<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OT - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/ot-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/ot-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 30 Mar 2022 18:03:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>OT - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/ot-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/03/17662/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/03/17662/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Wed, 30 Mar 2022 18:02:09 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17662</guid>

					<description><![CDATA[<p>Cyber issues in the energy sector The energy sector is made up of vital infrastructures and provides essential services for a country. The sector, shaped by increasing digitalization, is undoubtedly a prime target for cyber attackers with consequences that are liable...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/17662/">Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2>Cyber issues in the energy sector</h2>
<p>The energy sector is made up of <strong>vital infrastructures</strong> and provides essential services for a country. The sector, shaped by <strong>increasing digitalization</strong>, is undoubtedly <strong>a prime target for cyber attackers</strong> with consequences that are liable to create shockwaves throughout the service industry as well as all major infrastructure. Taking electricity as an example, an outage spanning a few days would have grave consequences on transport, health and communication almost guaranteeing they cannot perform their core functions.</p>
<p> </p>
<h2>A sector undergoing transformation</h2>
<p>The energy sector began its <strong>transition with the arrival of renewable energy</strong>. The shift in the sector is also due to innovative techniques and systems that have been integrated into the power grid to<strong> help manage the complex task of balancing energy levels</strong><strong>,</strong> because it is vital that the energy pumped in and out of the grid at any one time always remain equal. This level of transformation leads to <strong>an increased need for flexibility</strong> to ensure security of both the power supply and the significant investments in the power grid. These are the objectives that have and will continue to drive concepts such as<strong> smart grids</strong>, to enable the control of energy consumption and optimization.</p>
<p>In response to these business evolutions (market shifts), <strong>the energy sector is undergoing a digital transformation</strong> that is disrupting the way energy is produced, processed, stored, transported, and consumed. Overall, information and communication technologies have helped optimize the supply chain. An example being the widespread deployment of <strong>industrial internet of things</strong> (IIOT) devices. The switch to these devices has led to an explosion in the volume of data in day to day activities. While energy companies must now use this data to be more <strong>agile </strong>in their decision making by effectively leveraging it, the large volumes of data expose the industry as a whole to a host of data based malicious actions, making <strong>cyber security a priority for the energy sector.</strong></p>
<p>Here is a concrete example: remotely piloted, wind turbines and solar panels are by nature connected objects. They must be accessible remotely and therefore secure. However, these new projects do not systematically consider all cybersecurity constraints and related technical solutions (secure protocols, appropriate access technologies, etc.) from the design phase.</p>
<p> </p>
<h2>An increasingly targeted sector</h2>
<p>Let’s look at the “history” of cybersecurity in relation to this sector: the discovery of <strong>Stuxnet</strong> in 2010 created a shock wave within the energy industry. This attack highlighted unknown vulnerabilities at the time.</p>
<p>In December 2016, some inhabitants of Kiev and its periphery were deprived of electricity for about 1 hour due to the disconnection of the substation of the Pivnichna electricity transmission power grid. The attack began as part of <strong>a massive phishing campaign</strong> in July of the same year, which exploited a vulnerability in Windows XP. The failure was caused by the remote switching of the circuit breakers to cut power.</p>
<p>Since then, cyber events have become recurring occurrences. Another example: renewable energies are new targets for cyber attackers. In 2019, in Utah in the United States, <strong>a wind and solar power system</strong> suffered connection losses with the company’s control center for 12 hours, causing power outages in surrounding homes. Cyber attackers had exploited a known vulnerability on unpatched firewalls causing a denial of service of equipment.</p>
<p>In 2021, the executives of Colonial Pipeline, which connects refineries across the United States, decided to block all their distribution operations following <strong>the spread of ransomware</strong>. The company said they paid $4.4 million in ransom for hackers to provide a computer tool to restore their business<sup> [1]</sup>.</p>
<p>The energy sector is one of the most targeted sectors. According to the X-Force Threat Intelligence Index 2022 <sup>[2]</sup>, the energy sector ranked <strong>as the fourth most affected sector</strong> in 2021, with 8.2% of all observed attacks, behind the manufacturing industry, the financial sector, and the professional services sector.</p>
<p>In 2021, <strong>ransomware was the most common type of attack</strong> against energy organizations with 25% of attacks. Oil and gas companies are particularly affected by this phenomenon. Remote Access Trojan (RAT), DDoS and Business Email Compromise (BEC) follow with 17% of attacks each.</p>
<p>While cyber-attacks are most often <strong>targeted for profit and espionage</strong>, the energy industry also deals with <strong>sabotage intentions</strong>, sometimes <strong>for geopolitical reasons</strong>. Some <strong>hacktivists</strong> can also pose a threat by attacking critical infrastructure. The recent ongoing major geopolitical destabilization events reinforce these risks.</p>
<p>The energy sector has critical infrastructure. In an increasingly interdependent world, any disruption, even initially limited to an entity or geographic area, can produce broader cascading effects as outlined below:</p>
<p> </p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-17663 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1.png" alt="" width="643" height="257" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1.png 643w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1-71x28.png 71w" sizes="(max-width: 643px) 100vw, 643px" /></p>
<p style="text-align: center;"><em>Impact Chain-Wavestone</em></p>
<p> </p>
<p>To fight effectively against these new threats, <strong>the States and the European Union have adopted binding regulations</strong> to ensure a higher level of cybersecurity on the most critical facilities.</p>
<h2> </h2>
<h2>What role for regulation?</h2>
<p>In France, the competent authority for cybersecurity is the <strong><em>Agence nationale de la sécurité des systèmes d&#8217;information</em></strong> (ANSSI). To respond to the increase in threats, the concept for the defence strategy has been based on the <strong>Military Programming Law</strong> (LPM) since 2013 in order to secure the <strong>Operators of Vital Importance</strong> (OIV). ANSSI mainly insists on procedures for the approval, control, and maintenance in security conditions of <strong>Vital Information Systems</strong> (SIIV).</p>
<p>At European level, the objective is also to protect sensitive organizations such as <strong>operators of essential services</strong> (OES) in the energy sector. The reference point for cybersecurity is currently the <strong>Network and Information System Security (NIS) directive</strong>. Its primary objectives are to <strong>increase cooperation between EU Member States</strong>, by facilitating the exchange of strategic and operational information, and to <strong>improve the cyber resilience of public and private entities in key sectors</strong> such as energy. When it comes to energy, ENISA wants to protect from large-scale threats with increasingly cross-border and interdependent power grid.</p>
<p><strong>The complexity lies in the operational application</strong> of specific measures in industrial environments where equipment and means of production are expected to last <strong>several decades</strong>. Thus, modifying operational processes and/or equipment to incorporate additional cybersecurity is a concrete challenge. The impacts of this transition are significant both in financial and operational terms. This makes <strong>cooperation and sharing even more important for energy stakeholders to find pragmatic and adapted solutions</strong>: adapted network architecture, technical solutions compatible with the industrial world, vulnerability management processes and updates built with operational teams for example.</p>
<p> </p>
<h2>Conclusion</h2>
<p>Considering the critical nature of the energy sector infrastructure, it is essential that business and cybersecurity actors in the energy sector communicate on good cybersecurity practices<strong>, learn from previous attacks,</strong> and contribute to changing the overall level of protection. It is in this context that the first forum dedicated to energy stakeholders <strong>«Cyber4Energy»</strong> will be held in Marseille on 30-31 March 2022. This event will be an opportunity for professionals <strong>to discuss cybersecurity challenges and dedicated solutions available to the sector.</strong></p>
<p>Références :</p>
<p>[1] <a href="https://www.lemonde.fr/international/article/2021/05/19/etats-unis-les-oleoducs-colonial-pipeline-ont-verse-une-rancon-de-4-4-millions-de-dollars-a-des-hackeurs_6080761_3210.html">Etats-Unis : les oléoducs Colonial Pipeline ont versé une rançon de 4,4 millions de dollars à des hackeurs (lemonde.fr)</a></p>
<p>[2] X-Force Threat Intelligence Index 2022, IBM Security <a href="https://www.ibm.com/downloads/cas/M1X3B7QG">X-Force Threat Intelligence Index 2022 (ibm.com)</a></p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/17662/">Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/03/17662/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber resilience in an industrial environment</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/</link>
		
		<dc:creator><![CDATA[Alexandrine Torrents]]></dc:creator>
		<pubDate>Mon, 15 Mar 2021 10:30:33 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reconstruction]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15352</guid>

					<description><![CDATA[<p>For the most impatient readers, you can go directly to the Key Elements at the end of the article. Reminder of the state of the threat ANSSI states in ÉTAT DE LA MENACE RANÇONGICIEL &#8211; À L&#8217;ENCONTRE DES ENTREPRISES ET...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/">Cyber resilience in an industrial environment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">For the most impatient readers, you can go directly to the <a href="#key">Key Elements</a> at the end of the article.</p>
<h3 style="text-align: justify;">Reminder of the state of the threat</h3>
<p style="text-align: justify;">ANSSI states in <em>ÉTAT DE LA MENACE RANÇONGICIEL &#8211; À L&#8217;ENCONTRE DES ENTREPRISES ET INSTITUTIONS<a href="#_ftn1" name="_ftnref1">[1] </a></em><a href="#_ftnref1" name="_ftn1"></a>published on 05/02/2020: «  Since 2018, ANSSI and its partners have observed that more and more cybercriminal groups with significant financial resources and technical skills favour the targeting of particular companies and institutions in their ransomware attacks. ».</p>
<p style="text-align: justify;">Faced with this observation, it is more necessary than ever to secure information systems. This involves applying the fundamentals of security: applying patches, managing accounts and passwords, managing network segmentation etc. As a reminder, the application of these initial measures permits a significant reduction in the probability that an information system will be subject to a ransomware but can in no way guarantee that this will not happen.</p>
<h3 style="text-align: justify;">Specificity of the industrial sector</h3>
<p style="text-align: justify;">However, even though new defensive solutions are continually being developed, the cost and complexity of deploying some of them ultimately make them little used. This is truer in an industrial environment, where their integration can be complex, as some systems are fixed in a functional configuration. Moreover, the budgets allocated to IT security in an industrial environment, although increasing in recent years, are still not sufficient for many sites.</p>
<p style="text-align: justify;">Furthermore, an industrial information system shares a common base with a conventional information system and is therefore subject to the same attacks. Of course, attacks such as Stuxnet, Triton, or BlackEnergy (on a smaller scale) require additional skills. However, it is always worth remembering that the targets of interest for groups possessing this type of means are generally already subject to regulatory obligations (LPM in France, NIS directive etc.), which if respected, greatly limit the risks of a successful attack against them. However, these systems are not invulnerable, and must therefore also be prepared to respond to an attack.</p>
<h3 style="text-align: justify;">Inevitable attack on industrial systems: how to minimise the impact and restart operations quickly?</h3>
<p style="text-align: justify;">It therefore appears that:</p>
<ul style="text-align: justify;">
<li>Protecting oneself from the threat is often limited to the application of basic security measures if there is no regulatory obligation applicable to the target information system;</li>
<li>Identifying the sources of threat and detecting an attack before it reaches its objective requires in most cases resources that are too important in relation to the budgets of current industrial information systems.</li>
</ul>
<p style="text-align: justify;">If the probability of an information system undergoing a successful cyber-attack, and more specifically a ransomware, is almost certain, the following question arises: &#8220;How can we prepare for a major cyber-attack, maintain critical activities in a degraded mode, while rapidly regaining confidence in the industrial information system? ».</p>
<p style="text-align: justify;">The answer to this question is covered by the last two pillars of computer security according to the NIST framework: respond and recover. An attempt to answer this question is presented in this article.</p>
<p style="text-align: justify;">Note: the first part of this article &#8220;How to respond to an attack before it is too late?&#8221; is not necessary to implement the recommendations detailed in the second part &#8220;How to recover after an attack if it could not be contained? ». Although the implementation of network filtering measures is highly recommended, it may be interesting for sites where the implementation of such filtering measures takes too long to implement, to start with the preparation part of the remediation of a cyber-attack, which is easier to implement.</p>
<h2 style="text-align: justify;">How to respond to an attack before it is too late?</h2>
<h3 style="text-align: justify;">Involving industrial teams</h3>
<p style="text-align: justify;">Before talking about the measures that can be put in place to respond to a digital security incident, it may be interesting to remember that industrial staff are used to crisis management.</p>
<p style="text-align: justify;">Indeed, many industries regularly organise crisis management exercises (fire, chemical risk, natural disasters, etc.). On many sensitive sites, procedures are therefore already available to respond to this type of incident, under the direction of a dedicated manager. In addition, autonomous physical protection is generally available: pressure relief valve, non-return valve, sprinkler etc., although these are sometimes replaced by connected instrumented safety systems.</p>
<p style="text-align: justify;">The context is therefore appropriate for adding a new procedure in order to respond to a computer attack. This will generally consist of isolating the industrial information system from the outside via a procedure known as the &#8220;red button&#8221;. In order to draw up the associated procedure, the involvement of site personnel will be essential, particularly to ensure that the application is not more harmful than the attack itself.</p>
<h3 style="text-align: justify;">A prerequisite for the implementation of the isolation posture: the control of its flows and the implementation of network partitioning/filtering.</h3>
<p style="text-align: justify;">It is necessary to measure the impacts generated using the &#8220;red button&#8221;. To do this, it is necessary to list the interconnections of the industrial site with other systems.</p>
<p style="text-align: justify;"><strong>List the interconnections with other information systems.</strong></p>
<p style="text-align: justify;">It may be interesting to start by listing the flows between the industrial information system and the outside. First of all, it is necessary to define what this system contains. In a basic case, it includes the PLCs, the supervision, as well as the equipment necessary for the interconnection of the first two.</p>
<p style="text-align: justify;">Other equipment can then be added: an Historian server, client stations for supervision, a NAS, etc. This network, later called an industrial network, is generally connected with other networks in order to share information with the equipment of the latter.</p>
<p style="text-align: justify;">It is possible to mention:</p>
<ul>
<li style="text-align: justify;">Exchanges with the company&#8217;s ERP (whether an MES &#8211; Manufacturing Execution System is present or not), generally located on the office network;</li>
<li style="text-align: justify;">Exchanges with partners: regulation of electricity, water and gas networks, etc.;</li>
<li style="text-align: justify;">Exchanges with service providers: weather, cloud solutions for energy optimisation, predictive maintenance, etc.</li>
</ul>
<p style="text-align: justify;">These flows, although useful to simplify operations, can generally be temporarily cut off or replaced by alternative means (telephone call to indicate production levels for example).</p>
<p style="text-align: justify;">Moreover, each industrial site is different, and therefore manages these interconnections differently. It is common to see MPLS networks dedicated to industrial sites when the company owns several of them. In other cases, the office network will be used to federate them. It is also true for the connection needs between these industrial networks and the Internet, which sometimes pass first through the office network, or benefit from a direct output.</p>
<p style="text-align: justify;"><strong>List its internal flows</strong></p>
<p style="text-align: justify;">After listing the interconnections between the industrial network and the outside, the internal flows remain to be listed. Most of these flows should be strictly necessary for the proper functioning of the industrial process, such as those between supervision and PLCs. Cutting off these connections would therefore require stopping the industrial process, or at least making it safe.</p>
<p style="text-align: justify;">It may then be interesting to separate the equipment and associated flows into several zones:</p>
<ul>
<li style="text-align: justify;">Supervision;</li>
<li style="text-align: justify;">Field network;</li>
<li style="text-align: justify;">Others (supervision client stations, historian server, etc.).</li>
</ul>
<p style="text-align: justify;">Setting up these zones allows the exposure of these components to be drastically reduced. Indeed, only the supervision should have access to the field networks, while the &#8220;Others&#8221; category should only have access to the supervision.</p>
<p style="text-align: justify;">Other zones may be necessary to implement such as:</p>
<ul style="text-align: justify;">
<li>An administration zone: which could also be used to program the PLCs according to the distribution of roles and responsibilities on site;</li>
<li>A DMZ: which can accommodate a relay server so that equipment outside the industrial site does not connect directly to the supervision system to retrieve production data, etc.</li>
</ul>
<p style="text-align: justify;">Depending on the services offered (WSUS server, antivirus server, Terminal Server for remote access etc.) other zones can of course be added.</p>
<p style="text-align: justify;"><strong>Evaluate the real need for these flows</strong></p>
<p style="text-align: justify;">After listing all these flows, it is interesting to identify the real need for each of them. For example, is it necessary to be able to access e-mails from a supervision server?</p>
<p style="text-align: justify;">In order to limit the exposure of the industrial network to the outside, it could also be necessary to take some equipment out of it. For example, if a database accessed from the office network is fed by the supervision, but not useful to it, hosting it directly on the office network may prove simpler than trying to limit access.</p>
<p style="text-align: justify;">Once the necessary flows have been clearly identified, the associated filtering rules must be configured in detail (source IP address, destination IP address, destination port). This work generally requires a significant human investment, mainly from the teams in charge of the industrial site, as well as a significant material cost to acquire security equipment. However, it is a prerequisite for setting up the fallback postures described below. In an ideal case, application filtering (level 7 of the OSI model) could also be implemented.</p>
<p style="text-align: justify;">This work, although essential to the implementation of isolation postures, is also one of the fundamental actions to be carried out within the framework of securing an information system (industrial or not). Indeed, each flow cut off is a flow that does not need to be monitored, as well as one that is less exploitable by an attacker.</p>
<h3>Preparing fallback postures</h3>
<p style="text-align: justify;">Complete isolation of all the equipment in an industrial information system is not always desirable, even in the event of an attack. After having listed these flows, it may be interesting not to set up a single isolation posture, but several fallback postures, allowing in some cases to continue working almost normally.</p>
<p style="text-align: justify;"><strong>Preventive fallback posture: isolate the plant in the event of an attack on an external network</strong></p>
<p style="text-align: justify;">After identifying the flows between the industrial network and the outside, it is possible to create an associated fallback posture in order to deactivate them if necessary. The objective of this posture is to cut all interconnections of the industrial network with the outside in order to prevent any propagation of an attack. A proven solution is to group these flows on a few dedicated Ethernet ports. Thus, it is sufficient to indicate in the associated procedures to disconnect the associated cables to activate the fallback posture. This also avoids having to intervene on the configuration of firewalls in the event of a cyber security incident.</p>
<p style="text-align: justify;">In addition, it is also necessary to define the cases in which this posture should be activated. If it can be activated without posing any problem to production, or adding too much work to the site staff, the question may arise as to whether these flows are necessary.</p>
<p style="text-align: justify;">If this posture does have an impact on the site&#8217;s industrial activities, a good balance must be found between triggering it too early (as soon as the antivirus software on an office workstation raises an alert), or too late (after the first industrial workstations have been encrypted). This will also depend on the context of the company and its resources (dedicated or non-dedicated security monitoring team, etc.).</p>
<p style="text-align: justify;"><strong>Specificity (distributed sites, non-autonomous sites, etc.)</strong></p>
<p style="text-align: justify;">If all flows with the outside do not have the same destination, it may also be interesting to define several specific fallback positions. Indeed, if the service provider in charge of managing the site&#8217;s cameras warns that he is undergoing a ransomware attack, it seems more optimal to disconnect only the flows between this service provider and the factory network, rather than all the flows, including those to the ERP.</p>
<p style="text-align: justify;">In the case where the industrial process is distributed over several sites (production and distribution plant in particular), the activation of the preventive fallback posture should not cut off the flows between these different sites. Indeed, specific links should be dedicated to this. If this is not the case, use of the office network to ensure these connections, for example, a project to overhaul the industrial network is probably to be expected (deployment of a dedicated VRF, or a SDWAN network for example).</p>
<p style="text-align: justify;">Finally, it is always good to remember that each factory is different, so a local study will have to be carried out on each one to understand its specificities.</p>
<p style="text-align: justify;"><strong>Last resort fallback position: switch off the information system in the event of a proven attack on the plant</strong></p>
<p style="text-align: justify;">Finally, it may be interesting to prepare a last resort fallback posture. This should consist of isolating each VLAN (if defined, preferably with a local HMI per VLAN to ensure a degraded mode) or each piece of equipment (turn off the switches) in order to prevent the attacker from continuing his actions, which in the most advanced cases of attack, could directly target the site&#8217;s industrial process.</p>
<p style="text-align: justify;">The objective is then to secure the site or ensure its essential services. The activation of this posture implies working without an information system and should only be applied in the event of proven compromise of at least one piece of equipment on the site, since it leads to the same immediate result as a ransomware, if not worse.</p>
<p style="text-align: justify;">An upstream work with the operators will be necessary in order to list all the actions to be carried out when this posture is activated and to define degraded modes. Indeed, this will generally require the activation of on-call duty in order to manually perform certain tasks: checking the correct operation of equipment, especially on remote sites, use of local HMIs, etc. Moreover, some industrial processes are no longer manually controllable today, and will therefore have to be stopped since no degraded mode is available.</p>
<p style="text-align: justify;">In order to estimate the impacts of activating such a posture, it may be interesting to look at the impacts listed in the event of fire or a general power failure. Moreover, only a real test of this posture can ensure its operational impacts.</p>
<h2 style="text-align: justify;">How to recover after an attack if it has not been contained?</h2>
<p style="text-align: justify;">In some cases, the activation of fallback postures may not be sufficient to protect the entire industrial information system, especially if they are activated too late. It is then essential to be able to proceed with the reconstruction of all or part of the said system in a sufficiently short time to limit the associated impacts.</p>
<p style="text-align: justify;">The main prerequisites for restoring an industrial information system are listed below.</p>
<h3 style="text-align: justify;">What must be backed up to be able to restore its PLCs?</h3>
<p style="text-align: justify;">In order to be able to restart the factory, it is necessary in most cases to start restoring PLCs, which requires two main elements.</p>
<p style="text-align: justify;"><strong>Having an up-to-date copy of your PLC programs</strong></p>
<p style="text-align: justify;">PLCs are spared in most current attacks, probably because targeting Windows workstations is enough for attackers to achieve their intended objectives. However, attacks are likely to be increasingly targeted, and most PLCs currently in use are not secure (unencrypted and unauthenticated communications, default passwords, administration functionality that cannot be deactivated, etc.).</p>
<p style="text-align: justify;">It is therefore necessary to save these programs, which is already generally the case, particularly on the programming station (sometimes belonging to a service provider) used when the device is commissioned. It should be noted that these backups should be stored on at least one off-line medium, so that they are not encrypted in the same way as the workstation hosting them.</p>
<p style="text-align: justify;">These observations remain valid even for the new generations of PLCs, which, although benefiting from a level of security that is far superior to that of their predecessors, are not invulnerable.</p>
<p style="text-align: justify;"><strong>Save a means of downloading these programs to the PLCs</strong></p>
<p style="text-align: justify;">Many PLCs require dedicated software to be programmed. This is even the case if you just want to download an already written program. It is therefore advisable to have a copy of these programs.</p>
<p style="text-align: justify;">In some cases, a programming station disconnected from the network and reserved for this purpose can be a solution. It should be noted, however, that maintaining such a station in a safe condition can quickly become complex. If this solution is selected, this station could also host the copy of the PLC programs. Keeping a second backup set off-line (external hard disk for example) would however be an additional security measure.</p>
<p style="text-align: justify;">Furthermore, if new generations of PLCs are used, with the latest security features enabled, other elements should be backed up such as: PLC program passwords, certificates used for certain communications (or a means of regenerating them) etc.</p>
<p style="text-align: justify;">These prerequisites are also valid for network equipment (firewalls, switches etc.).</p>
<h3 style="text-align: justify;">What needs to be backed up to be able to restore essential computer hardware?</h3>
<p style="text-align: justify;"><strong>Identifying what is really needed</strong></p>
<p style="text-align: justify;">Restoring SCADA system, and associated client workstations, is generally equivalent to restoring a Windows system and associated programs. Several questions must be asked to identify the items to be backed up:</p>
<ul style="text-align: justify;">
<li>What equipment is needed? An engineering workstation, a SCADA server, a few operator workstations?</li>
<li>Is it possible to reinstall the SCADA system from scratch (new installations of Windows and the supervision software) and then deposit a backup of the SCADA configuration? Is this feasible in a sufficiently short time?</li>
<li>Would not a complete copy of the SCADA server disk be simpler? It would indeed be sufficient to insert the saved disk to reboot.</li>
<li>Are changes regularly made to the supervision software? If yes, is it necessary to back them all up? In this case, it seems complex to make a complete copy of the disk each time.</li>
</ul>
<p style="text-align: justify;"><strong>Backing up intelligently</strong></p>
<p style="text-align: justify;">In many cases, backups of Windows workstations are made in the same way as those of PLC programs, by copy/paste. It could then be interesting to look at automatic backup mechanisms. However, these are probably to be avoided for factories starting from scratch and not having enough budget to install them serenely. Indeed, implementing this type of solution in a secure manner is generally more complex than making a simple bit-by-bit copy of a hard disk.</p>
<h3 style="text-align: justify;">Do not neglect documentation and training</h3>
<p style="text-align: justify;">However, it is not enough to have complete backups available. It is also necessary to draw up detailed operating procedures for restoring these backups. Indeed, if a crisis were to occur, the stress of the teams and the potential unavailability of some of the knowledge could lead to handling errors in the absence of documentation.</p>
<p style="text-align: justify;">These procedures are not intended to enable a complete restoration of all systems, but at least to enable the essential elements previously identified to be restarted:</p>
<ul style="text-align: justify;">
<li>An engineering workstation with the associated PLC programming software;</li>
<li>A SCADA server;</li>
<li>Two to three operator workstations;</li>
<li>The plant&#8217;s essential PLCs.</li>
</ul>
<p style="text-align: justify;">In addition, it is generally recommended to have at least two sets of backups, one to be stored near the equipment concerned, the other to be stored on another physical site, with access limited to a limited number of people. It may be tempting to store an additional set of backups online, but it should be noted that in the event of a cyber-attack, and activation of fallback procedures, it is complex to download these backups and deposit them on the systems to be restored.</p>
<p style="text-align: justify;">Finally, it is essential to test all these procedures to ensure that they are exhaustive. A test could, for example, be the opportunity to realise that the backup of the SCADA configuration does not include the licence key, or that the passwords configured when the complete disk was copied have since been modified without keeping the history.</p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">Crisis management is an important component of the business for many industrial system operators. These same people are also the most experienced in their perimeter. However, they are generally not IT experts. Pragmatic measures, adapted to their context, will therefore be far more useful than a generic 200-page guide containing all the good practices to be applied to an information system.</p>
<p style="text-align: justify;">As in development with the KISS principle (<em>Keep it simple, stupid),</em> <strong>fallback postures, as well as restoration procedures, should be kept simple to understand, and stupid to apply.</strong></p>
<p style="text-align: justify;">Furthermore, although the application of a strict network filtering policy can only be advised, it is not strictly necessary for the implementation of backup and recovery actions. Thus, even if the probability of a successful attack is increased, it will still be possible to restore critical systems.</p>
<p style="text-align: justify;">Finally, it should be noted that more and more industrial processes are nowadays operating in a just-in-time mode. In this type of context, the preservation of the industrial system from an attack, or the ability to restore it quickly, would not be sufficient to maintain the level of production if the management of orders or distribution, for example, are unavailable. Cyber resilience must therefore be considered at the company level, and not only at the level of the industrial site.</p>
<h2 id="key" style="text-align: justify;">Key elements</h2>
<p style="text-align: justify;">To respond to an attack before it is late, it is necessary:</p>
<ul style="text-align: justify;">
<li>To involve the industrial teams (without which it is highly likely that the computer will survive the attack, but without the factory continuing to fulfil its primary mission);</li>
<li>To control its flows and implement network partitioning/filtering in order to be able to set up fallback postures:
<ul>
<li>Preventive, in order to isolate the factory in the event of an attack on an external network without having too significant an impact on the industrial process;</li>
<li>As a last resort, in order to shut down the information system in the event of a proven attack on the factory before the attacker modifies the industrial process.</li>
</ul>
</li>
<li>To test these fallback postures, in order to ensure that their activation is not worse than the attack.</li>
</ul>
<p style="text-align: justify;">And in the case where the attack could not be contained, the following elements are generally necessary in order to recover from the said attack:</p>
<ul style="text-align: justify;">
<li>Possess an up-to-date copy of your PLC programs;</li>
<li>Save a means of downloading these programs to the PLCs;</li>
<li>Have at least one copy of all critical backups on an off-line medium (external hard disk for example);</li>
<li>Identify its essential computer equipment (in particular so as not to restore the history server before the supervision server, etc.);</li>
<li>Backing up intelligently, sometimes a bit-by-bit copy of the hard disk is more efficient than an automatic copy on a dedicated server, generally encrypted at the same time as the system whose backups it hosts;</li>
<li>Don&#8217;t neglect documentation and training (otherwise a forgotten license key, or someone on holiday could quickly sign the end of the restore&#8230;).</li>
</ul>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-001.pdf">www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-001.pdf</a></p>
<p style="text-align: justify;">A new version of the threat assessment was published at the beginning of the year: <a href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-001.pdf">https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-001.pdf</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/">Cyber resilience in an industrial environment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detection probes in industrial environments, our vision of the market</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/detection-probes-in-industrial-environments-our-vision-of-the-market/</link>
		
		<dc:creator><![CDATA[Benoit Bouffard]]></dc:creator>
		<pubDate>Mon, 08 Mar 2021 06:59:20 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[knowledge]]></category>
		<category><![CDATA[market]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[probe]]></category>
		<category><![CDATA[vision]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15461</guid>

					<description><![CDATA[<p>Among the needs identified by our industrial customers are the mapping of OT systems (Operational Technology) and the detection of attacks. Over the last ten years or so, several players have been working on the development of tools to meet...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/detection-probes-in-industrial-environments-our-vision-of-the-market/">Detection probes in industrial environments, our vision of the market</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Among the needs identified by our industrial customers are the mapping of OT systems (Operational Technology) and the detection of attacks. Over the last ten years or so, several players have been working on the development of tools to meet these needs: industrial cybersecurity probes, also known as detection probes or intrusion detection probes. For the rest of this article, we will simply refer to &#8220;OT probes&#8221;. For your information, there are also IT (Information Technology) probes, but they are not part of the subject of this article.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Our product vision: a solution with multiple functionalities</h2>
<h3>Description</h3>
<p style="text-align: justify;">An OT probe is a piece of equipment, virtual or physical, connected to the information system (IS) in order to map and monitor it. It consists of sensors distributed in the network to collect data and central equipment to correlate this data.</p>
<p style="text-align: justify;">A probe is characterised by:</p>
<ul style="text-align: justify;">
<li>Its operating mode,</li>
<li>The positioning of its components,</li>
<li>Its attack detection methods,</li>
<li>Its bundle of features.</li>
</ul>
<p style="text-align: justify;">The illustration below provides more details on each of these items:</p>
<figure id="post-15470 media-15470" class="align-none"><img decoding="async" class="aligncenter wp-image-15470 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/1.png" alt="" width="1084" height="461" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/1.png 1084w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/1-437x186.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/1-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/1-768x327.png 768w" sizes="(max-width: 1084px) 100vw, 1084px" /></figure>
<p style="text-align: center;"><em>Figure 1: Main characteristics of an OT probe</em></p>
<p style="text-align: justify;">
<h3>Main functionalities</h3>
<p style="text-align: justify;">The functionalities of these OT probes are essential for their users. The illustration below presents a summary of the main functionalities identified:</p>
<figure id="post-15468 media-15468" class="align-none"><img decoding="async" class="aligncenter wp-image-15468 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/2.png" alt="" width="958" height="495" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/2.png 958w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/2-370x191.png 370w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/2-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/2-768x397.png 768w" sizes="(max-width: 958px) 100vw, 958px" /></figure>
<p style="text-align: center;"><em>Figure 2: Main functionalities of an OT probe</em></p>
<p style="text-align: justify;"><em> </em></p>
<p style="text-align: justify;">More advanced functionalities also appear on some products, such as centralised management of several sites, provision of investigation guides, vulnerability research, etc. According to our observations, the solutions on the market tend towards the same objectives in structural and functional terms. The differences appear rather at the level of the global integration of the probe with the offers of the suppliers.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Our vision of the market: a market in the process of consolidation</h2>
<h3>Numerous and varied players</h3>
<p style="text-align: justify;">Our studies have enabled us to highlight a little over twenty players with diverse profiles on the OT probe market. Over the last five years, some players have appeared, others have disappeared, partnerships have been built and solutions have continued to evolve. All these elements indicate a market that is still in the process of consolidation.</p>
<figure id="post-15466 media-15466" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15466 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/3.png" alt="" width="1066" height="544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/3.png 1066w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/3-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/3-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/3-768x392.png 768w" sizes="auto, (max-width: 1066px) 100vw, 1066px" /></figure>
<p style="text-align: center;"><em>Figure 3: Our market knowledge</em></p>
<p style="text-align: justify;"><em> </em></p>
<h3>Actors with different approaches</h3>
<p style="text-align: justify;">As might be expected in such a diverse market, different approaches to the sales model emerge. Some players put more emphasis on their product as such, while others emphasise its integration in their catalogues of services (threat intelligence, SOC, CSIRT&#8230;) or complementary products. These approaches naturally influence the contact between the players and their customers: the more the offer emphasises a service, the more the player will seek to have direct contact with his customer.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">Our vision of the field: a need for maturity</h2>
<h3>Our feedback</h3>
<p style="text-align: justify;">At least initially, we recommend focusing on critical sites and processes for reasons of time, cost and skill savings. Moreover, in order to offer relevant behavioural detection, the probes require a significant learning time depending on the site on which they are deployed (identification of false positives, false negatives, accumulation of data for learning&#8230;). In addition to this time, significant human resources are required during this learning phase, but also later during the daily use of the product (mainly alert management). It will also be important to link the probe management teams and the incident response teams in order to deal with incidents detected by the probe and then confirmed.</p>
<p style="text-align: justify;">Prior to deployment, the positioning of the probes should be studied. Indeed, it will be the key to both a complete mapping and an optimal detection surface. These initial considerations must address important points such as hardware compatibility (switches, for example) with the probes and the architecture of the site (on which the number of probes may depend). In addition to providing a real-time inventory, mapping can help implement or review network segmentation, an essential step in a security project. The qualification phase should also make it possible to check that the chosen probe will understand all the industrial protocols used and to discuss the processing of encrypted flows, if any.</p>
<p style="text-align: justify;">Finally, of course, this type of project cannot be carried out without the integration, from the outset, of the OT teams.</p>
<p style="text-align: justify;">A number of our clients stop at the test phase, but others have started to deploy probes on their critical sites or even on their entire industrial information system. The reasons given for not deploying probes are mainly related to costs, charges and required skills. The sovereignty of a detection probe can also be an important issue in certain environments.</p>
<h3>Identified limits</h3>
<p style="text-align: justify;">In addition to the above points, technical limitations may also arise. Issues of bandwidth and network overload, induced by the collection of logs, can be anticipated. Moreover, an OT probe is by nature limited to network exchanges, its results (detected threats, security level evaluation&#8230;) are therefore to be put into perspective in relation to the resources at its disposal.</p>
<p style="text-align: justify;">Finally, the probes ensure detection. On the other hand, the reaction must be carried out by other means, human or technological. More generally, with their many interesting functionalities, the probes are complementary to good security practices such as: the installation of antivirus and firewall, the implementation of a well of logs and adequate collection configurations, the construction of network documentation, the establishment of dedicated SOC and CSIRT teams&#8230; All these practices remain in force and will allow the full exploitation of the probes&#8217; capacities.</p>
<figure id="post-15464 media-15464" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15464 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/4.png" alt="" width="995" height="602" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/4.png 995w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/4-316x191.png 316w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/4-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/4-768x465.png 768w" sizes="auto, (max-width: 995px) 100vw, 995px" /></figure>
<p style="text-align: center;"><em>Figure 4: Our main feedback on the deployment of an OT probe</em></p>
<p style="text-align: justify;"><em> </em></p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The probes offer a range of functionalities that meet real needs. Our meetings indicate that the market players continue to take into consideration the needs that have been brought to their attention in order to improve their product. Despite a consolidating market, the players seem to be technically converging towards extremely similar end products. Differences will be played out on ergonomic details, on the approaches adopted by each and on costs.</p>
<p style="text-align: justify;">Our initial feedback shows the importance of the load and the skills required to use a probe. While they may be useful in an immature context, in order to help with system knowledge and the implementation of good network hygiene, they only really reveal their potential once they are fully integrated into the arsenal of detection and incident response teams, which corresponds to a highly mature context. Thus, it would seem to be a higher priority to follow the good practices outlined above in order to gain in maturity and then to consider deploying a probe in a second phase.</p>
<p>&nbsp;</p>
<p style="text-align: justify;"><em>1: See </em><a href="https://en.wikipedia.org/wiki/Purdue_Enterprise_Reference_Architecture"><em>https://en.wikipedia.org/wiki/Purdue_Enterprise_Reference_Architecture</em></a></p>
<p style="text-align: justify;"><em>2: See https://en.wikipedia.org/wiki/Port_mirroring</em></p>
<p style="text-align: justify;"><em>3: See </em><a href="https://en.wikipedia.org/wiki/Network_tap"><em>https://en.wikipedia.org/wiki/Network_tap</em></a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/detection-probes-in-industrial-environments-our-vision-of-the-market/">Detection probes in industrial environments, our vision of the market</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/</link>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 13:14:51 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[use case]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15280</guid>

					<description><![CDATA[<p>Industry 4.0, a milestone in the history of the technology race Let us make a detour through a page of history, before plunging into the heart of our subject : In the 18th century, James Watt&#8217;s steam engine and coal...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/">Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">Industry 4.0, a milestone in the history of the technology race</h2>
<p style="text-align: justify;">Let us make a detour through a page of history, before plunging into the heart of our subject :</p>
<ul style="text-align: justify;">
<li>In the 18th century, James Watt&#8217;s <strong>steam engine</strong> and coal mining changed the way of working. The use of <strong>hydraulic machines</strong> made the artisan workshops evolve into much more efficient factories: the 1st industrial revolution was in full swing.</li>
<li>Then, the 2nd industrial revolution known for <strong>Taylorism and mass production</strong> is based on the use of <strong>electricity and oil</strong>. The long assembly lines, dear to Charlie Chaplin, replace the hydraulic and steam engines that are now obsolete.</li>
<li>The development of <strong>new information technologies, from 1970 onwards,</strong> supporting operators in the most difficult tasks characterizes the 3rd industrial revolution. In particular, it allowed for increased <strong>robotization</strong> and <strong>production of larger batches</strong>.</li>
</ul>
<figure id="post-15305 media-15305" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15305 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1.png" alt="" width="1328" height="472" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1.png 1328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-768x273.png 768w" sizes="auto, (max-width: 1328px) 100vw, 1328px" /></figure>
<p>&nbsp;</p>
<h2>This 4th industrial revolution marks the arrival of new technologies that are increasingly connected, leading to a high level of dependence on information technology.</h2>
<p style="text-align: justify;">Industry 4.0 brings together a <strong>set of technological advances and technical tools for optimising industrial processes.</strong></p>
<figure id="post-15319 media-15319" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15319 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2.png" alt="" width="1451" height="577" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2.png 1451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-437x174.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-768x305.png 768w" sizes="auto, (max-width: 1451px) 100vw, 1451px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Let&#8217;s take a concrete example of a use case:</p>
<figure id="post-15324 media-15324" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15324 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3.jpg" alt="" width="291" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3.jpg 291w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3-93x191.jpg 93w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3-19x39.jpg 19w" sizes="auto, (max-width: 291px) 100vw, 291px" /></figure>
<p style="text-align: justify;">A company needs to accelerate its production rate and to robotise part of its actions to save time. For example, screwing actions. It chooses to use a collaborative robot, also called a « cobot »<a href="#_ftn1" name="_ftnref1"><sup>[1]</sup></a>, capable of carrying out actions simultaneously or on the same workspace as an operator. The operator will be responsible for presenting the parts to be screwed to the cobot.</p>
<p style="text-align: justify;">In addition to <strong>reducing turnaround time</strong>, the implementation of this binomial makes it possible to <strong>increase the quality of the finished product.</strong></p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Industry 4.0 use cases increase the cyber risk to business processes. There are two reasons for this: the need for new interconnections of industrial systems with the outside world and the increased potential impact in the event of compromise..</h2>
<p style="text-align: justify;">What are the impacts for cybersecurity in this whole story? If we continue with this cobot, the screwing, initially done manually by an operator, is now made easier by the use of the cobot. The cobot has to be connected to receive orders and be updated.</p>
<ul style="text-align: justify;">
<li>The manual operation is replaced by a computerised operation that is now exposed to a cyber attack</li>
</ul>
<p style="text-align: justify;">On a conventional robot, a &#8220;safety cage&#8221; is present to prevent intrusion by an operator during the operation of the machine tool. On a cobot, as there is collaboration with the operator, this protection does not exist. <strong>An impact in case of contact between the cobot&#8217;s screwdriver and the operator&#8217;s hand would be particularly serious for the operator</strong> <strong>!</strong></p>
<ul style="text-align: justify;">
<li>The introduction of new technologies can increase the severity of a cyber attack</li>
</ul>
<p style="text-align: justify;">This is not the only consequence of unsafe use of such technology :</p>
<ul style="text-align: justify;">
<li>Changing a value in the cobot regarding the screwing torque can lead to <strong>a quality defect in case of incorrect tightening ;</strong></li>
<li>Greater importance of assisted operations means that in the event of a failure, the impact on production will be greater&#8230; which will quickly lead to a financial impact.</li>
</ul>
<p style="text-align: justify;">Let&#8217;s sum up a little simplistically :</p>
<p>&nbsp;</p>
<figure id="post-15327 media-15327" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15327 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4.png" alt="" width="748" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4.png 748w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-239x191.png 239w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-49x39.png 49w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-155x125.png 155w" sizes="auto, (max-width: 748px) 100vw, 748px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">The question now is <strong>how to deal with these risks, without blocking the legitimate demands</strong> of operational staff. Spoiler: no, refusing the project is not the solution!</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The teams responsible for cybersecurity can anticipate the needs for the implementation of 4.0 technologies by drawing up adapted reflex sheets</h2>
<p style="text-align: justify;">From a technical point of view, we can group the advances linked to Industry 4.0 around a few major themes: augmented reality, connected objects, additive manufacturing, etc. Upstream of projects and with a few well-informed industry players around the table, it is possible to anticipate potential demands.</p>
<p style="text-align: justify;">The objective for the cyber security team will then be to <strong>draw up a profile of typical use cases</strong>, deduce the potential risks and begin to identify appropriate security measures to respond to them. It is also an opportunity to propose <strong>&#8220;Industry 4.0&#8221; checklists to raise awareness upstream of projects.</strong></p>
<p style="text-align: justify;">Concretely, here is an example of a typical reflex card applied to our cobot seen previously :</p>
<figure id="post-15329 media-15329" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15329 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5.png" alt="" width="650" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5.png 650w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-276x191.png 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-245x170.png 245w" sizes="auto, (max-width: 650px) 100vw, 650px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">By preparing upstream, cybersecurity teams are more relevant and effective when a new project is about to start.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Ready to embark on a &#8220;4.0&#8221; project? This is the ideal opportunity to support the industry in the transformation of its factory by offering adapted cyber security services.</h2>
<p style="text-align: justify;">The advantage of &#8220;Industry 4.0&#8221; projects lies in their ability to make in-depth changes to the foundations, sometimes a little dusty, of systems and networks already installed in the factory.</p>
<p style="text-align: justify;">Does a conveyor project need to exchange information with the outside world? This is an opportunity to propose a secure file exchange server in your industrial DMZ (if you don&#8217;t have one, this is also a good time to think about it). Does an augmented reality system need a more stable wireless connection? This is the time to start thinking about strengthening the control of the devices that can be connected to it…</p>
<p style="text-align: justify;">At the risk of repeating the obvious here, the ideal is to arrive upstream of the projects, through a constructive approach, rather than through a 100-page ISSP and guides to standards and technical rules that are not adapted to the cases of use presented.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">For the risk analysis of an &#8220;Industry 4.0&#8221; project, the EBIOS RM risk analysis method facilitates exchanges by sharing strategic scenarios that can be understood by the business</h2>
<p style="text-align: justify;">Once discussions have begun on a concrete project, it is useful to carry out a risk analysis to support the discussions. Its depth and method will depend on the size and risks of the project.</p>
<p style="text-align: justify;">This analysis will make it possible to refine the objectives we wish to protect, take a step back from the existing ecosystem and define the most convincing attack scenarios.</p>
<p style="text-align: justify;">Here are some examples of frequently found scenarios :</p>
<ul style="text-align: justify;">
<li><strong>Logical sabotage for financial purposes </strong>(long version of the Ransomware scenario): A targeted or non-targeted attack, making equipment unavailable for financial gain.</li>
<li><strong>Stopping/Slowing down production: </strong>Targeted sabotage to gain a competitive advantage, revenge by ideology or just by defiance can be carried out by a malicious competitor, an avenger, a terrorist, an activist or even a thrill-seeking amateur. Also be careful not to forget the errors of manipulation !</li>
<li><strong>The alteration of the quality of the part produced: </strong>rather sophisticated and targeted sabotage impacting the quality of the products to discredit the company or simply create damage.</li>
</ul>
<figure id="post-15331 media-15331" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15331 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6.png" alt="" width="847" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6.png 847w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-437x74.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-768x131.png 768w" sizes="auto, (max-width: 847px) 100vw, 847px" /></figure>
<p style="text-align: justify;">The conclusion of the risk analysis will make it possible to precisely define the cybersecurity measures to be put in place and the associated residual risks.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">To move away from the &#8220;fortified castle&#8221; model, i.e. to focus on the isolation of its industrial IS and perimeter security, and to propose adapted security measures: finer detection, encryption, MCS &#8230; in a way, it&#8217;s time to move on to &#8220;4.0&#8221; measures</h2>
<p style="text-align: justify;">Our feedback shows that the definition of an action plan is a balancing act in these &#8220;4.0&#8221; projects. Indeed, by applying an overly restrictive safety model, based on IEC 62443-3-3 type zones and ducts, we run the risk of misunderstanding between the stakeholders. In fact, <strong>not all business solutions are compatible or mature, and many have not yet integrated the standards we would like to see applied.</strong></p>
<p style="text-align: justify;">So what to do? One way might be to propose appropriate security measures, &#8220;4.0&#8221; measures (for the industrial environment in any case) that have already proved their worth in other environments:</p>
<ul style="text-align: justify;">
<li>To prevent a threat from spreading, one shall <strong>strengthen detection resources</strong>, especially the flows from and to industrial IS. This is the time to take advantage of this opportunity to dock with the Group SOC if it has not already done so.</li>
</ul>
<ul style="text-align: justify;">
<li>To ensure the integrity and traceability of transmitted/received data, <strong>encryption and authentication can be implemented.</strong> Do you already have a Group PKI? Why not think about extending it to industrial perimeters.</li>
</ul>
<ul style="text-align: justify;">
<li>It is also the right time to <strong>strengthen its OCM / SCM process.</strong> Is the solution connected with the outside? No more excuses for not <strong>installing an antivirus, updating it, installing security patches</strong> for your favourite OS, etc. This point should be anticipated prior to purchasing the solution, rather than once the product has already been installed!</li>
</ul>
<ul style="text-align: justify;">
<li>Finally the solution is critical for the business? A cyber-resilience component must be anticipated so that the solution can be quickly rebuilt and restarted in the event of an attack.</li>
</ul>
<p style="text-align: justify;">As we have just seen, there is no shortage of solutions, but they require adapted support from the cybersecurity teams and going beyond theoretical models. So<strong>, let&#8217;s take advantage of these &#8220;4.0&#8221; projects to make our industrial cyber security models evolve</strong> without a priori!</p>
<p>&nbsp;</p>
<p style="text-align: left;"><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://commons.wikimedia.org/wiki/File:Cobot.jpg">https://commons.wikimedia.org/wiki/File:Cobot.jpg</a> license CC : https://creativecommons.org/licenses/by-sa/4.0/deed.en</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/">Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
