9
ADDRESSING CYBER SECURITY IN THE ENERGY AND UTILITIES INDUSTRY

1973-16 Tackling the challenges of cyber security_19_03_15

  • Upload
    shed59

  • View
    193

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1973-16 Tackling the challenges of cyber security_19_03_15

ADDRESSING CYBER SECURITY IN THE ENERGY AND UTILITIES INDUSTRY

Page 2: 1973-16 Tackling the challenges of cyber security_19_03_15

Addressing cyber security in the energy and utilities industryUnderstanding and addressing the changing threats

The cyber security risks facing the energy and utilities industry have dramatically increased in recent years, with high profile targeted attacks on operators, suppliers and service companies across sectors now being commonplace.

• 2010 – Stuxnet malware attacked the Iranian nuclear fuel processing industry

• 2011 – Night Dragon malware stole valuable information from oil and gas companies

• 2012 – Shamoon attack caused massive business disruption after around 50,000 computers were taken out of service in Saudi Aramco

• 2014 – Havex attack saw energy and utilities companies being targeted through spam emails and compromised vendor websites

• Most recently – BlackEnergy malware targets specific control systems in critical infrastructures.

Energy and utility companies are high value targets due to:

• the critical infrastructures they support for the supply of essential commodities, such as water, fuel and electricity to society

• the valuable information that is held in business systems, eg oil and gas reserves or energy trading information, customer information and the finance systems they operate

• it being a highly competitive industry, which places a premium on competitor intelligence

• the environmental footprint of their operations which could attract 'hacktivists'.

PA provides clients with the confidence that their process control, Supervisory Control and Data Acquisition (SCADA), and industrial automation systems are adequately protected against cyber threats by helping them to better understand the security risk, improve and maintain security, and respond quickly and effectively to incidents.

To find out more about developing trust and confidence in the resilience of your most critical systems, please visit www.paconsulting.com/icssecurity

or contact us at [email protected]

3TACKLING THE CHALLENGES OF CYBER SECURITY

Page 3: 1973-16 Tackling the challenges of cyber security_19_03_15

The sector is increasingly reliant on operational technology as companies digitise their operations. Smart metering and grids improve our power grids, while digital oilfields enable exploration and production of increasingly complex oil and gas reserves, and allow the use of information technology to drive operational efficiencies. However, these trends increase the security risks to these infrastructures.

Of specific interest to attackers are the industrial control systems (such as process control, automation or SCADA systems) that operate mission and safety critical infrastructures. This includes oil and gas drilling; production refining; electricity generation, transmission and distribution; and potable and waste water networks.

Attackers and researchers are more focused on identifying vulnerabilities in the supporting technologies, meaning operators

and vendors have an increasingly difficult task in managing these vulnerabilities, patching them or putting other mitigations in place.

Energy and utilities companies, and their partners, need to recognise these trends, the risks they pose and develop strategies to stay ahead of the rapidly changing threats.

PA’s cyber security capabilities help organisations address these challenges with confidence, and ensure their cyber security risks are managed in the enterprise and across the operational technology (OT) domain.

This document details:

• approach to cyber security risk management

• best practice approach to managing industrial control system security risks

• Where to start? PA’s Industrial Control System Security Health Check.

PA’s approach to cyber security risk management

Our clients have the confidence they are adequately protected against cyber threats because we help them to better understand the security risks, improve and maintain security, and be confident they can respond quickly and effectively to incidents.

Understand security risks

When engaging with the security journey, operators need to appreciate the risks they want to protect against. This includes understanding the critical business and operational assets that need protecting; identifying the threats (from untargeted and deliberate attacks); considering how these

threats could exploit potential vulnerabilities and contemplating the impact they could have on operations, reputation, competitive positioning and financial stability. Together with a good understanding of the vulnerabilities, this provides a clear and comprehensive picture of the risk profile.

Understanding Security Risks

Improve and maintain security

Respond to incidents

4 5TACKLING THE CHALLENGES OF CYBER SECURITYTACKLING THE CHALLENGES OF CYBER SECURITY

Page 4: 1973-16 Tackling the challenges of cyber security_19_03_15

Improve and maintain securityOnce the risks are understood, operators can define their security strategy and identify the priorities, quick wins and stages that will form part of their security improvement programmes. To ensure maximum effectiveness, these key areas need to be considered:

• adopting a holistic approach to security across the physical, logical, human and organisational dimensions

• building consistent capabilities across prevention, protection, detection and recovery measures

• providing defence in depth with several layers of countermeasures

• developing strategies which are compatible with industrial control systems operational, safety and availability constraints

• creating a security culture as an enabler to rooting the changes in the organisation.

Strengthening security governance through appropriate allocation of ownership and responsibilities, and the definition of a security framework embedded in business and operational processes are key to ensure security will be maintained in the face of evolving threats, vulnerabilities and future operational changes.

Respond to incidents

Total security is not achievable – there will always be vulnerabilities, highly motivated attackers and human and technical failures that can allow incidents to occur. Organisations need to be prepared to identify and respond to these events, which requires security event monitoring tools and detailed technical configuration deployed on the infrastructure, clear and tested response processes, and the right level of staff training and awareness. The objectives are to ensure:

• incidents can be detected and their impact analysed

• recovery can happen in conditions acceptable to the business

• remediation actions are applied

• the organisation learns from past incidents.

PA’s best practice approach to managing industrial control system security risks

Historically, process control, SCADA and industrial automation systems were designed and built using proprietary technologies and installed in isolation from ordinary IT systems. Recent trends have been to base newer industrial control systems, such as distributed control systems (DCS) and SCADA systems, on open standard and more cost-effective platforms, eg Intel/Windows. The desire for management information and remote control has led to adoption of common network protocols, such as TCP/IP, and the connection of many of these systems to the corporate IT network.

How can organisations continue to capitalise on the opportunities presented by integrated systems while securing their businesses against this increasing cyber security threat?

Any successful approach to tackling the cyber security threat to industrial control systems must identify and understand the key security risks, and then ensure ongoing protection.

Through years of supporting our customers to implement security in the most demanding environments, we have developed a seven-step approach that allows organisations to understand and address cyber security risk to industrial control systems. This best practice model has been adopted by the UK Government’s Centre for Protection of National Infrastructure as the model to protect the nation’s Critical National Infrastructure (CNI).

6 7TACKLING THE CHALLENGES OF CYBER SECURITYTACKLING THE CHALLENGES OF CYBER SECURITY

Page 5: 1973-16 Tackling the challenges of cyber security_19_03_15

Establish Governance

Improve Awareness and Skills

Understand Business Risk

Manage Third Party

Engage Projects

Implement Secure Architecture

Establish Response Capability

Figure 1: PA’s seven step process approach to industrial control systems security

1. Understand the business risk The first step is to establish a clear picture of what systems are in place, how they are connected, what the vulnerabilities are, what the impact of system failure would be and what security measures are in operation.

2. Select and implement secure architecture

Many simple, low-cost actions, such as removing unauthorised connections, can provide fast and significant security improvements. However, more detailed planning is required for long-term improvements, such as network segregation and implementation of security zones.

3. Ensure effective incident response

Incident management plans rarely cover cyber security events, such as the systemic failure of entire systems or technologies. Organisations must enhance their plans to address the particular characteristics of industrial control system security incidents and to ensure a rapid response to cyber-attacks.

4. Raise awareness and skills A greater understanding of security amongst control and SCADA engineers will help to ensure security issues are managed as ‘business as usual’. Furthermore, building bridges between the IT, engineering and

operations communities can help to create a strong team that collectively has the required skills needed to manage these risks.

5. Manage third-party risks With systems and support arrangements increasingly being outsourced, organisations must be confident that vendors and suppliers are aware of security risks, operate good practices themselves and have mechanisms for alerting customers when new vulnerabilities are discovered. Threats from partner companies in the supply chain also need to be addressed.

6. Build in security early on the project lifecycle

Bolting on security into projects late in the lifecycle of a project is often difficult and costly. So security measures must be incorporated into the specification, design and development of new systems at the earliest possible stage.

7. Establish ongoing governance

Standards and guidelines for industrial control system security provide a degree of assurance that security practices will be maintained. However, an ongoing assurance process is necessary to ensure the standards reflect the latest threats and that compliance is maintained.

8 9TACKLING THE CHALLENGES OF CYBER SECURITYTACKLING THE CHALLENGES OF CYBER SECURITY

Page 6: 1973-16 Tackling the challenges of cyber security_19_03_15

1234

UNDERSTANDSYSTEMS

UNDERSTANDTHREATS

UNDERSTANDIMPACTS

UNDERSTANDVULNERABILITIES

Identify sites and the control system used

Identify threat sources – are there specific sources that are unique to your business?

Analyse potential scenarios and understand possible impacts

Analyse all the technical, procedural and management vulnerabilities in the control system

High Level Risk Reduction

Business Risk Prioritised Vulnerabilities

Figure 2: PA’s Industrial Control System Health Check Process

Where to start? PA’s Process Control Security Health Check

Our Health Check provides you with a rapid understanding of the risks that are faced from process control cyber threats. It offers a risk-based picture of the major aspects of industrial control system security against best industry practice, and can be used for a single system or many systems across an entire enterprise.

The Health Check consists of four steps as summarised in Figure 2.

1. Understand the systems – create a thorough understanding of scope, operation and protection of the control systems. This includes identifying all existing control systems and interfaces used, their location, connectivity, ownership and accountabilities, access rights, business criticality.

2. Understand the threats – identify and understand all cyber security threats using a variety of ‘what if’ scenarios. This covers identification of threat sources, understanding the ways these might present themselves and assessing the probabilities of threat realisation.

3. Understand the impacts – analyse potential cyber security events for their impacts so appropriate security measures can be implemented. This involves an evaluation of a predetermined series of cyber security scenarios, covering all situations which have a detrimental impact on operations – initially and over time. This leads to an understanding of the overall business consequences of breaches.

4. Understand the vulnerabilities – identify and analyse all the technical, procedural and management vulnerabilities in the control systems to assess overall business risk (Figure 2). A prioritised list of vulnerabilities is then developed to communicate to management for action.

10 11TACKLING THE CHALLENGES OF CYBER SECURITYTACKLING THE CHALLENGES OF CYBER SECURITY

Page 7: 1973-16 Tackling the challenges of cyber security_19_03_15

PA’s capabilities and services

Working with our world-class technical security services practice, 7Safe, we provide expertise and services that fully support your cyber security programmes from any stage in their lifecycle:

• security strategy, leadership and governance – coaching and advice to ensure you have a properly informed, risk and resilience-led security strategy with clear accountability and responsibility

• risk management and assurance – audits and assessments against all industry and regulatory standards, such as ISO27001 and PCI DSS. We support your compliance initiatives by identifying areas for improvement and helping you deliver your improvement plans

• technical security services – penetration testing; computer forensics; biometrics and identity management; cryptography; e-Discovery; secure coding and infrastructure. We also offer practical support with implementing and testing security solutions to ensure confidence in your controls

• security culture development services – pragmatic and effective solutions to reduce the cyber risk created by the actions of your people, including social engineering vulnerability assessment, behavioural analysis and developing effective security cultures

• specialist cyber education services – university accredited, hands-on technical training in the fields of information security, ethical hacking and computer forensics to give your people the deep technical knowledge and awareness they need to perform their role

• operational technology and industrial control system security – comprehensive cyber security services for industrial control, process control, SCADA and automation systems across the energy and utilities sector from, a highly experienced team of control engineers and security specialists.

Figure 3

The Health Check process output includes:

• a summary of the business risk

• an analysis of the key vulnerabilities together with any identified ‘quick wins’

• a high level risk reduction plan.

12 13TACKLING THE CHALLENGES OF CYBER SECURITYTACKLING THE CHALLENGES OF CYBER SECURITY

Page 8: 1973-16 Tackling the challenges of cyber security_19_03_15

We have over 12 years’ experience in helping energy and utility companies manage the developing cyber security risks

UK Government’s Centre for Protection of National Infrastructure

We joined forces with the UK Government to define its best practice guidance on securing the nation’s industrial control systems that form the UK’s Critical National Infrastructure.

Authority for Electricity Regulation, Oman

We assisted the Authority for Electricity Regulation of Oman to develop cyber security regulations for their electricity sector. We carried out sectoral cyber security assessments, a study of international best practices and defined a regulatory framework and baseline standard.

BP

We worked with BP to improve industrial control system security at more than 300 sites worldwide. We collaborated closely with systems vendors and staff to understand the security options

available for existing systems, and to influence the development of future security measures. This initiative enabled BP to improve security and integrity of operating assets and avoid significant health, safety or environmental incidents – and the associated damage to its reputation.

A major water utility

We used our experience in industrial control system security, and our Health Check, to carry out a security assessment of the company’s assets. This included the telemetry system and plant automation systems to define a plan addressing the identified security gaps.

A UK water company

7Safe, PA’s technical security practice, conducted a series of penetration tests, including a review of external facing infrastructure. This involved firewalls, VPN access point, web applications, external facing Citrix environment and field operational

support equipment to identify any areas of concern and propose mitigation actions.

Newbuild Nuclear Power Plants

Over the last two years, we have been helping a new nuclear operator with establishing its cyber security programme to protect the safety, security, safeguards and emergency preparedness functions and systems in line with stringent regulatory requirements.

UK’s smart metering infrastructure

We helped identify the security and data privacy risks related to the development of smart metering – which will be a complex countrywide system that will form part of the UK’s critical national infrastructure. We developed a security framework to ensure consumer’s information will be appropriately protected and that the system will be secured against potential attackers.

We have also been helping an electricity supplier design and deploy the security systems to leverage the benefits of smart metering.

NERC CIP

We assisted this major US utility to understand and reduce the risk of regulatory noncompliance.

A leading oil and gas drilling company

We worked with this drilling contractor to secure its mission and safety critical drilling operations, and improved safety and operational effectiveness through a comprehensive digital oilfield security and communications infrastructure.

A major UK utility

We helped a major UK utility develop secure a novel smart grid solution – enabling the use of renewable power generation.

Cyber security programme review

For this national infrastructure operator, we conducted a comprehensive gap analysis against best practice using the recently developed PAS 555 standard and the CPNI industrial control system good practice guides. We also developed a comprehensive cyber security improvement programme based on the findings.

14 15TACKLING THE CHALLENGES OF CYBER SECURITYTACKLING THE CHALLENGES OF CYBER SECURITY

Page 9: 1973-16 Tackling the challenges of cyber security_19_03_15

Corporate headquarters

123 Buckingham Palace Road London SW1W 9SR United Kingdom +44 20 7730 9000

paconsulting.com

This document has been prepared by PA. The contents of this document do not constitute any form of commitment or recommendation on the part of PA and speak as at the date of their preparation.

© PA Knowledge Limited 2014. All rights reserved.

No part of this documentation may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise without the written permission of PA Consulting Group.

We are an employee-owned firm of over 2,500 people, operating globally from offices across North America, Europe, the Nordics, the Gulf and Asia Pacific.

We are experts in energy, financial services, life sciences and healthcare, manufacturing, government and public services, defence and security, telecommunications, transport and logistics.

Our deep industry knowledge together with skills in management consulting, technology and innovation allows us to challenge conventional thinking and deliver exceptional results with lasting impact. 01

973-

16