Change the Mindset
Utilities tend to view any initiative related to ICS and IT as a “project” and take a project approach to implement passive cyber defenses, such as firewalls and email filters. But when it comes to cybersecurity, a “set-it-and-forget-it” project mentality can be dangerously limiting.
Cyber threats are continually evolving and escalating and can impact every aspect of a utility. To be truly effective, cybersecurity must be based on an agile and active defense strategy that extends through every project in parallel with all business operations.
It’s time to change the mindset: Cybersecurity is an ongoing process, not a project.
Lay the Foundation
Water utilities often have a high volume of critical assets plus complicated governance, making the scope of an ICS security program seem daunting. Regardless of infrastructure size or complexity, all utilities face similar challenges, and can deploy a common, proven methodology to mitigate risk. That methodology must:
- Begin with an assessment of business needs and the specific operational requirements of the process control system.
- Identify critical assets and data that are essential to operation.
- Support asynchronous technology and business change.
- Recognize that no single product or technology will fully secure industrial networks — the most secure posture will always require people (analysts).
- Utilize a Defense-in-Depth (DiD) strategy based on multiple countermeasures that disseminate risk over an aggregate of security mitigation techniques.
Get Executive Buy-In
Identifying the right team to support and execute this methodology is critical. To be effective, this team must be endorsed at the executive level, and include expertise encompassing both the ICS and business level networks.
Ideally, this team will be charged with formalizing and executing the policies and procedures that will guide the utility on cybersecurity issues for years to come.
Set Strategic Priorities
Assessments are the starting point for any cybersecurity program. Through an assessment, a utility can determine what is “normal” from the standpoint of data entering and leaving the system. This is a crucial first step to identifying abnormalities and potential security events.
In addition, an assessment evaluates a utility’s security practice architecture and its ability to protect ICS assets.
Effective security assessments also extend beyond the technology deployed and take into account existing policies, procedures and typical behavior.
At minimum, an assessment should include:
- An inventory of authorized and unauthorized devices and software.
- Detailed observation and documentation of system performance.
- Identification of tolerance thresholds and risk/vulnerability indicators.
- Prioritization of each vulnerability, based on impact and exploitation potential.
The outcome of any assessment is a prioritized list of mitigation activities.