Cyber Startup Observatory

The First Global Cyber Startup Observatory

  • HOME
  • Observatory
    • Observatory – All
    • Observatory – APAC
    • Observatory – CE
    • Observatory – US
    • Observatory – UK
    • Observatory – France
    • Observatory – Israel
  • Insight
    • Cross-Industry Security
      • IAM & Fraud
      • Web & App Security
      • Compliance, Regulation & Privacy
      • Cyber Posture
      • Endpoint & Mobile Security
      • Phishing
      • IR – Forensics – SOC
      • Network & Cloud Security
      • Deception
    • Industry-Specific Security
      • Financial Services
      • Healthcare
      • Industrial
      • Transportation
        • Aviation
        • Automotive
        • Rail & Metro
        • Maritime
    • SME CyberSecurity
    • AI
    • IoT – IIoT
    • OT, ICS & SCADA
    • Cyber Intelligence
    • Training, Education & Awareness
  • @CSOFinder
  • Resources
    • The CyberSlide
      • The World Map
      • CyberSlide AMERICAS
        • CyberSlide – US
        • CyberSlide – Canada
        • CyberSlide – Brazil
        • CyberSlide – Mexico
        • CyberSlide – LATAM
      • CyberSlide EMEA
        • CyberSlide – UK
        • CyberSlide – Israel
        • CyberSlide – France
        • CyberSlide – Germany
        • CyberSlide – Dutch
        • CyberSlide – Spain
        • CyberSlide – Switzerland
        • CyberSlide – Italy
        • CyberSlide – Ireland
        • CyberSlide – Poland
        • CyberSlide – Northern Europe
        • CyberSlide – Central Europe
        • CyberSlide – AFRICA
      • CyberSlide APAC
        • CyberSlide – APAC
        • CyberSlide – Singapore
        • CyberSlide – Japan
        • CyberSlide – India
        • CyberSlide – Australia
        • CyberSlide – China
    • Infographics
      • Our Infographics
      • Platinum & Gold Members
    • Video Infographics
    • Solutions – Videos
  • Awards
    • Hall of Fame
    • Cybersecurity Leaders
    • Company of the Week
  • Our Solutions
    • @CSOFinder – Sign Up
    • Observatory – Sign Up
    • eObservatory – Sign Up
    • Custom Solutions
    • The Platinum Club
  • Platform Access

The Methodology for ICS Cyber PreparednessAuthor: Daniel Ehrenreich, Consultant and Lecturer, SCCE

Introduction

The Methodology for ICS Cyber PreparednessCyber security for Industrial Control Systems (ICS) managing water and electricity supply, transportation, communications and manufacturing facilities should be very high on the priority list of top-floor executives. Educating control engineers and users on cyber security risk can only be done through well-defined methodology.

This program shall involve a) ICS operators and experts who must expand their cyber security knowledge, b) IT experts who must learn ICS basics and about specific risks and solutions related to ICS architectures and finally, c) managers who must have the knowledge needed to make correct decisions related to allocation of resources. This paper highlights a few important topics and allows you to achieve these goals effectively.

Principal differentiation among IT and ICS

IT experts interested becoming ICS cyber security experts shall adopt a few basic principles related to control systems in order to deal effectively with ICS Cyber security related challenges.

  • Prior to dealing with ICS Cyber security for their industry, they must study their ICS architecture as described in layers 0-2 of the Purdue Model. Furthermore, they need to understand the principal differences among IT and ICS. While the goal of IT experts is focusing on assurance of Confidentiality-Integrity and Availability (CIA), the goals of ICS experts are focusing on Safety-Reliability and Productivity (SRP).
  • Cyber defense tools and measures for IT and ICS are very different. For example, a penetration testing process to an IT system may cause temporary shutdown, and conducting active inspection (i.e. penetration testing) on an ICS might lead to mechanical damage and even put people at risk.
  • IT experts are frequently patching, updating and upgrading their systems. ICS experts cannot do that, as every change or update represents risk to operating safety and reliability. While there is no single cyber defense method which may prevent an attack on your ICS, the best you can do is deploy layered cyber defense combining the PPT Triad (People, Processes, Technology) principles.

Methods for analyzing cyber risk factors

Understanding the attack surface-related risk vectors is among the key principles, as such The Methodology for ICS Cyber Preparednessknowledge allows you to predict most paths which an attacker may consider. Furthermore, in order to achieve a more granular prediction, you may correlate these paths with the Industrial (Lockheed Martin) Cyber Kill Chain.

  • Non-attack risk factors: Prior to dealing with cyber-attacks, you must consider 2 risk-factors which might interfere with the ICS process; a) failure of a sensor, PLC or a software bug and b) incorrect action carried out by an authorized person. Both may lead to a panic response by the ICS operator as well as damage.
  • Negligence of people: You must consider cyber-attack actions such as inserting a foreign USB stick to one of the ICS components, failure to detect social engineering attack, negligent supply chain processes, consistent use of simple or repeating password, poor physical security, and more.
  • System oriented attacks: The adversary may attack the ICS through a “Cloud Control” operation, manipulate processes coordinated by ERP, or reconfigure control processes in buildings (air-conditioning, elevators, data center cooling, high voltage connections, UPS, generators, fire alarms, etc).
  • Attacking the ICS Network: Direct access to the ICS network through “Backdoor” connection, MitM access, remote access through spoofed identity, DDoS attack on the ICS network, compromising the firewall between the IT and ICS networks, leaking out information from the ICS, etc.
  • Attacking the process: Considering attacks on the HMI, Engineering station, firewalls, PLCs, field sensors, the synchronizing GPS, manipulating the process through APT attack, exploiting Zero-Day vulnerabilities, etc. The goals are always directed towards causing outage and damaging machinery.

Methods for ICS cyber defense

The Methodology for ICS Cyber PreparednessDeployment of an effective cyber defense on ICS must be decided based on the overall risk factor, calculated by the probability of occurrence and the impact of the attack. However, the selected method using layered defense should be defined according to the network architecture, communication protocols, media, etc.

  • Adhere to corporate policies related to secured servicing the ICS devices and computers
  • Perform updates for the OS, antivirus and ICS application only after intensive testing
  • Conduct periodic cyber security assessment on the ICS for detecting new vulnerabilities
  • Strengthen the physical security for all remote installations which may serve attackers
  • Deploy hierarchical zoning among segments which are not communicating with each other
  • Prioritize using ICS oriented firewall, DMZ or Data Diode between the IT and ICS sections
  • Use of IDS for detecting ICS-related anomaly conditions at levels 0,1,2 of the Purdue Model
  • Deploy authentication (i.e. 802.1X) prior to connecting ICS devices and network equipment
  • Perform in-depth inspection of all files and media prior to transferring them to the ICS network
  • Prevent remote access to the ICS, network unless it is mandatory for critical purposes

Educating your staff on cyber security risks

Cyber security experts know full well, that a very high percentage of “successful” cyber-attacks have been possible because people could not prevent these actions due to lack of awareness and lack of experience with detecting and mitigating such attacks. Therefore, periodic education for all personnel in the organization should be a mandatory requirement for evolving the ICS Cyber security awareness. Who should attend?

  • System operators and ICS maintenance engineers who must upgrade their cyber security skills
  • IT cyber security personnel who must learn how ICS operates and how it can be protected
  • Managers and decision makers who must understand this topic for properly allocating resources

The training program should include frontal sessions on the ICS architecture, description of The Methodology for ICS Cyber Preparednessrisks on the ICS architecture and drills using a live demo illustrating an attack in process. The corporate CISO and the management must clearly define responsibilities in their organization for dealing with the following:

  • Attack mitigation, preventing lateral expansion and minimizing possible damages
  • Collection of forensics on attack-related details and reporting to all stakeholders
  • Effective and rapid restoring of the business continuity according to the defined BCP

Summary

Industrial organizations must have documented methodology for preparedness related to cyber incidents and response when such an event takes place. ICS cyber security experts have the knowledge and experience required to support their organizations according to the described methodology and beyond.

These actions will help you comply with regulations, mitigate incidents that might risk the lives of people and prevent operating outages and damage to machinery. Therefore, the management should devote adequate resources and acquire the necessary expertise for effectively dealing with ICS cyber security.

The Methodology for ICS Cyber Preparedness

Filed Under: Industrial, Latest Articles, OT, ICS & SCADA, Training, Education & Awareness Tagged With: ICS Cyber Preparedness

INFOGRAPHICS – GOLD MEMBERS

Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
previous arrow
next arrow
Slider

Latest Product Videos

Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
previous arrow
next arrow
Slider

Our Latest Infographics

Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
Image is not available
previous arrow
next arrow
Slider

Latest Video Infographics

Image is not available
Image is not available
Image is not available
previous arrow
next arrow
Slider

All Infographics

Platinum & Gold Members' … Download...

All Product Videos

Solutions - Product Videos Our selection of short product videos showcasing … Download...

All Our Infographics

Our Infographics We are creating high quality and highly educational … Download...

All Video Infographics

Cybersecurity Observatory - Video Infographics We … Download...

Contact Us

Who We Are

Our Mission

Our Team

Legal Notice

Terms of Service

Privacy Policy

Cookie Policy

Acknowledgements

Collaboration

Responsible Disclosure

Hall of Thanks

Smartrev Cybersec

© Cyber Startup Observatory 2019