Security Management for end users in Industrial Operations: A Brief Overview

Security Management for end users in Industrial Operations: A Brief Overview
03 Oct

Security Management for end users in Industrial Operations: A Brief Overview

Preview and Context

Security is a critical attribute of the systems and resources deployed to manage safe and secure operations of the enterprise. There is an increasing level of complexity and functionality in sensors, hardware, software, networking devices, applications deployed. And the advent of digitalization and IoT leading to significant jump in connected devices and systems, it is imperative to build a secure operational environment and ecosystem.

Information Technology (IT)

The definition from Wikipedia says IT is the use of computers to store, retrieve, transmit, and manipulate data. Of course, in today’s world IT systems have become much broader in functionality and uses. The IT set of resources including people, process, and technology has become the backbone and a critical part of business irrespective of the size or the industry vertical.  IT typically today leads the charge in terms of digitally transforming the company. In some cases, a digital officer is appointed for this purpose.

Operational Technology (OT)

As per Gartner - Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.  These systems must be designed and deployed to protect individuals and organizations from the security threats that can cause harm or damage to equipment and/or the plant. OT components include sensors, instruments, equipment (PLC/SCADA/HMI/DCS), Historian, software and others. These have been in use for decades. The need for safe and secure deployment and operations has increased with digital transformation.

Differentiating OT and IT security

Availability of the system and integrity of the data are crucial for the normal operations in OT. OT systems also have a lengthier lifecycle (run for decades), and may not have been necessarily designed and deployed with security in mind. And because these systems are running 24x7 in production; updating or patching them on the fly is a challenge due to impact on operations and associated risk. And the typical IT tools used for perimeter monitoring like firewalls and intrusion detection are not sufficient. Specialized security tools are needed to monitor and safeguard the OT operations – in addition to deploying secure products.

IT systems are dynamic and are the first line of defence in an enterprise. OT systems are deterministic in nature; but play a critical role in realizing effective business operations. Traditionally, the focus for IT security revolves around data – protection and privacy. Whereas secure OT deployments are focused on protecting people, equipment and processes.

IT security is deployed both at the periphery and inside the shop floor; and enhances OT security when deployed in multiple layers and network segments. Typical devices like routers, firewalls, DMZ are common infrastructure for both IT and OT.  And because of the operational impediments, OT systems tend to be infrequently patched compared to IT equipment and software.

OT systems usually use proprietary protocols making it difficult to integrate in a system of systems architecture. End of the day, Confidentiality, Integrity and Availability is relevant for both IT and OT systems; however, Confidentiality and integrity takes precedence in IT whereas Availability is higher priority for OT systems.

In IIoT deployments, security aspects of both IT and OT are applicable and need to be addressed. The specifics depend on the system design and deployment solution architecture.

Security Management

It is important that products, solutions and services are designed and built securely right from conception. Incorporating a Secure Development Lifecycle (SDLC) program is essential. BSIMM  type of tools and company security policies can be used as baseline for secure product development and also for improvement of product security posture.

To secure your environment and mitigate risks, it is important to do a risk assessment, identify gaps and implement an action plan. It is recommended to adopt relevant standards like NIST, NERC CIP, or IEC 62443. Implementing security hygiene practices, doing threat modelling and risk analysis is crucial. Use of Microsoft tools like STRIDE and deployment architecture analysis can help bring visibility to security gaps in the system. A documented set of guidelines and procedures containing both technical and administrative guidance and controls must exist to aid the operational safety and security of the enterprise. For example, they can call out specific use (e.g., firewall, unidirectional gateway) and non-use (e.g., USB) as appropriate to the environment and based on the risk analysis.

Secure configuration and environment

Secure configuration (“hardening”) of instruments, equipment and software is critical. This is done by validating the default configuration and modifying it to suit the operational needs. User manuals and other product documentation contain details on how this is done. Make sure to securely configure weak passwords, open ports and services, third-party software, access control list. Review and modification of software environment variables and registry entries for both operating system and applications is required.

 

Secure Deployment

Components, be it hardware or software, need to be thoroughly tested during development before they are deployed - to prevent damage, downtime and financial loss. To make the SDLC testing phase effective, incorporate unit testing, module testing, system testing, penetration testing, and defence-in-depth assessment. In addition, provide for secure deployment guidelines.

 

Secure supply chain

 

Supplier and Vendors need to be sensitized about security requirements. It is also important to not violate any third-party intellectual property rights. In this context, end users can demand security evidence from suppliers – test reports, deployment guidance, and compliance to regulations or standards.

Vulnerability Management

Vulnerability management is a continuous exercise, and both suppliers and end-users need to be on top of it. End-users can drive suppliers to address the security concerns in their products. Refer to CERT and similar websites to track the vulnerabilities, their severities and remediation. You can use tools like Qualys and Nessus to get insights into the product and operating system vulnerabilities.

Monitoring and improvement  

 

The plant operations need to deploy Security Information and Event Management (SIEM) or an equivalent to centralize the monitoring. Review the alarm, events, and logs generated by the system. This will help in monitoring and remedial actions quickly. A formal security reporting and incidence program, defining the roles and responsibilities of individuals in the organization, should be put in place.

 

Security awareness sessions, training, and augmenting the employee skillset form a crucial part of continuous improvement program.


Disclaimer:

All information and opinions contained in this Blog belongs to the author only, and do not constitute professional advice in any manner. Neither CII nor any of its office bearers or analysts or employees accept or assume any responsibility or liability in respect of the information provided herein. 



Author