What is your strategy?Do you have an industrial cybersecurity strategy, or are you just rolling the dice? It’s important to define what the overall goal should be for an organization’s industrial cybersecurity strategy. At the end of the day, the strategy needs to outline people, process and technology solutions that can help mitigate, lessen the impact of and/or help prevent industrial cybersecurity incidents, events which may affect one’s ability to view, monitor and control the industrial process. As we defined a cyber event in one of my prior blogs earlier, these events can come from human error, equipment failure or malicious behavior.
How do you get started on this journey?The following blogs from other Belden brands have succinctly addressed the following question “how do I get started?” Have a look: ICS Security: 3 Ways to Get Started and Getting Started on ICS and SCADA Security. Both of the above understand cybersecurity risk assessments as a good first step. While this is a great recommendation, there are things you can proactively do in parallel to get started on this journey.
Control what you can controlWhile it may seem that securing an industrial control system is a daunting task, there are some fundamentals that you can begin right now. These fundamentals are core to regulatory guidelines and industry best practices like IEC 62443, NIST SP – 800-82 and NERC CIP. Even if your organization has not chosen a standard to adopt, you can start with these fundamental goalposts: gain visibility, implement protective controls and perform continuous monitoring.
Gain VisibilityTake the guessing game out of the equation. When you know what is on your control network, you can manage communication patterns, network topology variations, configuration changes, vulnerability context and other environmental elements by fact.
- Understand and document all network communication between the industrial control network and the corporate enterprise IT network.
- Understand and document all remote access into the industrial control network, i.e. vendor access with dial-up modems, VPN and cellular connectivity.
- Create and update asset inventory information for both hardware and software.
- Create and maintain a network topology diagram.
- Understand what industrial protocols are communicating and between what assets, such as HMIs to PLCs.
- Understand how assets and devices are configured and if those configurations are changing.
- Identify what vulnerabilities (weaknesses) are present in the environment.
Implement Protective ControlsProtective controls are controls that help prevent or lessen the impact of cyber events. These controls can be implemented as a parallel or serial work stream to the Gain Visibility stage. For example, ensuring network segmentation between the corporate enterprise IT network and the industrial control network is a great first step. Network segmentation is a practice by which all network communication is denied unless explicitly permitted through the use of firewalls or access control lists on networking devices. Another protective control is system/device hardening where 1) all services are disabled that are not explicitly needed to run the industrial process, i.e. disable insecure protocols like telnet which does not encrypt traffic; 2) cyber security features such as logging, SSH, SNMPv3 and other features are enabled; and 3) the device/system is checked for proper configurations, i.e. change default passwords. Other fundamental protective controls include:
- Network segmentation a) Between production cells b) Between key mission critical systems/devices such as PLC’s and RTU’s.
- System and device hardening a) Per an industrial standard or best practice like IEC62443 or NIST SP 800-82 b) Include devices like HMI’s, PLC’s, Engineering workstations, Historians, and industrial networking devices.
- Centralize all remote access with strong authentication a) Create a DMZ for all of these connections b) Implement multi-factor authentication for users. Multi-factor is a two-step authentication process by having something you know, like a password, and something that you don’t, like a token.
Continuous MonitoringThe next stage is to implement continuous monitoring. Just like you have a SCADA to help optimize and control your industrial process, you need a “SCADA”-like cybersecurity solution to help optimize and control visibility to industrial cybersecurity events and ensure the protective controls you have implemented are operating correctly. This is not a one-and-done activity. This needs to be performed continuously. Industrial cybersecurity “SCADA” monitoring helps answers the “how do you know” questions. These are as follows:
- How do I know if my device/asset configurations are changing, and do those changes put the device in an insecure state?
- How do I know if my operational baselines (the configuration of a device or system that is specific to the environment it is running in) are changing?
- How do I know if one of my devices is on the brink of a failure?
- How do I know if a rogue asset or protocol is now present on my control network?
- How do I know if my vulnerability profile has changed?
- Learn why industrial control systems are about much more than hackers and attacks
- Read a case study examining how a recent industrial incident was identified and resolved at a U.S. water utility
- Understand how Tripwire products can monitor logs, correlate events, integrate with identity management systems, and more