existing backplane. |
Snapshot mismatch | Affected Asset, Schedule | The most recent Snapshot (which captures the current state of the program deployed on a controller) of a controller was not identical to the previous Snapshot of that controller. |
The following table describes the various types of Network Events.
Event Type | Policy Conditions | Description |
---|---|---|
Asset not seen | Not seen for, Affected Asset, Schedule | Detects previously identified assets in the Affected Asset Group that are removed from the network for the specified duration of time during the specified time range. |
Change in USB configuration | Affected Assets, Schedule | Detects when a USB device is connected to or removed from a Windows-based workstation. The policy applies to changes to an asset in the Affected Asset Group during the specified time range. |
IP conflict | Schedule | Detects multiple assets in the network using the same IP Address. This may indicate a cyber-attack or it may result from poor network management. The policy applies to IP Conflicts that OT Security discovers during the specified time range. |
Network Baseline Deviation | Source, Destination, Protocol, Schedule | Detects new connections between assets that did not communicate with each other during the Network Baseline sampling. This option is only available once a Network Baseline is set up in the system. To set the initial Network Baseline or to update the Network Baseline, see Setting a Network Baseline. The policy applies to communication from an asset in the Source Asset Group to an asset in the Destination Asset Group using a Protocol from the Protocol Group during the specified time range. |
New asset discovered | Affected Asset, Schedule | Detects new assets of the type specified in the Source Asset Group that appears in your network during the specified time range. |
Open port | Affected Asset, Port | Detects new open ports in your network. Unused open ports can pose a security risk. The policy applies to assets in the Affected Asset Group and to ports that are in the Port Group. |
Spike in network traffic | Time window, Sensitivity level, Schedule | Detects anomalous spikes in the network traffic volume. The policy applies to spikes relative to the specified time window and based on the specified sensitivity level. It is also limited to the specified time range. |
Spike in conversation | Time window, Sensitivity level, Schedule | Detects anomalous spikes in the number of conversations in the network. The policy applies to spikes relative to the specified time window and based on the specified sensitivity level. It is also limited to the specified time range. |
RDP connection (authenticated) | Source, Destination, Schedule | An RDP (Remote Desktop Connection) was made in the network using authentication credentials. The Policy applies to asset in the Source Asset Group connecting to an asset in the Destination Asset Group during the specified time range. |
RDP connection (not authenticated) | Source, Destination, Schedule | An RDP (Remote Desktop Connection) made in the network without using authentication credentials. The policy applies to asset in the Source Asset Group connecting to an asset in the Destination Asset Group during the specified time range. |
Unauthorized conversation | Source, Destination, Protocol, Schedule | Detects communication sent between assets in the network. The policy applies to communication sent from an asset in the Source Asset Group to an asset in the Destination Asset Group using a Protocol from the Protocol Group during the specified time range. |
Successful unsecured FTP login | Source, Destination, Schedule | OT Security considers FTP as an unsecure protocol. This policy detects successful logins using FTP. |
Failed unsecured FTP login | Source, Destination, Schedule | OT Security considers FTP as an unsecure protocol. This policy detects failed login attempts using FTP. |
Successful unsecured Telnet login | Source, Destination, Schedule | OT Security considers Telnet as an unsecure protocol. This policy detects successful logins using Telnet. |
Failed unsecured Telnet login | Source, Destination, Schedule | OT Security considers Telnet as an unsecure protocol. This policy detects failed login attempts using Telnet. |
Unsecured Telnet login attempt | Source, Destination, Schedule | OT Security considers Telnet as an unsecure protocol. This policy detects login attempts using Telnet (for which the result status is not detected). |
The following table describes the various types of Network Threat Events.
Note: Policy conditions relating to Affected Assets, Sources, or Destinations can be specified by selecting either an Asset Group or a Network Segment.
Event Type | Policy Conditions | Description |
---|---|---|
Intrusion Detection | Source, Affected Asset, Rule Group, Schedule |
Intrusion Detection Policies use signature-based OT and IT threat detection to identify network traffic that is indicative of intrusion threats. The detection is based on rules that are cataloged in Suricata’s Threats engine. The rules are grouped into categories (for example, ICS Attacks, Denial of Service, Malware, and so on.) and sub-categories (for example, ICS Attacks - Stuxnet, ICS Attacks – Black Energy, and so on). The system comes with a series of predefined groups of related rules. You can also configure your own custom groupings of various rules.
Note: You cannot edit the Source and Destination asset groups for Intrusion Detection System (IDS) events. |
ARP scan | Affected Asset, Schedule | Detects ARP scans (network reconnaissance activity) that are run in the network. The policy applies to scans that are broadcasted in the Affected Asset Group during the specified time range. |
Port scan | Source Asset, Destination Asset, Schedule | Detects SYN scans (network reconnaissance activity) that are run in the network to detect open (vulnerable) ports. The policy applies to communication from an asset in the Source Asset Group to an asset in the Destination Asset Group during the specified time range. |
The following table describes the various types of SCADA Event types.
Note: Policy conditions relating to Affected Assets, Sources, or Destinations can be specified by selecting either an Asset Group or a Network Segment.
Event Type | Policy Conditions | Description |
---|---|---|
Modbus illegal data address | Source Asset, Destination Asset, Schedule | Detects "illegal data address" error code in Modbus protocol. The policy applies to communication from an asset in the Source Asset Group to an asset in the Destination Asset Group during the specified time range. |
Modbus illegal data value | Source Asset, Destination Asset, Schedule | Detects "illegal data value" error code in Modbus protocol. The policy applies to communication from an asset in the Source Asset Group to an asset in the Destination Asset Group during the specified time range. |
Modbus illegal function | Source Asset, Destination Asset, Schedule | Detects "illegal function" error code in Modbus protocol. The policy applies to communication from an asset in the Source Asset Group to an asset in the Destination Asset Group during the specified time range. |
Unauthorized write | Source Asset, Tag Group, Tag value, Schedule | Detects unauthorized tag writes to the specified tags on a controller (currently supported for Rockwell and S7 controllers) in the specified Source Asset Group. You can configure the policy to detect any new write, a change from a specified value or a value outside of a specified range. The policy only applies during the specified time range. |
ABB - Unauthorized write | Source Asset, Destination Asset, Schedule | Detects write commands sent over MMS to ABB 800xA controllers that are out of the allowed range. |
IEC 60870-5-104 Commands (Start/Stop Data Transfer, Interrogation Command, Counter Interrogation Command, Clock Synchronization Command, Reset Process Command, Test Command with Time Tag) | Source Asset, Destination Asset, Schedule | Detects specific commands sent to IEC-104 parent or child units that are considered to be risky. |
DNP3 Commands | Source Asset, Destination Asset, Schedule | Detects all main commands sent using DNP3 protocol. For example Select, Operate, Warm/Cold Restart, and so on. Also detects errors originating from internal indicators such as unsupported function codes and parameter errors. |