Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Designing a 100-Day Sprint for OT Cybersecurity: What to Consider
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Designing a 100-Day Sprint for OT Cybersecurity: What to Consider

4 years ago Ben Jackman
Designing a 100-Day Sprint for OT Cybersecurity: What to Consider

As we begin a new year, many organizations will enter a “goal-setting and strategic planning” season. During this time, individuals are re-energized and motivated to record new accomplishments for their professional development. Traditional corporate goal setting aligns with fiscal calendars and forces companies and individuals to build goals in chunks of 365 days. But why set your deadline based on the Earth’s orbital period? What if you could achieve relevant and meaningful goals within just 100 days? That’s the idea behind the 100-day sprint – to achieve radical and strategic improvements within a fraction of the calendar year.

Most recently, the Biden Administration embarked on a 100-day sprint to improve the cybersecurity of our nation’s electric grid. If the U.S. government is agile enough to do one of these sprints, then surely your company is, too! But with so many OT cybersecurity frameworks, strategies, approaches, and solutions, where should you begin, and how can you apply this concept to your company?

Set a Realistic Expectation

It is very important to set a realistic expectation for what a successful 100-day OT cybersecurity sprint would look like for your organization. You should consider factors such as budget, personnel, bandwidth, and competing priorities. Don’t “boil the ocean” in this exercise. Achieve attainable goals, and once those are met, schedule each succeeding phase to aim higher.

Embrace the Three-Legged Stool

In your 100 days, focus on all aspects of the three-legged stool of cybersecurity: people, process, and technology. The allure might be to focus on technology, assuming you have budget. However, we can achieve a lot of forward progress without installing a new shiny object. What’s more, it might take you beyond 100 days to request quotes, compare vendors, complete the procurement process, and schedule installation services – even without considering delays in the hardware supply chain. Instead, let’s use these 100 days in tangible and measurable ways while setting you up to make a better purchasing decision based on solid information and analysis.

Start with Your People

Begin by building a 100-day sprint team. Seek out your most motivated and high-performing individuals to create an all-star team with high energy. How big should your team be? That depends on the scope of OT in your organization. If you have only one or two sites, then a small team of five to nine makes sense. But if you have dozens of facilities, consider whether to pilot this 100-day sprint before rolling it out or to create sub-teams to handle tasks at the individual site level.

Take a step back and evaluate your company’s organizational alignment to cybersecurity for Operational Technology. Consider creating an Office of the CISO, under which you might assign a head of OT cybersecurity. Who is responsible for OT cybersecurity at each plant or site? It may even be required to clearly define scope boundaries based on Purdue Levels or Zones. This is especially important for highly matrixed organizations wherein the O-IT (operational IT components such as WindowsTM servers) might fall to one group while the controllers, PLCss, and other embedded devices might fall to another. Are these individuals dedicated to OT cybersecurity, equipped with sufficient training, empowered with budget authority, and staffed with sufficient bandwidth? If not, look for ways to improve the organizational structure in these 100 days to align clear responsibility, set expectations, and define measurable metrics.

Consider your site’s training and awareness programs for individuals coming into the facility. Many times, visitors (including service partners and vendors) are forced to watch safety training videos before entering the facility while never seeing any of your policies on cybersecurity. Employees that log in regularly to OT systems should be officially trained annually or semi-annually on important principles of your OT security policies such as password requirements, Wi-Fi, internet access, USB devices, and remote access.

Beyond formal training, consider developing a regular campaign for OT security awareness. This can be as simple as a monthly email targeted to your OT users that focuses on one of 12 cybersecurity aspects. Whatever form it takes, it should complement your corporate IT security awareness campaigns. Awareness campaigns can also be more creative. For instance, launch an internal bug bounty program that offers a nominal reward to anyone that submits and corrects a violation of the company’s security practices.

Review the list of accounts on your OT systems to evaluate which are entitled to elevated privileges including administrative access. Who is and is not authorized for remote access? Make sure your operational teams are not sharing generic accounts with names such as “Operator1” or “Engineer2.” You might be surprised to find some ghost accounts on OT domains for retired or former employees. This can be especially hard to maintain if your OT Windows devices are setup as Workgroups. You may also be surprised at how many outdated service accounts are still active and that thereby pose a risk to the organization.

Dust off Your Policies

I get it. Policies can be boring. But that’s exactly why a 100-day sprint is the right approach to re-invigorate your team. There’s a light at the end of the 100-day tunnel, and it’s critical to dust off your policies and uncover some gaps along the way. Give them a solid review, update where necessary, and re-communicate their guidance and requirements to the affected teams.

Begin with a policy inventory. Collect as many of these documents as you can, and evaluate their scope and latest revision. Here are a few examples that you might need to find:

  • Information security policy
  • Business continuity plan
  • Acceptable use policy
  • Disaster recovery plan
  • Incident response policy
  • Remote access policy
  • Access control policy
  • Change management policy
  • Email/communication policy

What might surprise you is that most of these documents were probably written for IT networks, and you’ll have trouble finding good references and guidance for OT networks. For example, does your enterprise’s Disaster Recovery Plan also cover worst-case scenarios on your OT networks? Does your Remote Access Policy still hold true for access to Industrial Control Systems? Can a revision be made to accommodate the nuances for OT, or does your team need to create a separate policy for OT? In order to kick-start this effort, SANS has many example policy templates.

During this time, you might also consider your team’s preparedness for an actual incident, large or small. How would your team respond if the OT network was infected with ransomware today? Crisis Tabletop Exercises can be as simple or complex as you desire. Create a few realistic scenarios, set aside some time with your team, and walk through the response plans. If you find this especially difficult, or if your team needs help, then start the process of seeking outside consulting. Additionally, prepare your organization by identifying three or more Incident Response service firms that you might call when necessary. Begin discussions with your procurement team to identify whether to enter into a pre-defined contract or to use a retainer that would help accelerate the timeline to get “boots on the ground.” This would also be a good time to speak with your legal team to review any cybersecurity insurance policies that may be in place for your organization, as those resources also include guidance and response organizations in the event of a cybersecurity incident.

Select and establish a common framework such as NIST CSF, CIS Controls, NIST 800.82, ISA 62443, or ATT&CK for for assessing and defining your security requirements with regards to ICS. Establish and agree on a risk matrix across your OT environments. Compare and document the criticality of each site, manufacturing line, and zone. This information will be helpful to define a forward direction for the level of protective and detective controls needed. Seek out firms that deliver comprehensive cybersecurity assessments based on your preferred framework, and schedule an initial assessment at one of your most critical facilities.

Evaluate Technology Capabilities

It may not be realistic to define capability requirements and finish the procurement and installation process within 100 days. Instead, look for ways to utilize technology to achieve immediate results, analysis, and information that will help you make better procurement decisions in the future. Focus on discovery during your first 100 days, and look for solutions that can provide immediate time-to-value with zero installation effort.

Gather a comprehensive asset inventory, including device names, IP addresses, device type, manufacturer, and firmware versions. Knowing what is on your network is the first step to defending it. Augment this inventory with vulnerability awareness and prioritization, which can be automatically matched and ranked for you. Having this information across multiple facilities will allow your team to understand how far behind your OT devices are and determine whether some sites need budget prioritization for a more complete control system migration as opposed to a software or firmware upgrade.

Packet captures can also be used to provide immediate proof of concept with built-for-purpose OT network monitoring solutions. These can generate a network map, hygiene score, and even blueprint of your current zones and conduits for future segmentation improvements. Find out not only what is on your network but also where these devices are communicating and whether insecure protocols are being used.

Lastly, work with your IT security and operations team to develop an audit trail for remote connections to ICS networks. Begin to monitor and review both persistent and temporary remote access sessions with suspicion, and determine whether your current method is aligned with best practices including multi-factor authentication. Rather than relying on traditional IT remote access, which is frequently exploited and misconfigured, consider industrial solutions for remote access that keep the control in your OT team’s hands while providing the benefits of SSO and MFA.

There are recommendations for multi-factor authentication in OT environments, and almost every CISA security alert recommends it, as well. Sometimes, the challenge for implementing MFA in OT environments stems from a misunderstanding with regards to compatibility and support from OT vendors. Another challenge is that many of today’s MFA solutions require internet connections. Reach out to your OT system vendor and ask for their guidance. Most of them will have an answer such as physical keycards that can support “air-gapped” environments. Try to start a pilot project or proof-of-concept at one of your facilities. Evaluate the options and seek budget for this critical security control in your next cycle.

Develop a Roadmap or Vision Going Forward

This 100-day exercise can help to advance your OT security posture. But what’s next? After your 100 days, you should have a solid foundation to make better decisions and further the mission. As a final step, aim to define a 1-year and 3-year roadmap to reach your ultimate objectives: comprehensive visibility, hardened devices, mitigated vulnerabilities, continuous monitoring, secured access controls, better trained personnel, and updated, relevant policies that are clearly defined and communicated. Present this roadmap to key stakeholders, rework the plan as necessary, and seek budgetary approval for these necessary improvements to your organization’s critical infrastructure.

The post ” Designing a 100-Day Sprint for OT Cybersecurity: What to Consider” appeared first on TripWire

Source:TripWire – Ben Jackman

Tags: Bug, Critical Severity, Goverment, High Severity, Malware, Ransomware, TripWire

Continue Reading

Previous How to Fulfill Multiple Compliance Objectives Using the CIS Controls
Next DDoS IRC Bot Malware Spreading Through Korean WebHard Platforms

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)

Recent Posts

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT