Pub. 1 2019-2020 Issue 4

R eliable operational technology (OT) or industrial control systems (ICS) underpin every facet of American lives. Without them, our defenses, our economy, and our national security engine would grind to a halt — especially when so many of these systems are becoming “smart” and integrated. Securing infrastructure requires a culture change that prioritizes cybersecurity at the employee and organiza- tional levels. OT is associated with information systems, devices, sensors, and equipment that are connected across a network (similar to information tech- nology, or IT) but include the unique ability to interact with the physical world. Examples can include systems that support power generation and distribution, manufacturing, water treatment, chemical processing, oil and gas, weapons platforms, transportation and logistics, and building automation. OT systems are often associated with critical infrastructure, and securing them requires a different approach than traditional IT systems. Today’s industry is built upon yesterday’s infrastructure, technology, and networks, and as a result, not all OT systems are identical, nor do they have the same security in design. Often, OT systems represent a mismatch of obsolete and legacy technologies with infrastructure built before the modern internet or even commonly used operating systems. OT systems are commonly integrated with newer systems that are subsequently retrofitted with the latest advance- ments. In addition, incorporating OT with other operational designs such as conditional alarms, hard-wired configurations, and process interlock strategies creates additional network differences. These operational characteristics will require different security configurations tailored specifically to each facility. Therefore, it’s not applicable to develop an “off the shelf” or a business enterprise traditional IT solution as it will not fit the unique architectures for the majority of OT systems. Convergence of IT and OT will be the new reality. Modern control systems and technologies have evolved from simple analog sensors, such as a temperature sensor, to fully automated and integrated man- ufacturing facilities, safely running multiple simultaneous complex operations. Typically, OT systems are architecturally designed to monitor their environ- ment and automatically interact based on detected changes. Changes are discovered through remote sensors, reacting to predefined conditions, but also through data analysis and predictive algorithms. When compromised, the results can be personal injury (including loss of life), environmental contami- nation, or real damage of property. Consequently, there isn’t a quick reboot to the common computer glitch. Operations must be sustained, and mainte- nance needs to be scheduled and coordinated in advance. Furthermore, OT systems cannot tolerate an interruption in dataflow, and some cybersecurity solutions are too intrusive or restrictive and can knock OT systems offline. As a result, the design focus places greater emphasis on availability over system confidentiality or data integrity. Since the potential consequences of conven- tional IT tools can hinder, cause failure, or even compromise an OT system, the accepted solution is to reduce the priority of cybersecurity or attempt to separate the systems. However, the important strategy is risk mitigation. Industrial Cybersecurity: A Culture Change Addressing known vulnerabilities and improving the cybersecurity of critical systems or infrastructure — and therefore making these systems more adapt- able, resilient and reliable — can help bolster key components of the nation’s security in the energy sector. As the need continues for superior security and efficiently connected OT systems that have availability requirements as the pri- ority, company leaders will need to better understand their environments and be able to predict technology interactions. In order to understand one or more technology interactions, security, efficiency and communication networks, while still managing limited resources, organizations are turning to advance risk mitigation strategies to accomplish their understanding. To be successful with cybersecurity implementations, corporate leadership must own and prioritize cybersecurity initiatives for the organization. Top level support is a must for all levels of management to implement the needed culture changes across all team members and staff. This necessary change is analogous to the safety culture changes and efficiency changes with Six Sigma that accelerated during the 90s through the turn of the century. To achieve site wide adoption, organizations must adopt cybersecurity risk evaluations as a part of process hazard assessments (PHA/PSM) which will quantify the potential risk. By understanding and documenting the risk, organizations are better suited to set priorities, resources, and decisions for cybersecurity initiatives. Traditionally, energy and process manufacturing industries leverage risk assessments that evaluate consequence versus frequency measured across key impact areas to include health/safety, community or social media, environ- ment and business. However, moving forward in today’s information and data age, cybersecurity needs to be included as part of the process control domain (PCD). An example of a risk matrix is captured in Figure 1. After an organization can measure the risk, leadership will be better positioned to implement the necessary cybersecurity controls to either mitigate or transfer the associated risk. Key areas to consider during the development of the cybersecurity program should include: • Cybersecurity policies and procedures • Enhanced employee cybersecurity training • Vendor relations and 3rd party risk management to include supply chains • Internal cyber assessments • Cyber and network security as a part of plant maintenance and plant shutdown schedules • External media use • Access management, both physical and virtual, to sensitive areas (Logic control cabinets and control rooms) • Cyber implications with safety systems and process interlocks • Company data (PII, HR, financial, legal, trade secrets) 12 UP DATE

RkJQdWJsaXNoZXIy OTM0Njg2