As we are now in 2017, the internet IoT and digitalisation is everywhere and there is no avoiding it, but what you can do is be prepared, and ensure that while you are online you are secure. Belden, manufacturer of networking, connectivity and cable products want to make sure that everyone is fully protected while they are connected, and therefore have released a free guide with Tripwire; ‘Industrial Cyber Security for Dummies’ as the companies aim to deliver a comprehensive product portfolio which is designed to meeting networking infrastructure and industrial cyber security needs of industrial, enterprise and broadcast markets.
Here, the two authors, David Meltzer, Chief Technology Officer at Tripwire, and Jeff Lund, Senior Director of product line management, Industrial IT, at Belden take a look further into how you can be more secure with utility infrastructure.
Ask any security expert about industrial control systems (ICS) and you’ll hear concerns about how the adoption of smart devices is developing more quickly than the ability to secure these devices – and that this gap poses significant risks for utilities and their end users. In fact, one researcher recently reported that hackers have successfully gained a foothold in the networks of over 20 utilities.
As the utility sector continues to modernise networking infrastructure, many companies have embraced increased interconnectivity of their industrial devices and deeper integration with business systems. While this brings many operational and business benefits, the convergence of information technology (IT) and operations technology (OT) systems has also revealed new risks that can lead to network down-time or information breaches, making cyber and physical systems more vulnerable.
How can I secure my physical and cyber assets in this connected world?
The internet provides attackers an easier way to access information. As such, utilities have had to consider how to keep their control systems free from intentional and accidental attacks from both inside and outside threats. Of all the critical infrastructures, electric utilities have been one of the most regulated for security compliance (as a means of assuring reliability) than any other.
To avoid and respond to critical cyber security concerns brought on by IT and OT convergence, utility teams can follow these three foundational steps:
Cyber-attacks present real threats to all industrial sectors, including power generation, transmission and distribution. Whether you’re on the IT or OT side, security breaches can be hard to spot. U.S. NERC CIP requirements, while painful, have led the way toward building increased cyber security requirements into our electric utilities. Many power transmission and distribution plants globally have been examining NERC CIP requirements for developing their own stronger security policies and regulatory compliance.
When an ICS is vulnerable to a cyber-threat, the breach will usually come in three phases: discovery, attack and intrusion. The attacker will first search a system to discover weaknesses and will then exploit those software vulnerabilities through a variety of methods, including using stolen credentials, infecting media or attaching malware to an email. Once the hacker has captured the data, he or she can choose to deactivate a system or keep it live. If a threat is left undetected and undeterred, the attacker will have access to critical utility control systems and networks.
When considering the security of your utility infrastructure, there is a world of frameworks, regulatory requirements, technology and disciplines to examine. It’s best to start by conducting a cyber-security assessment and analysis of vulnerabilities in the system. Teams can then apply a common military strategy, known as Defence in Depth, and integrate it into their control systems. The strategy uses multiple layers of defense tactics to identify and impede targeted threats. With this approach, your security system can identify and respond to potentially harmful intrusions. Implementing critical security controls can reduce your risk of cyber-attacks by an estimated 85-95%, according to the Centre for Internet Security.
By following these steps, Meltzer and Lund believe you’ll be better prepared to equip your team with critical security strategies. These can aid in preventing asset failure by detecting, responding to and avoiding breaches harmful to your control rooms and transmission and distribution centers.
But it doesn’t stop there – the best security measures rely on the continuous monitoring of all network components – from endpoints to control-level systems. With 24/7 network security coverage, teams can rest easy knowing their information and operations technologies can safely function with minimal risk of network interference or unnecessary downtime.
For a deeper understanding of how to secure your utility against cyber threats, download the ‘Industrial Cyber Security for Dummies.’