Best Practice ICS Protection

March 28, 2018
In light of the attacks on U.S. industrial networks by Russian government cyber actors, as noted in U.S. CERT Alert TA18-074A, this checklist of steps will help guide you in better securing your operations.

“First of all, every company should be concerned,” said Stefan Woronka, director and head of business development at Siemens Industrial Security Services, speaking about the cybersecurity threats to industry exposed in the U.S. Computer Emergency Readiness Team (CERT) TA18-074A Alert. Pointing out that it’s not just energy sector industrial companies that need to take heed of the issues revealed in the CERT alert, Woronka says, “all industries Siemens supports face cybersecurity challenges.”

Given that the list of detection and prevention measures provided in the U.S. CERT alert is so extensive, Moreno Carullo, founder and chief technical officer at Nozomi Networks, a supplier of industrial cybersecurity technology, said it’s important for users to realize there is a key technique used to accomplish the type of monitoring recommended by CERT. That technique is hybrid threat detection. “This involves the use of signatures plus behavior-based anomaly detection to identify threats,” he said. “The results are correlated with each other and with operational context, providing rapid insight into what is happening, thereby reducing mitigation time.”

Carullo notes that YaraRules is “a signature approach” to hybrid threat detection in that it consists of “a library of advanced scripts that check for the presence of malware IOCs (indicators of compromise). YaraRules aggregates checking for multiple IOCs for malware to reduce manual threat detection work.” He adds that, because YaraRules is developed by an open community of global security researchers, the YaraRules library “innovates as fast as the collective body of knowledge.”

Whenever the government puts out a warning, Carullo says it's a good time for organizations to take note and prioritize or re-prioritize their cybersecurity defenses. With that advice in mind, here are his recommendations following the release of CERT Alert TA18-074A:

  • Set firewall policies to restrict outbound communication services. Block SMB as an allowed outbound communication protocol.
  • Ensure passwords are complex and long. Use two-factor authentication whenever possible.
  • Direct people to change passwords regularly, especially passwords related to critical systems and administrator passwords.
  • Communicate to staff the seriousness of the situation, asking everyone to be on guard for suspicious emails, activities or people at facilities.
  • Have key staff available and on standby emergency mode.
  • Review your incident response and outage plans.
  • Review all administrator accounts. Identify and disable unauthorized ones.
  • Make sure that physical defenses are high. If there are hardware keys to prevent programming of ICS systems, they should be checked to make sure they are not left in program mode.
  • Prioritize the checking of networks for anomalous behavior and Indicators of Compromise (IOCs).
  • Eradicate IOCs from networks.
  • Harden firewall rules, restricting both inbound and outbound communication between networks and segments within the industrial networks. This includes restricting outbound protocols to a minimum set, which excludes SMB.
  • Implement real-time cybersecurity and operational visibility technologies that will help provide early warning Advanced Threat Protection (APT), and allow action to be taken to eradicate infections before they cause damage.
  • Implement real-time monitoring and alert correlation to reduce the workload involved in checking for the presence of IOCs.

As a critical step in securing industrial facilities on an ongoing basis, Woronka says Siemens recommends that a company “complete a thorough analysis of their assets and then establish a holistic security concept that brings together IT and OT. The Holistic Security Concept, as we call it, helps to answer key questions for business security, including: What do I need to protect in my business? What level of security do I need? 
How do I protect specific assets?”

Woronka says the holistic security method used by Siemens integrates requirements from both IEC 62443 and ISO 27001 to provide a focus on both IT and OT requirements. (More information about this can accessed at www.siemens.com/industrialsecurity.) The initial steps to conducting this process include determining the most valuable assets within the scope of protection as well as the potential threats and impacts.

“Based on this information, a threat and risk analysis can be conducted,” he says. “This provides a good overview about which assets require a higher protection level.”

To establish a holistic security approach that includes defense-in-depth based on IEC 62443, Woronka says users should consider splitting the process into three major categories:

  • Transparency for Assessment. This involves gaining transparency into the production environment.
  • Implementing a defense-in-depth architecture with different measures. This may include firewalls for network segmentation, hardening of the endpoints, implementation of a robust patch management program, use of endpoint software such as whitelisting or antivirus, proper user and access management, and management of remote connectivity. “These measures usually are considered basic cyber hygiene,” he said. “They simply need to be there.”
  • Cybersecurity Management. The implemented system and architecture needs to be kept up to date and monitored via regular patching, maintenance of antivirus protection, installation of firewalls and so on.
About the Author

David Greenfield, editor in chief | Editor in Chief

David Greenfield joined Automation World in June 2011. Bringing a wealth of industry knowledge and media experience to his position, David’s contributions can be found in AW’s print and online editions and custom projects. Earlier in his career, David was Editorial Director of Design News at UBM Electronics, and prior to joining UBM, he was Editorial Director of Control Engineering at Reed Business Information, where he also worked on Manufacturing Business Technology as Publisher. 

Sponsored Recommendations

Why Go Beyond Traditional HMI/SCADA

Traditional HMI/SCADAs are being reinvented with today's growing dependence on mobile technology. Discover how AVEVA is implementing this software into your everyday devices to...

4 Reasons to move to a subscription model for your HMI/SCADA

Software-as-a-service (SaaS) gives you the technical and financial ability to respond to the changing market and provides efficient control across your entire enterprise—not just...

Is your HMI stuck in the stone age?

What happens when you adopt modern HMI solutions? Learn more about the future of operations control with these six modern HMI must-haves to help you turbocharge operator efficiency...

AVEVA™ System Platform: Smarter, Faster Operations for Enhanced Industrial Performance

AVEVA System Platform (formerly Wonderware) delivers a responsive, modern operations visualization framework designed to enhance performance across all devices with context-aware...