<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SCADA - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/scada-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/scada-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 02 Mar 2020 17:37:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>SCADA - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/scada-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/03/saga-3-3-protection-and-security-maintenance-of-industrial-iss/</link>
		
		<dc:creator><![CDATA[Ali Fawaz]]></dc:creator>
		<pubDate>Mon, 02 Mar 2020 17:37:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[incidents]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[planning]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12738</guid>

					<description><![CDATA[<p>We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/saga-3-3-protection-and-security-maintenance-of-industrial-iss/">Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means.</em></p>
<h2>Managing risks in the long term</h2>
<h3>Equipment hardening</h3>
<p>In addition to secure architecture and administration tools, security levels for each item of equipment should be increased according to the strict necessity principle. A generic <strong>hardening</strong> guide can be created and then adapted to each of the technologies identified by the industrial IS mapping. This allows some of the vulnerabilities to be remedied at configuration and system levels.</p>
<p>Additional security can be provided by adding complementary solutions, such as:</p>
<ul>
<li><strong>Antivirus software</strong>, which will cover industrial workstations against the most common viruses, whether connected to the network or not (although the latter will require manual updates);</li>
<li>Implementing strict rules on <strong>local machine firewalls</strong>, which can be used to prevent communications, and therefore intrusions, on unused ports, and to filter the origin of flows according to the protocols used – which means attempted attacks can be more easily detected;</li>
<li><strong>Local administrator account-management solutions</strong> (for example, LAPS for Windows) finally make it possible to manage native administrator accounts on workstations in a central and individualized way.</li>
</ul>
<p>However, sometimes it may no longer be possible to harden equipment due to obsolescence. In such cases, there is a need to work with the relevant business functions <strong>on obsolescence management</strong> of the equipment – its potential replacement and, as a last resort, options to isolate it from the rest of the IS. On obsolete workstations, <strong>configuration blockers</strong> can be used to ensure the installation and use of components is limited only to those that are strictly necessary.</p>
<p>It’s important to remember that, while industrial ISs have vulnerabilities, they are, above all, part of the company&#8217;s means of production. Dialog with the relevant teams is therefore essential in understanding how equipment is used – in order to resolve the vulnerabilities while limiting effects on the business as far as possible.</p>
<h3>Security maintenance</h3>
<p>Once equipment has been brought up to the right level of security, a plan will be needed to maintain this over time. <strong>A choice of options for managing security patches</strong> can be developed to meet the needs of the business (in terms of availability, integrity, etc.) and synchronized with the maintenance of the industrial equipment through:</p>
<ol>
<li><strong>Integration into standard operating processes;</strong> for example, an installation’s qualification/quality processes may require that equipment be up to date. The updating and administering of equipment can therefore take advantage of plant shutdowns, especially where recertification is needed.</li>
</ol>
<p>&nbsp;</p>
<figure id="post-12741 media-12741" class="align-none"><img fetchpriority="high" decoding="async" class="size-full wp-image-12741 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2.png" alt="" width="1137" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2.png 1137w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-768x442.png 768w" sizes="(max-width: 1137px) 100vw, 1137px" /></figure>
<p>&nbsp;</p>
<ol start="2">
<li>Planning a <strong>“hot swap” update process</strong> in the event of a critical security breach and a procedure for the preventive isolation of production lines – until it&#8217;s possible to interrupt the production process;</li>
<li><strong>The identification of redundant</strong> or peripheral equipment where interventions can be carried out on the basis of straightforward interaction with production managers.</li>
</ol>
<p>&nbsp;</p>
<figure id="post-12759 media-12759" class="align-none"></figure>
<figure id="post-12759 media-12759" class="align-none"></figure>
<figure></figure>
<figure></figure>
<figure id="post-12767 media-12767" class="align-none"><img decoding="async" class="alignnone size-full wp-image-12767" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1.png" alt="" width="1159" height="660" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1.png 1159w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1-335x191.png 335w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1-768x437.png 768w" sizes="(max-width: 1159px) 100vw, 1159px" /></figure>
<p>&nbsp;</p>
<p>To put in place these patching processes, the mapping carried out previously must have generated <strong>a precise equipment inventory</strong>, including:</p>
<ul>
<li>The identification of the equipment: type, location, and number of units;</li>
<li>The industrial processes that each item of equipment is used for, and the associated criticality;</li>
<li>The version of the operating system and/or firmware, and the tools and configurations deployed;</li>
<li>The cybersecurity needs of supported processes;</li>
<li>The availability of redundancy, data buffering, and cold spares;</li>
<li>The required patching frequency and patching history.</li>
</ul>
<p>But maintaining security levels isn’t simply about applying patches to equipment, it should also:</p>
<ul>
<li>Define the process for updating the <strong>security solutions installed</strong> on equipment isolated from the network;</li>
<li>Install <strong>removable media cleaning solutions</strong>, given that these types of tool remain in widespread use on industrial sites. Here, the use of portable solutions allows such media to be analyzed while moving around the site;</li>
<li>Ensure the <strong>safeguarding of equipment configurations</strong> and their <strong>integration into the DRP</strong> in order to guarantee that equipment can be restarted following an incident while still meeting availability needs;</li>
<li>Set up <strong>monitoring of the industrial IAM<a href="#_ftn1" name="_ftnref1">[1]</a></strong> to ensure robust physical and logical access control. This can also be used to automate a number of time-consuming activities that are still sometimes done manually.</li>
</ul>
<p>&nbsp;</p>
<h2>Detecting cybersecurity incidents</h2>
<p>The measures set out above help reduce the likelihood of risks occurring and increase the availability of equipment, which benefits the business. Nevertheless, there will still be a need to prepare for the worst and to have in place the tools needed <strong>to detect an incident</strong> – to be able to remedy such events as quickly as possible and minimize interruption times.</p>
<h3>Putting in place detection</h3>
<p>The first step is to activate the IDPS<a href="#_ftn2" name="_ftnref2">[2]</a> functions on networked equipment to ensure that a first stage of detection, and potentially automatic blocking, is in place.</p>
<p>The next step is to collect information by deploying a concentrator on site. The network equipment and server logs can then be sent to existing or dedicated SIEMs<a href="#_ftn3" name="_ftnref3">[3]</a> where correlation and detection can take place. SOC<a href="#_ftn4" name="_ftnref4">[4]</a> and CERT<a href="#_ftn5" name="_ftnref5">[5]</a> teams can then carry out analysis and detection, and respond, if needed, to an incident, by working through standard scenarios.</p>
<p>&nbsp;</p>
<figure id="post-12769 media-12769" class="align-none"><img decoding="async" class="size-full wp-image-12769 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1.png" alt="" width="1152" height="292" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1.png 1152w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1-437x111.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1-768x195.png 768w" sizes="(max-width: 1152px) 100vw, 1152px" /></figure>
<p>&nbsp;</p>
<h3>Anticipating specific risks</h3>
<p>However, detection based on standard scenarios may offer only limited value to the business functions. Considering the entirety of sources (PC, Linux, UNIX, etc.) and setting up dedicated industrial IS probes, capable of interfacing with the SCADA systems, can enhance the detection system. Such solutions, however, can be costly.</p>
<p>The key factor is to ensure a progressive and rapid increase in the maturity and value added by the SOC. Agile methods are a good fit here and involve the iterative application of the cycle described in the text box below.</p>
<p>&nbsp;</p>
<figure id="post-12771 media-12771" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12771" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1.png" alt="" width="1149" height="553" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1.png 1149w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1-397x191.png 397w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1-768x370.png 768w" sizes="auto, (max-width: 1149px) 100vw, 1149px" /></figure>
<p>&nbsp;</p>
<h3>Planning for remedial activities</h3>
<p>Lastly, detecting an incident will only result in effective remediation if the business-function teams are involved. As with equipment updates, <strong>emergency stop procedures</strong> should be reviewed jointly with industrial IS users. A formal <strong>Incident Response Plan</strong> enables the actions for an industrial cyber-incident to be planned.</p>
<p><strong>Dedicated industrial IS crisis-management exercises</strong> should also be carried out to ensure that teams are optimally prepared and to highlight any shortcomings.</p>
<p>&nbsp;</p>
<h2>Taking a progressive and participative approach guarantees an initiative&#8217;s success</h2>
<p>The security maintenance of an industrial IS is a complicated undertaking that can only be successful if it is carried out in partnership with the business functions. A progressive and participative approach should be taken to work with them in each of the following areas:</p>
<ul>
<li><strong>Understanding the industrial IS</strong>, by mapping and prioritizing the most critical elements;</li>
<li><strong>Mitigating the risks on the industrial IS</strong>, by implementing state-of-the-art secure network architecture and defining the administration processes – due to their criticality, safety ISs must be given particular attention;</li>
<li><strong>Ensuring an adequate level of safety</strong>, by hardening and ongoing security maintenance – in particular, this will involve discussions with equipment suppliers and manufacturers;</li>
<li><strong>Putting in place the tools needed to detect security incidents</strong> – these can have a bearing on production and define the response processes.</li>
</ul>
<p>The actions above can’t always be carried out in parallel. <strong>Defining a clear roadmap</strong> will enable such actions to be prioritized. This will aid cost control and maximize the value added for the business functions.</p>
<p>Given that such significant undertakings are often driven centrally, the challenge is to engage the individual industrial sites (which may be spread across the world) to ensure security levels can be maintained in the long term. In general, we observe that companies take a two-stage approach:</p>
<ol>
<li><strong>A multiyear cybersecurity program</strong> (typically carried out over three years), with a budget of €10m-15m, aimed at:
<ul>
<li>Creating the industrial IS inventory</li>
<li>Raising the security levels of existing assets by putting in place protective measures, often involving separation and filtering, and remedying the most critical vulnerabilities – here, defining procedures is essential;</li>
<li>Putting in place an initial network of local cybersecurity coordinators;</li>
</ul>
</li>
<li>Create <strong>an industrial cybersecurity team</strong> and its <strong>associated management structures</strong> that bring together:
<ul>
<li>A framework of key activities that local players will need to manage;</li>
<li>The participative construction of the tools that will help this network of local managers carry out their cybersecurity activities;</li>
<li>The development of approaches to manage the increase in security maturity levels and change (such as maturity matrices, site-level budget-modeling tools, the definition of steering indicators, central services that the sites can draw on, etc.).</li>
</ul>
</li>
</ol>
<p>Implementing the management processes can start immediately after the program and therefore benefit from the initial network of site-level cybersecurity coordinators put in place.</p>
<p>Once constructed, it becomes a question of energizing the initiative and steering progress on the sites and industrial ISs, in terms of both security and maturity levels.</p>
<p>Doing this typically involves:</p>
<ul>
<li>A network of local cybersecurity coordinators, of size 0.5 to 2 FTEs<a href="#_ftn6" name="_ftnref6">[6]</a> per site, who are responsible for carrying out projects, implementing ongoing cybersecurity activities, continuous security improvements, and reporting;</li>
<li>A central team of 3 to 10 FTEs, to provide overall steering and support local managers – especially in terms of expertise.</li>
</ul>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> IAM i.e. <em>Identity and Access Management</em>.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> IDPS i.e. <em>Introduction Detection and Prevention Systems</em>.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> SIEM i.e. <em>Security Incident and Event Management</em>.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> SOC i.e. <em>Security Operation Center</em>.</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> CERT i.e. Computer Emergency Response Team.</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> These figures can vary significantly depending on the size and number of local sites; they are the typical arrangements we observe in the large international organizations that Wavestone supports</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/saga-3-3-protection-and-security-maintenance-of-industrial-iss/">Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Saga (2/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/02/saga-2-3-protection-and-security-maintenance-of-industrial-iss/</link>
		
		<dc:creator><![CDATA[Ali Fawaz]]></dc:creator>
		<pubDate>Thu, 20 Feb 2020 11:12:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12714</guid>

					<description><![CDATA[<p>After having discovered the premises of securing Industrial IS through the mapping of these systems and their partitioning, we will now explain their administration. &#160; Administration – the nerve center of network architecture Good administration of an IS is essential...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/saga-2-3-protection-and-security-maintenance-of-industrial-iss/">Saga (2/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>After having discovered the premises of securing Industrial IS through the mapping of these systems and their partitioning, we will now explain their administration.</em></p>
<p>&nbsp;</p>
<h2>Administration – the nerve center of network architecture</h2>
<p>Good administration of an IS is essential to guaranteeing its availability and security. <strong>When carrying out an IS security program, you must be clear about the objectives you want to achieve.</strong> The good practices we observe in the field include:</p>
<ul>
<li><strong>Creating an administration network isolated from the production network with both central and local scope </strong>whose aim is to protect administration flows and avoid integrity losses on flows used to manage sensitive operations;</li>
<li><strong>Protecting the administrative equipment </strong>to prevent an attacker from controlling these critical elements directly;</li>
<li><strong>Standardizing, as far as possible, practices and equipment</strong> to facilitate the deployment of secure, or even centralized, administration architecture, and to maintain security levels over time. This can be achieved by pooling resources within a central, dedicated team.</li>
</ul>
<p>To note: here, we are discussing only the administration of industrial IS infrastructure. Production PLCs, for example, are administered by the business functions in terms of configuration and will pass through the dedicated configuration and maintenance team, when updates are required.</p>
<p>The first step is to create the structure of the isolated and overarching administration network. This objective can be achieved by putting in place the following measures:</p>
<ul>
<li>To optimize and pool resources, and especially to assure the DRP<a href="#_ftn1" name="_ftnref1">[1]</a>, <strong>the administration network must be constructed around one or more datacenters.</strong></li>
<li>In order to reduce the risk of an attack propagating by using an infected site as a springboard, the WAN<a href="#_ftn2" name="_ftnref2">[2]</a> network placed between the datacenter and the industrial installations can be configured as a <strong>hub and spoke<a href="#_ftn3" name="_ftnref3">[3]</a></strong> network, which ensures the separation of each installation.</li>
<li>To guarantee the integrity and confidentiality of administrative flows, these must be isolated within <strong>a specific VRF<a href="#_ftn4" name="_ftnref4">[4]</a></strong> or <strong>VPN<a href="#_ftn5" name="_ftnref5">[5]</a> administration network</strong> between the datacenter and each site.  Putting in place such a dedicated administration network requires, in particular, the use of telecoms and security equipment, as well as dedicated interfaces on the servers.</li>
<li>For the most important sites, the risk of intrusion via the user LAN<a href="#_ftn6" name="_ftnref6"><strong>[6]</strong></a> can be reduced by setting up an <strong>administration LAN which is only accessible from the datacenter’s administration LAN. </strong>However, such architecture must provide <strong>a resilient solution</strong> in the event that the WAN is cut to allow sites to access it directly and also for equipment that simply cannot be maintained remotely.</li>
<li>Companies with multiple sites can also use a <strong>standardized housing</strong> that embeds all the security functions required for the site to be interconnected. This facilitates configuration and security maintenance.</li>
</ul>
<figure id="post-12721 media-12721" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12721 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-4.png" alt="" width="1741" height="567" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-4.png 1741w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-4-437x142.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-4-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-4-768x250.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-4-1536x500.png 1536w" sizes="auto, (max-width: 1741px) 100vw, 1741px" /></figure>
<figure id="post-12715 media-12715" class="align-none"></figure>
<p style="text-align: center;"><em>Diagram showing the interconnection of a site with or without a SCADA</em></p>
<p>&nbsp;</p>
<p>The second step consists of connecting the administration tools and equipment to be administered to this network, while protecting it from compromise.</p>
<figure id="post-12719 media-12719" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12719" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-1.png" alt="" width="911" height="301" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-1.png 911w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-1-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-1-768x254.png 768w" sizes="auto, (max-width: 911px) 100vw, 911px" /></figure>
<figure id="post-12717 media-12717" class="align-none"></figure>
<p>&nbsp;</p>
<figure id="post-12723 media-12723" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12723 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-2.png" alt="" width="1763" height="520" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-2.png 1763w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-2-437x129.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-2-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-2-768x227.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-2-1536x453.png 1536w" sizes="auto, (max-width: 1763px) 100vw, 1763px" /></figure>
<p style="text-align: center;"><em>Diagram showing the interconnection of a standalone site</em></p>
<p>&nbsp;</p>
<figure id="post-12725 media-12725" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12725 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-1.png" alt="" width="910" height="299" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-1.png 910w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-1-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-1-768x252.png 768w" sizes="auto, (max-width: 910px) 100vw, 910px" /></figure>
<p>&nbsp;</p>
<p>There may also <strong>be a variety of reasons to keep part of the IS fully disconnected</strong>. A disconnected IS removes the ISS risks, leaving only business risks. Disconnection also lowers the level of exposure and therefore the risk of intrusion. A risk analysis should be carried out to determine how to proceed. The associated infrastructure will need to be modified: moving from simple local administration to dedicated administration – which can be costly. These various network bricks, then, enable administrators to access the industrial equipment. However, they must also be given access to the necessary tools.</p>
<p>&nbsp;</p>
<h2>Administrator tools: how to meet needs while guaranteeing security</h2>
<p>&nbsp;</p>
<p>Because corporate and industrial ISs are generally managed separately, <strong>they each use their own tools</strong> – although these may be based on identical products.  This type of configuration meets several objectives. It:</p>
<ul>
<li><strong>Assures access control</strong> on the administration interfaces, reducing the likelihood of appropriating a means of attack and the fraudulent use of the tools;</li>
<li><strong>Tracks administrator activity</strong> to reduce the potential impact of an attack, by providing a means of detection and response, and facilitating investigation following an event.</li>
</ul>
<p>This requires the implementation of an <strong>administration chain.</strong></p>
<p>&nbsp;</p>
<figure id="post-12727 media-12727" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12727 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-2.png" alt="" width="1742" height="494" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-2.png 1742w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-2-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-2-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-2-768x218.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-2-1536x436.png 1536w" sizes="auto, (max-width: 1742px) 100vw, 1742px" /></figure>
<p style="text-align: center;"><em>Diagram showing the main functions involved in a chain of administration</em></p>
<p>&nbsp;</p>
<p>To centralize access and maintain close control of authorizations, an <strong>administration bastion</strong> must be set up. Generic accounts are handled by the bastion and protected in its digital safe. This also ensures the traceability of activity and reduces the risk of theft from generic, privileged accounts. The bastion can also secure administration flows by performing protocol translation (for example, from Telnet<a href="#_ftn8" name="_ftnref8">[8]</a> to SSH<a href="#_ftn9" name="_ftnref9">[9]</a>).</p>
<p>Equipment, especially telecom equipment, whose security levels are sufficiently mature (including detailed management of rights, traceability, individual accounts, etc.) can be directly administered without passing through a bastion.</p>
<p>&nbsp;</p>
<figure id="post-12729 media-12729" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12729 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-7.png" alt="" width="917" height="341" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-7.png 917w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-7-437x163.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-7-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-7-768x286.png 768w" sizes="auto, (max-width: 917px) 100vw, 917px" /></figure>
<p>&nbsp;</p>
<p>The establishment of a dedicated administration workstation, where the tools needed for corporate management will be housed, requires a process to be put in place for their installation. This will ensure the workstation can remain secure and that the list of tools being deployed on the IS can be documented.</p>
<p>&nbsp;</p>
<figure id="post-12731 media-12731" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12731" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-8.png" alt="" width="917" height="206" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-8.png 917w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-8-437x98.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-8-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-8-768x173.png 768w" sizes="auto, (max-width: 917px) 100vw, 917px" /></figure>
<p>&nbsp;</p>
<h2>Planning for external maintainers</h2>
<p>&nbsp;</p>
<p>Lastly, <strong>it’s essential that access by third-party maintainers is secure</strong> in order to limit the risks that arise from improper or unmanaged access, such as infection of the IS after the installation of an unauthorized tool, data loss triggered by a malicious third party, the unavailability of equipment, etc.</p>
<p><strong>An external access point with strong authentication</strong> will be needed to confirm the identity of users. Such an access point allows maintainers to access a rebound server which is controlled and hardened by the customer, while also ensuring the traceability of activity. Here, more sophisticated customers deploy solutions that allow the third-party access to the IS for the duration of the intervention only – and then only once access has been approved internally.</p>
<p>&nbsp;</p>
<figure id="post-12733 media-12733" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12733 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-9.png" alt="" width="919" height="227" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-9.png 919w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-9-437x108.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-9-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-9-768x190.png 768w" sizes="auto, (max-width: 919px) 100vw, 919px" /></figure>
<p>&nbsp;</p>
<p>The <strong>configuration and maintenance servers</strong> that are dedicated to the site and PLCs must be rigorously monitored to keep them up to date and secure, especially in terms of the tools deployed on them.</p>
<p>&nbsp;</p>
<figure id="post-12735 media-12735" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12735 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-10.png" alt="" width="915" height="262" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-10.png 915w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-10-437x125.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-10-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-10-768x220.png 768w" sizes="auto, (max-width: 915px) 100vw, 915px" /></figure>
<p>&nbsp;</p>
<p>For more detailed information, note that there is an ANSSI<a href="#_ftn11" name="_ftnref11">[11]</a>  working group dedicated to the cybersecurity of industrial systems. Its <strong>PIMSEC framework<a href="#_ftn12" name="_ftnref12">[12]</a></strong>  recommends a range of security requirements that can be incorporated into contracts with industrial IS service providers.</p>
<p>&nbsp;</p>
<p>We now have knowledge of our equipment and the solutions to secure and manage it. However, cybersecurity issues evolve over time, so it is essential to guarantee a level of security over time and to deploy adequate means of detection. How can this be done? This will be the topic of our next article!</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Disaster Recovery Plan.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> WAN i.e. Wide Area Network.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> <em>Hub and Spoke</em> i.e. A network around the datacenter.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Virtual Routing and Forwarding</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> VPN i.e. Virtual Private Network.</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> LAN i.e. Local Area Network.</p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> VLAN i.e. Virtual Local Area Network</p>
<p><a href="#_ftnref8" name="_ftn8">[8]</a> Telnet i.e. Terminal Network, Telecommunication Network, or Teletype Network.</p>
<p><a href="#_ftnref9" name="_ftn9">[9]</a> SSH i.e. Secure Shell</p>
<p><a href="#_ftnref10" name="_ftn10">[10]</a> RDP i.e. Remote Desktop Protocol</p>
<p><a href="#_ftnref11" name="_ftn11">[11]</a> ANSSI i.e. The French National Cybersecurity Agency.</p>
<p><a href="#_ftnref12" name="_ftn12">[12]</a> PIMSEC i.e. ANSSI’s framework for security requirements for industrial systems integrators and maintenance providers.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/saga-2-3-protection-and-security-maintenance-of-industrial-iss/">Saga (2/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Saga (1/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/02/saga-1-3-protection-and-security-maintenance-of-industrial-iss/</link>
		
		<dc:creator><![CDATA[Ali Fawaz]]></dc:creator>
		<pubDate>Mon, 10 Feb 2020 13:24:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12656</guid>

					<description><![CDATA[<p>For several years now, we’ve been supporting the far-reaching changes affecting industrial information systems which are being increasingly forced to open up to the broader market and corporate IS technologies. As levels of exposure and threats increase, carrying out security...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/saga-1-3-protection-and-security-maintenance-of-industrial-iss/">Saga (1/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>For several years now, we’ve been supporting the far-reaching changes affecting industrial information systems which are being increasingly forced to open up to the broader market and corporate IS technologies. As levels of exposure and threats increase, carrying out security maintenance, in coordination with a company’s business functions, is becoming critical. What can we learn from experience in the field and what are the good practices for the protection and security maintenance of industrial ISS?</em></p>
<p>&nbsp;</p>
<h2>Opening things up to corporate ISS is now a necessity… but it also carries risks</h2>
<p><strong>Historically, industrial ISs were not connected to corporate ISs, </strong>either because there was no need or as a way of limiting the risk of exposure. The majority of interventions were local, with work taking place directly on equipment, or remotely, using specific methods. The management of this work and the operations themselves were mostly local too.</p>
<p>Business functions’ changing needs and the optimization of production processes have brought with them new and less localized requirements (such as remote supervision, remote maintenance, the emergence of the IoT1, the standardization and rationalization of technologies and skills, cyber threats, etc.), which are designed to improve performance and facilitate operations. These challenges have led to a need to digitalize and interconnect industrial and corporate ISs.</p>
<p>Although this is now essential for a company’s business functions to operate effectively, our discussions with operational staff highlight the fact that such changes have also led to <strong>risks of intrusion and the propagation of threats between these interconnected ISs. These affect:</strong></p>
<ul>
<li><strong>Operations and quality</strong> – with potential shutdowns and modifications to production lines resulting in financial, reputational, and even people impacts;</li>
<li><strong>The security of facilities</strong>, where production equipment being seriously compromised can have impacts on both people and the environment.</li>
</ul>
<p><strong>Mitigating these intrusion and propagation risks </strong>and their consequences means implementing security measures in several different stages:</p>
<ul>
<li>Industrial IS mapping;</li>
<li>Putting in place secure network architecture;</li>
<li>The hardening and security maintenance of the various systems over time;</li>
<li>And, lastly, putting in place the measures to detect incidents and respond to them.</li>
</ul>
<p>Regulatory authorities have also been considering these risks. For the most sensitive installations, they are now mandating these types of measures and others too.</p>
<p>Interventions (such as patch management, account audits, integrity control, etc.), sometimes done remotely and often frequently, may now need to be carried out by teams more distant from site operations. These quickly come up against a traditional operating model designed to prioritize the continuity and integrity of operations, quality, hygiene and safety – while minimizing disruptions to production.</p>
<p><strong>How can these measures be implemented </strong>without losing sight of the industrial IS&#8217;s core purpose – to operate a physical process in the way designed?</p>
<p>&nbsp;</p>
<h2>Mapping, a prerequisite for dealing with cybersecurity risks on industrial ISS</h2>
<p>To assess the risks and control the potential impacts of implementing any new measures, the first step is the <strong>IS mapping</strong> of your industrial installations, which enables you to:</p>
<ul>
<li>Know the systems that need to be administered and kept up to date;</li>
<li>Identify the users (operators, maintainers, etc.), and therefore those who need to be involved when a change takes place, to manage the operational impacts;</li>
<li>Evaluate the potential impacts of new vulnerabilities and security breaches in terms of safety, operations, and quality.</li>
</ul>
<figure id="post-12668 media-12668" class="align-none">
<figure id="post-12679 media-12679" class="align-none">
<figure id="post-12686 media-12686" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12686 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-3.png" alt="" width="915" height="525" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-3.png 915w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-3-333x191.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-2-3-768x441.png 768w" sizes="auto, (max-width: 915px) 100vw, 915px" /></figure>
</figure>
</figure>
<p>Once the mapping process is underway, you will also need to develop formal <strong>procedures for updating the map.</strong> This means defining the update frequency, according to the level of criticality, and then actively managing the risks.</p>
<p>This is a substantial piece of work requiring <strong>dialog and close collaboration with automation and other engineers involved with the installation.</strong></p>
<figure id="post-12671 media-12671" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12671 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-1.png" alt="" width="911" height="404" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-1.png 911w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-1-431x191.png 431w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-1-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-3-1-768x341.png 768w" sizes="auto, (max-width: 911px) 100vw, 911px" /></figure>
<p>&nbsp;</p>
<h2>Mitigating risks on an industrial IS by putting in place security architecture</h2>
<p>Security isn’t a new concept and it makes sense to follow the established principles for corporate IS architecture and security – adapting them to the particularities of industrial ISs:</p>
<ul>
<li>Reducing the risks of propagation and intrusion by clearly <strong>partitioning</strong> the industrial IS and restricting access to it;</li>
<li>Securing the administration of the IS by putting in place <strong>dedicated administration architecture</strong>;</li>
<li>Equipping administrators with <strong>appropriate tools</strong> that enable them to make interventions across the entirety of the industrial assets;</li>
<li>Integrating from the start (as far as possible) <strong>interventions made by external maintainers</strong>.</li>
</ul>
<p><strong>These four principles form the cornerstones of securing industrial IS architecture.</strong></p>
<h3>Partitioning, the first step in reducing exposure</h3>
<p>Corporate and industrial ISs have essentially different goals: one is designed to facilitate the operation of a business (by providing messaging, management systems, collaborative tools, etc.), while the other is used to operate physical processes. In theory, these should be separated, and only certain types of information should be allowed to flow between them. However, feedback from the field tells us that this is rarely the case.</p>
<p>As in any work on IS security, <strong>the strict necessity principle should be adopted</strong> to limit exposure to cyber threats. Any interconnection between an industrial and corporate IS should serve a specific purpose; for example:</p>
<ul>
<li>Sending production orders to SCADA<a href="#_ftn1" name="_ftnref1">[1]</a>;</li>
<li>Transferring CAM<a href="#_ftn2" name="_ftnref2">[2]</a> files to digitally controlled machines;</li>
<li>Collecting production data to enable the control of operations.</li>
</ul>
<figure id="post-12673 media-12673" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12673 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-1.png" alt="" width="928" height="322" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-1.png 928w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-1-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-4-1-768x266.png 768w" sizes="auto, (max-width: 928px) 100vw, 928px" /></figure>
<p><strong>An industrial IS must also be internally partitioned</strong> to reduce the risk of threat propagation. To do this, you can use the principle of zones and conduits described in the IEC 62443 standard.</p>
<p>In practice, this <strong>partitioning has to be carried out in several steps:</strong></p>
<ul>
<li>The listing of relevant business activities according to their different levels of sensitivity;</li>
<li>Grouping activities requiring the same security level into zones (with, potentially, a ”legacy” zone and associated sub-zones);</li>
<li>Putting in place security rules for each zone according to their needs, as described in standard IEC 62443;</li>
<li>Checking that the interconnections (conduits) between the different zones comply with security rules;</li>
<li>Migrating the applications. Ensuring applications are compliant can be a long and difficult task, and it&#8217;s best to use a risk analysis to prioritize and manage the work, as well as documenting the nonconformities and associated remediation plans. In addition, the migration process itself may be complex, if you are to avoid an impact on operations.</li>
</ul>
<figure id="post-12675 media-12675" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12675 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5.png" alt="" width="909" height="366" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5.png 909w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-5-768x309.png 768w" sizes="auto, (max-width: 909px) 100vw, 909px" /></figure>
<h3></h3>
<h3>The particularity of safety ISS</h3>
<p>Safety ISs are industrial ISs that enable industrial production systems to be put into a safe state. Before the advent of today’s digital systems, such systems had long been used in mechanical, pneumatic, and electrical forms. The particular importance of ensuring their integrity is therefore well understood. A final partitioning step can be considered to achieve this. However, field observations often tell us that existing arrangements act as a brake that complicates the work. When done rigorously, such separation reduces the risks of propagation and enables distinct levels of security to be implemented for the production IS and safety IS according to their risk levels. However, a disadvantage is that doing this requires a dedicated SCADA system, which is both expensive and not operationally friendly.</p>
<figure id="post-12677 media-12677" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12677 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6.png" alt="" width="921" height="375" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6.png 921w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-6-768x313.png 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></figure>
<p>&nbsp;</p>
<figure id="post-12663 media-12663" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12663 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-1.png" alt="" width="769" height="628" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-1.png 769w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-1-234x191.png 234w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-1-48x39.png 48w" sizes="auto, (max-width: 769px) 100vw, 769px" /></figure>
<p style="text-align: center;">Diagram of Industrial IS / Safety IS partitioning scheme</p>
<p>&nbsp;</p>
<p>After having launched this process of identifying and partitioning industrial IS, it is time to deal with their administration. How to reconcile security, operational gain and availability of the production tool? We will tell you about it very soon.</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> SCADA i.e. Supervisory Control And Data Acquisition system</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> CAM i.e. Computer Aided Manufacturing</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> DMZ i.e. Demilitarized Zone.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/saga-1-3-protection-and-security-maintenance-of-industrial-iss/">Saga (1/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
