Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Recommended Defend ICS Processes Today

Cybersecurity Check, prioritize, test, and implement

Practices
ICS security patches.

Backup system data and


for Industrial configurations.
Control Systems
Identify, minimize, and secure all
network connections to ICS.

Continually monitor and assess the


security of ICS, networks, and inter-
connections.

CYBERSECURITY CONSIDERATIONS CYBERSECURITY EVENT Disable unnecessary services, ports,


and protocols.
Industrial Control Systems (ICS) are important to supporting US critical infrastructure and IMPACTS
maintaining national security. ICS owners and operators face threats from a variety of
adversaries whose intentions include gathering intelligence and disrupting National Critical SHORT-TERM IMPACTS Enable available security features
Functions. Operational shutdowns and implement robust configuration
As ICS owners and operators adopt new technologies to improve operational efficiencies, they Loss of visibility over production and safety systems
Financial loss due to outages and downtime
management practices.
should be aware of the additional cybersecurity risk of connecting operational technology (OT)
to enterprise information technology (IT) systems and Internet of Things (IoT) devices. Intellectual property theft

Among the risks, are:


Health and personal safety risks Leverage both application
Damage and destruction of property and equipment
• Expanding ICS cyberattack surface, which may lead to an increase in security events. Loss of availability whitelisting and antivirus software.
Loss of control
• Eliminating ICS network segmentation from traditional business IT systems or internet
Denial of service
devices, resulting in greater access to critical systems. Provide ICS cybersecurity training for
• Increasing susceptibility to IT commodity malware and ransomware, which can lead to a LONG-TERM IMPACTS all operators and administrators.
potential disruption of physical processes. Significant unplanned labor, overtime, and idle
equipment costs
Increased or denied insurance Maintain and test an incident
If you need to create an ICS architecture that’s Degraded equipment performance and quality
resilient against cyber attacks, then consider the UK response plan.
PRINCIPLES-LED National Cyber Security Centre’s (NCSC), “Secure
Fees and lawsuits due to negligence or non-compliance
Loss of customers
DESIGN Design Principles and Operational Technology”:
https://www.ncsc.gov.uk/collection/cyber-security-
Redirection of organizational expenditure toward
Implement a risk-based
design-principles/examples/study-operational-tech recovery efforts
defense-in-depth approach to
securing ICS hosts and networks.

CISA ASSESSMENTS: FISCAL YEAR 2019 MOST PREVALENT IT AND OT WEAKNESSES AND RISKS
Boundary Principle of Identification and Physical Access Account
Protection Least Functionality Authentication Control Management
RISK RISK RISK RISK RISK
Undetected unauthorized Increased vectors for malicious Lack of accountability and Unauthorized physical access to field Increased opportunity for
activity in critical systems party access to critical systems traceability for user actions if equipment provides increased opportunity to: unapproved system access from For additional information, including advisories, alerts, and
an account is compromised • Maliciously modify, delete, or copy device shared or system accounts recommendations, please visit CISA’s Industrial Control Systems
RISK RISK programs and firmware website: https://www.cisa.gov/ics
Weaker boundaries between Opportunity for rogue internal RISK • Access the ICS network
ICS and enterprise systems access to be established Increased difficulty in securing • Steal or vandalize cyber assets
accounts as personnel leave the For additional information on Department of Energy (DOE)
• Add rogue devices to capture and cybersecurity initiatives, please visit:
organization, especially sensitive
for users with administrator access retransmit network traffic https://www.energy.gov/ceser
PROACTIVELY PROTECT TOMORROW

RISK MANAGEMENT ICS NETWORK ICS NETWORK


AND CYBERSECURITY PHYSICAL SECURITY ARCHITECTURE PERIMETER SECURITY
GOVERNANCE
• Identify threats to the organization. • Lock down field electronics and set up alerting • Utilize segmentation of networks where possible. • Configure firewalls to control traffic between
• Maintain ICS asset inventory of all hardware, mechanisms for device manipulation such as • Implement a network topology for ICS that has the ICS network and corporate IT network.
software, and supporting infrastructure power removal, device resets, and cabling multiple layers, with the most critical • Utilize IP geo-blocking as appropriate.
technologies. changes. communications occurring in the most secure and • Harden the remote access process to reduce
• Develop cybersecurity policies, procedures, training • Ensure only authorized personnel have access reliable layer. risk to an acceptable level.
and educational materials that apply to to controlled spaces that house ICS equipment. • Use one-way communication diodes to prevent • Use jump servers as a central authorization
organization’s ICS. • Use multi-factor authentication, guards, and external access, whenever possible. location between ICS network security zones.
• Develop and practice incident response procedures barriers to control logical and physical access • Set up demilitarized zones (DMZ) to create a • Do not allow remote persistent vendor or
that join IT and OT response processes. to ICS equipment and facilities. physical and logical subnetwork that acts as an employee connection to the control network.
intermediary for connected security devices to
• Catalog and monitor all remote connections to
avoid exposure.
the network.
• Employ reliable and secure network protocols and
services where feasible.

SECURITY SUPPLY CHAIN


HOST SECURITY MONITORING HUMAN ELEMENT
MANAGEMENT
• Promote a culture of patching and vulnerability • Measure the baseline of normal operations and • Adjust ICS procurement process to weigh • Issue policies that outline ICS security rules,
management. network traffic for ICS. cybersecurity heavily as part of the scoring and including expected rules of behavior and required
• Test all patches in off-line test environments • Configure Intrusion Detection Systems (IDS) to evaluation methodology. controls.
before implementation. create alarms for any ICS network traffic outside • Invest up front in secure ICS products, evaluating • Issue procedures that state how personnel
normal operations. security against current and future threats over the should manage ICS in a secure manner.
• Implement application whitelisting on human
• Track and monitor audit trails on critical areas projected product lifespan. • Train IT operators, OT operators, and security
machine interfaces.
of ICS. • Establish contractual agreements for all outsourced personnel to recognize the indicators of potential
• Harden field devices, including tablets and smart services that ensure: proper incident handling and compromise and what steps they should take to
• Set up Security Incident and Event Monitoring
phones. reporting, security of interconnections, and remote ensure that a cyber investigation succeeds.
(SIEM) to monitor, analyze, and correlate event
• Replace out-of-date software and hardware devices. logs from across the ICS network to identify access specifications and processes. • Promote a culture of dialogue and information
• Disable unused ports and services on ICS devices after intrusion attempts. • Consider ICS information integrity, security, and exchange between security, IT, and OT personnel.
testing to assure this will not impact ICS operation. confidentiality when contracting with a cloud
• Implement and test system backups and recovery service provider.
processes. • Leverage test labs to test vendor-provided software for
• Configure encryption and security for ICS protocols. malicious code and defects before implementation.

For more detailed information, please review CISA's publications: https://www.cisa.gov/ics/Recommended-Practices


and DOE's Cybersecurity Capability Maturity Model (C2M2) Program: https://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0

You might also like