Page 87 - Cyber Defense eMagazine July 2024
P. 87

Most attacks causing these shutdowns are ransomware, though hacktivist, supply chain and nation-state
            attacks are increasing as well. Worse, the most sophisticated ransomware groups are buying and selling
            attack tools from and to nation states – the tools and techniques  used by the two kinds of threat actors
            are becoming indistinguishable.




            OT Is Different

            A perennial problem with cybersecurity in OT is that OT is different. In most IT networks, information is
            the asset, and our imperative is to protect the information. OT networks automate physical processes  –
            often very expensive, dangerous physical processes. The cybersecurity imperative on OT networks is to
            protect  safe,  reliable  and  efficient  physical  operations,  and only  secondarily  to protect  sensitive  trade
            secrets and other information, if there is any information such in the OT network at all.

            A second  issue with  OT networks  is change  control. When  enterprise  security  teams  ask engineering
            teams to bring the entire OT network up to date with security updates, the engineering teams most often
            refuse.  Why? The clarifying  question  most engineering  teams really  should ask but  rarely do, is “How
            likely  is  that  change  to  kill  anyone?”  Engineers  need  that  question  answered  before  they  make  any
            change, and the likelihood of a safety incident is never zero. There is no way to make physical processes
            perfectly safe.

            A second question that helps clarify the problem is “How likely is that change to trip the plant and trigger
            an un-planned  shutdown of our billion-dollar  asset?” All change represents  a physical risk. Engineering
            teams are required, by their businesses, by their professional associations and often by law, to address
            material risks to physical operations.  Engineering  Change Control  (ECC) is the discipline  by which the
            risks  of  proposed  changes  are  evaluated,  tested  and  managed.  The  problem  is  that  ECC  is  very
            expensive. Change on OT networks is not impossible, but someone is going to have to allocate budget
            to charge engineering services against, especially in organizations with small or no in-house engineering
            teams.



            Cyber-Informed  Engineering

            These  threats and  the “difficult”  nature of OT / industrial  automation  networks  are  why Idaho National
            Laboratory  is working  on the new  Cyber-Informed  Engineering  (CIE)  initiative.  CIE is positioned  as “a
            coin with two sides.”

               •  One  side  is  cybersecurity  –  from  teaching  engineering  teams  about  cyber  threats  to  physical
                   operations and engineers' obligations to the business and to society to address those threats.
               •  The other side is engineering – use the powerful tools that engineers have for managing physical
                   risk – use these tools to address cyber threats as well.

            For example,  imagine  you work in a large refinery.  The refinery uses  catalytic crackers  – six story tall
            pressure vessels filled with hot hydrocarbons. Imagine you work 8 hours a day inside the kill radius of a
            worst-case cracker explosion. How would you prefer to be protected from a cyber-attack that over-heats





            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          87
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   82   83   84   85   86   87   88   89   90   91   92