ISA Interchange

Welcome to the official blog of the International Society of Automation (ISA).

This blog covers numerous topics on industrial automation such as operations & management, continuous & batch processing, connectivity, manufacturing & machine control, and Industry 4.0.

The material and information contained on this website is for general information purposes only. ISA blog posts may be authored by ISA staff and guest authors from the automation community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

How NIST Cybersecurity Framework Improves Critical Infrastructure Protection

 

This post was authored by Steve Mustard, an industrial control system and cybersecurity consultant, and author of the ISA book Mission Critical Operations Primer.

 

In 2013 President Obama issued Executive Order 13636, titled "Improving Critical Infrastructure Cybersecurity." The executive order instructed the National Institute of Standards and Technology (NIST) to develop a voluntary cybersecurity framework that would provide a "prioritized, flexible, repeatable, performance-based, and cost-effective approach for assisting organizations responsible for critical infrastructure services to manage cybersecurity risk.

 

The definition of "critical infrastructure" in the executive order is:

"Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters"

The state of cybersecurity

Given the availability of a variety of standards for cybersecurity management, people have asked why a cybersecurity framework is required. Furthermore, many of these standards have been in existence for many years. Many people believe that the requirements of these standards are being followed, so further similar standards will not help.

There are many publicly available reports on cybersecurity attacks, and there has been a common theme:

  • Ninety seven percent were avoidable with basic or intermediate security controls.
  • Ninety two percent were discovered by a third party.
  • Twenty percent of network intrusions involved manufacturing, transportation, and utilities.
  • Seventy six percent of network intrusions exploited weak or stolen credentials.
  • So despite the availability of standards, it is clear that many organizations are not applying them to the degree required.

The Repository of Industrial Security Incidents produces an annual report that focuses specifically on industrial control systems (ICS). These reports have similar conclusions to those from Verizon. T

The statistics from Verizon cover all sectors and industry types. Within industrial automation-oriented sectors, the situation varies considerably. Many such organizations have mandatory cybersecurity standards (i.e., NERC CIP in the power industry), and their cybersecurity management programs are good. However many organizations that have a potentially high impact on critical infrastructure (e.g., water or wastewater organizations) have a much lower degree of cybersecurity management adoption.

There are many reasons for this situation, and they include:

  • lack of awareness in organizations, in particular at the top of the organization
  • misunderstanding the level of risk an organization has (e.g., "that only happens to other companies," "this has never happened before")
  • inability to quantify the risk in likelihood or impact terms, resulting in inappropriate level of investment
  • lack of adequate training in cybersecurity good practice, especially in regards to basic controls, such as good password management, backups, and malware protection

The purpose of the NIST Cybersecurity Framework is to help tackle some of these issues. The cybersecurity framework is not another standard. Instead it is a high-level concept that brings together relevant standards and sets them in an appropriate context.

The cybersecurity framework development process

Following the executive order announcement, NIST issued a request for information (RFI). It received more than 245 responses from asset owners, product vendors, and consultants from all industry sectors. NIST arranged a series of five workshops from May to November at various locations around the country. At these workshops, about 350 to 400 attendees representing asset owners, product vendors, and consultants debated various aspects of the framework. Between the workshops, NIST reworked this information into new drafts.

 

The NIST Cybersecurity Framework development process

 

The NIST Cybersecurity Framework development process

The initial meetings focused heavily on information technology systems and the protection of data and information. Many attendees were unaware of the specific issues associated with ICS or operational technology (OT) systems where protection is required:

  • loss of system availability
  • process upsets leading to compromised process functionality, inferior product quality, lost production capacity, compromised process safety, or environmental releases
  • equipment damage
  • personal injury
  • violation of legal and regulatory requirements
  • risk to public health and confidence

The Automation Federation, along with a number of asset owners with OT dependencies, raised awareness of these issues throughout the workshop process to ensure the framework properly addresses them.

What should organizations be doing?

Regardless of how well established an organization's cybersecurity management program is, it should:

  • map out existing cybersecurity processes in the organization to produce a current profile
  • review recommended industry, national, and international standards, and identify a target profile that the organization should be following
  • perform a gap analysis of the current profile against the target profile to identify actions necessary to achieve the target profile
  • review the actions and the target profile and either confirm or revise the target profile and required actions to achieve this revised profile
  • raise awareness of cybersecurity management processes and procedures throughout the organization
  • identify cybersecurity information-sharing channels within the sector and begin the process of establishing cybersecurity information sharing processes

 

 

The NIST Cybersecurity Framework in operation - a continuous process of improvement

 

 

In addition organizations should consider engaging (if not already) in the framework development process to help ensure that it remains relevant and valuable.

The Automation Federation was actively involved in the development of the cybersecurity framework, helping to ensure that a focus was maintained on OT systems and ensuring that appropriate standards, such as ISA/IEC62443 (Industrial Automation and Control Systems Security) are applied.

 

ISA offers standards-based industrial cybersecurity training, certificate programs, conformity assessment programs, and technical resources. Please visit the following ISA links for more information:

 

About the Author
Steve Mustard, author of the ISA book, Mission Critical Operations Primer, is an independent automation consultant and subject-matter expert of ISA and its umbrella association, the Automation Federation. He also is an ISA Executive Board member. Backed by nearly 30 years of software development experience, Mustard specializes in the development and management of real-time embedded equipment and automation systems, and the integration of real-time processing, decision-support and other disparate systems to improve business processes. He serves as president of National Automation, Inc. Mustard is a recognized authority on industrial cybersecurity, having developed and delivered cybersecurity management systems, procedures, training and guidance to multiple critical infrastructure organizations. He serves as the chair of the Automation Federation’s Cybersecurity Committee. Mustard is a licensed Professional Engineer, UK registered Chartered Engineer, a European registered Eur Ing, an ISA Certified Automation Professional (CAP) and a certified Global Industrial Cybersecurity Professional (GICSP). He also is a Fellow in the Institution of Engineering and Technology (IET), and a senior member of ISA.

 

Connect with Steve
LinkedInTwitterEmail

 

A version of this article also was published at InTech magazine

 


Related Posts

Ask the Automation Pros: The Use of Artificial Intelligence in Process Control

The following discussion is part of an occasional series, "Ask the Automation Pros," authored by Greg McM...
Greg McMillan Nov 12, 2024 4:30:00 PM

Protecting Electrical Terminal Blocks From Tampering

Electrical terminal blocks are a common sight in the automation world. Usually mounted on DIN rail in ind...
Anna Goncharova Nov 8, 2024 10:30:00 AM

How to Access ISA Technical Content

You Have Questions? ISA Has Answers. Serving up member-generated technical content related to standards, ...
Renee Bassett Nov 5, 2024 7:00:00 AM