Challenges of Mitigating Vulnerabilities in Digital Substations
Industrial Control Systems (ICS) in the electric power sector, particularly those utilizing the IEC 61850 standard for fully digital substations, face unique challenges in mitigating vulnerabilities. In ideal situations, asset owners will have a program in place that provides timely information about ICS vulnerabilities. With the introduction of SOCI ACT Enhanced Cyber Security Obligation and maturing their Cyber Security Program to achieve AESCSF SP-3, electric utilities across the country have implemented OT Network Security Monitoring systems to improve asset visibility, vulnerability and patch management, and capabilities for near real-time threat picture. Which is great effort to improve their OT Cyber Security posture and operations and enhance their incidence response and recovery capabilities. However, even with accurate vulnerability information, verifying the applicability of the vulnerability to an ICS can be difficult. Mitigating these vulnerabilities can even more complex to due to the following challenges:
The "Principles of operational technology cyber security | Cyber.gov.au" published by ASD acknowledges above challenges and highlights the need for a cyber security operation for continuous monitoring and robust patch management strategies with a team composed of protection, control, automation, networking, R&D, and cyber security engineers with deep and intricate knowledge of the power systems and its components. I would like to list three (3) of the key principles below:
Principle 1: Safety is paramount – Ensure the system is safe!
Safety is critical in physical environments. This includes safety of human life, safety of plant, equipment and the environment, and reliability and uptime of the process. Cyber security controls must be safe, and safety must be informed by the cyber threat environment.
The principle of “safety is paramount” implies the following incident response questions are significant:
Safety of human life, safety of the plant equipment, safety of the environment, and the need to maintain reliability and uptime, are necessary systemic ways of thinking that need to permeate all tasks, even essential and common cyber hygiene tasks potentially considered unrelated, such as:
Principle 2: Knowledge of the business is crucial – Know and defend vital systems.
The more knowledge a business has about itself, the better that business can protect against, prepare for and respond to a cyber incident. The higher in the organisation there is an understanding, visibility and reporting of cyber risks, especially to OT systems, the better the outcome.
All critical infrastructure organisations should ensure they meet the following baselines:
Examples and implications
A commonly agreed upon imperative of cyber security is to know what needs to be protected. The first part of this is to understand which elements of the business are essential for the organisation to be able to provide its critical services. The second part is to understand the systems and processes being protected. This may include (but is not limited to): systems engineering drawings, asset lists, network diagrams, knowing who can connect to what and from where, recovery procedures, software vendors, services and equipment, and, to the extent possible, software bills of material and the desired configuration state.
Knowing what parts of the business are essential to be able to provide a critical service requires both top-down and bottom-up thinking. Top-down thinking has historically led many organisations to seek to separate OT from IT. Bottom-up thinking provides an opportunity for an organisation to go further and discover the minimal set of OT equipment required for a critical function. For example, to be able to generate electricity, depending on the generator, it may be that the minimum requirement is the generator, a controller in a control panel, and a suitable fuel supply. For critical infrastructure entities, understanding what is needed to protect the absolute core functions - keeping the water flowing and the lights on - should then guide the effective layering of cyber security controls. This has implications for architecture, protection, detection, and backup of devices and files.
It is essential that OT-specific incident response plans and playbooks are integrated into the organisation’s other emergency and crisis management plans, business continuity plans, playbooks and mandatory cyber incident reporting requirements. The involvement of a process engineer is important, both when creating plans and playbooks and during any investigation, containment or recovery processes. There is also a need to provide an information pack to third parties before or when they are engaged, to quickly bring them up to speed. This third-party pack should include the likes of points of contact, naming conventions for servers, data sources, deployed tools, and what tools are acceptable to be deployed. All plans, playbooks, and third-party packs must be regularly exercised, updated by all relevant parties including legal, and protected due to their value to the adversaries.
Physical aspects that aid staff to have knowledge of the OT system should also be considered. This may include colour coding cables, putting coloured banding on existing cables, or marking devices allowed in the OT environment in a highly visible way. Only authorised devices should be connected to the OT environment, to help ensure that only authorised code can be introduced to OT environments. Overt visual cues allow an organisation to better protect their environment by identifying unauthorised devices, and allow an organisation to quickly make correct decisions in response to cyber or intelligence-based events. Such markings would need to be periodically assessed and verified to ensure accuracy and currency.
Understanding the business context of the OT system is essential for assessing the impact and criticality of OT outages and cyber security compromises. It is also vital to determining recovery priorities during a critical incident. For organisations reliant on OT to be able to provide a critical service, an integrated OT cyber security function is a necessary part of the business. OT cyber security personnel are not expected to have the deep understanding of a physical system that an electrical, chemical, or process engineer may have, but they should have a working knowledge of plant operation and most importantly, maintain working relationships with those in the organisation responsible for the physical plant. Such relationships are critical both to the success of any cyber enhancement project as well as when there is a need to respond to a cyber event.
Principle 6: People are essential for OT cyber security
A cyber-related incident cannot be prevented or identified in OT without people that possess the necessary tools and training creating defences and looking for incidents. Once a cyber-related incident has been identified in OT, trained and competent people are required to respond.
A strong safety-based cyber security culture is critical to the on-going cyber resiliency of OT systems. There is a need for each organisation to reframe the requirements from these principles as workplace safety requirements, as opposed to cyber security requirements.
领英推荐
Staff, particularly field technicians and all other members of operating staff, are often the front line of defence and detection for an organisation.
Examples and implications
A mix of people with different backgrounds, with various skills, knowledge, experience and security cultures, is necessary to support effective OT cyber security practices. This includes members from infrastructure and cyber security teams (commonly found in IT), as well as control system engineers, field operations staff, and asset managers (commonly found in OT).
Developing a cohesive OT cyber security culture requires general alignment on the principles of OT throughout the organisation. Consider that there will be a different set of inherent values and priorities carried by members of different backgrounds. For example, the first principle of OT cyber security, “Safety is paramount”, often requires a fundamental shift in thinking for people that have non-engineering or non-critical infrastructure backgrounds. Team members with non-engineering backgrounds gaining an understanding of OT challenges is important for the team to work cohesively in OT.
In most critical infrastructure OT sites, from electricity generation to water treatment facilities, staff are the front line of defence. They almost certainly will not be OT cyber security experts, nor people who work in corporate IT. Field operations staff rarely receive formal information technology or cyber security training and certification. Often, experience with the IT components of an Industrial Control System (ICS) will have been developed on-the-job, out of necessity due to the growing dependency of site operations on ICT infrastructure and IP-based communication.
As such, significant focus is required to develop cyber security awareness as a core component of field safety culture, so that operators feel confident and empowered to raise potential cyber concerns, without fear of ridicule or judgement. Further, there needs to be a process put in place where cyber-safety related observations can be raised quickly, with a culture of knowing that observations will be appreciated.
Potential strategies to develop security awareness and a cyber-safe culture amongst staff include:
Real-World Incidents
These incidents illustrate the critical need for robust patch management and thorough testing in ICS environments.
Best Practices for ICS Patch Management
Importance of Testing and Setting Up a Test Environment
Testing is crucial for ensuring that patches and updates do not introduce new vulnerabilities or disrupt operations. Here’s how to set up an effective test environment:
A well-setup test environment helps in thoroughly testing patches and updates, ensuring they do not introduce new vulnerabilities or disrupt operations. It also plays a crucial role in cybersecurity testing, allowing for vulnerability assessments, penetration testing, and incident response drills in a controlled setting.
Collaborating with Vendors: The SEL Advantage
Collaborating with vendors such as Schweitzer Engineering Laboratories (SEL) can be a highly effective strategy to overcome the challenges of mitigating vulnerabilities in ICS environments. Here’s why partnering with SEL could be the best choice:
By partnering with SEL, organizations can leverage these advantages to enhance their ICS security and reliability, ensuring that vulnerabilities are effectively mitigated without compromising system performance and safety.