Page 93 - Cyber Defense eMagazine December 2022 Edition
P. 93

computers. However, in the OT world, your operations team has to be co-responsible for information
            security because they will eventually need to enable or disable features to complete their work. Install
            new software. Work with vendors. In general, experience has shown that relying on external engineers
            results in security gaps, long waiting times, and a lack of oversight and accountability.


            Here's a thought experiment we can use to frame it in terms of what we already know. Most employees
            have no medical training, and it stands to reason that it would be dangerous for them to make medical
            decisions for themselves or others. However, it is a well-established practice to train employees to provide
            CPR and a series of first-response techniques to care for others while medical professionals get on their
            way. Similarly, we have to teach a subset of the power plant employees on first-response procedures to
            keep their systems safe because we have limited resources. The same reason we don't have doctors
            sprinkled  around  the  office.  That  is  not  to  say  that  every  employee  has  the  same  level  of  access.
            Operators,  I&C  Technicians,  and  DCS  Engineers  may  all  have  different  access  levels.  And  some
            features, like access to the firewall configuration, may not be accessible to anyone at the site. You give
            access to people based on what they can protect.



            What does the Program Manager do?

            Finally, the program manager's role is to understand the big picture. Allocate capital resources to keep
            the program running. Find the right talent- which is a tremendous challenge- and communicate to them
            what the team's vision is so they can go out and do their jobs. Also, program managers will negotiate
            with vendors over time to compensate for temporary talent gaps and customize their software offering to
            reflect changing realities. Awareness of these realities leads to another very tough challenge for the
            program  manager:  to  be  realistic  about  what  the  cybersecurity  program  can  accomplish  for  the
            organization.

            That last idea is often left unexplored. As advanced as your cybersecurity program may be, a great
            manager understands that there are many moving parts that a sophisticated attacker could exploit in
            ways we can't even imagine. For example, they know that they cannot have engineers deploy patches in
            real-time. There is a lag. And end-users can be sloppy from time to time. And no one in their organization
            may have the tools or expertise necessary to block or even detect a zero-day exploit. Hence it is vital to
            enable event logging, often to an external server, and have a contingency plan. The logs will be your
            black box to help you write a post-mortem and work with vendors to understand what happened. And the
            contingency plan will help you contain a problem as soon as it is detected. Sometimes the contingency
            plan  is  as  simple  as  an  identified  uplink  cable  to  the  firewall  that  plant  operators  disconnect  in  an
            emergency to isolate the control network.



            Conclusion

            We've come a long way. Many companies are still trying to figure out the roles for their employees, and
            many are still writing exceptions because they can't keep up with patching even once a year. A few still
            believe  they  can  merge  OT  into  IT.  And  several  others  are  taking  advantage  of  the  opportunities
            presented  by  the  Biden  administration  to  improve  their  cybersecurity  programs  in  new  ways.  Some




            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         93
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   88   89   90   91   92   93   94   95   96   97   98