Cybersecurity Lessons From Critical Infrastructure
Though itâs been almost two years, the cyber attack on the Ukrainian power grid in December 2015 still reverberates through the power plant community. The attackers took out a quarter of a million homes in the dead of winter, rendering them dark and cold just two days before Christmas. Operators were locked out of their own control systems, helpless to react as they watched the attack unfold on their screens, one system after another coming down. Attackers struck again using different methods a year later.
In response, operators and their vendors here in the U.S. and around the world wasted no time trying to secure their own plants. These actions and the best practices they are employing can also help manufactures in non-critical industries meet the growing threat from cyber attacks against increasingly connected systems.
Siemens, for example, has built a portfolio of operational technology (OT) network infrastructure for its own use, and is now rolling it out to its customers. âWe call it First Line of Defense,â says Leo Simonovich, director of global cyber strategy at Siemens. These systems have OT security built in that follows the best practices outlined by others in the industry, including the North American Electric Reliability Corp. (NERC).
Attacks on the rise
The Ukrainian power grid is just one example of the rising number of critical facilities and industrial networks coming under attack across a wide range of industries. Many of these attacks are not specifically targeted at industrial networks, explains Galina Antova, CEO of OT security supplier Claroty. âThe industrial networks have been affected by some of the ransomware attacks out there. They were not necessarily targeting the industrial networks, but ended up impacting the industrial networks nonetheless.â
WannaCry, a particularly virulent strain of ransomwareâsoftware that encrypts victimsâ networks and holds them for ransomâcaused widespread harm when it struck in May. Older networksâmany of which are industrial networksâare particularly vulnerable to attack. Chocolate maker Mondelez International was one of several manufacturers reporting revenue lost to ransomware in 2017.
Part of what has made these attacks so effective is that cyber criminals now have access to more sophisticated tools than ever before, Antova says. âIt's the first time in history that non-nation-state actors have access to nation-state capabilities,â she says. Following an August 2016 attack on the U.S. National Security Agency (NSA), hackers have distributed tools developed by the spy agency through the digital underground. âNow you've got the ultimate weapon; you've got a nation-state weapon.â
OT, controlling the machines running manufacturing processes, could be particularly vulnerable to cyber attacks. It is the new risk frontier, Simonovich says. âWe've seen that those attacks are having big impacts on performance of plants with some pretty scary outcomes.â
Two factors combine to increase risk to OT, Simonovich says. To begin with, many industrial processes lack the readiness that is often more common in the business IT world. âThings like patching, configuration managementâthe basics, the hygiene,â he says. âThe speed and the sophistication of the attacker has also increased.â
Itâs no wonder, then, that a recent survey about cybersecurity in the oil and gas industry conducted by the Ponemon Institute and funded by Siemens found that 68 percent of respondents believe their organizations have been compromised by at least one cyber attack.
Fortunately, best practices can go a long way toward mitigating the risk.
Cybersecurity best practices
Cybersecurity for OT has to start at the topâsomeone in a senior leadership position has to be responsible for cybersecurity, Antova says. The most logical person for the job, she says, is the chief security officer that many organizations already have in place. Typically, an organization will have such a person dedicated to business IT security. âThe most effective way is to expand the accountability and responsibility of that person to now also have oversight of the industrial manufacturing networks as well,â she says. Such expansion of duties is only recently being made, according to Antova, but itâs a necessary step.
As Saadi Kermani, business development manager for Wonderware at Schneider Electric, puts it, âIf itâs no oneâs job, itâs everyoneâs problem.â
That includes the business side of any organization, according to Donovan Tindill, senior security consultant at Honeywell Process Solutions. âSecurity is synonymous with reliability, and those who prioritize cybersecurity will have a competitive advantage,â he says. In other words, bad security is bad for business.
After making sure that proper responsibility and oversight is assigned for OT security, the next step is to go after what Simonovich calls the low hanging fruit of cybersecurity: making sure that industrial control systems are properly patched with the latest software fixes from their vendors. As he points out, one reason the WannaCry ransomware attack was so devastating was because many of the affected organizations were using old systems without the latest patches. âThey were not updating and patching as often as they should,â he says of the victims. âAnd that vulnerability was left wide openâwell documented, well fixed, but ignored.â
Source: Emersonâ
As for installing patches, OT systems present special challenges because they cannot be shut down suddenly without negatively impacting the processes theyâre running. âThere are a handful of critical devices that probably can't be patched without some downtime,â says Jaime Foose, head of the lifecycle support and security solutions organization for Emerson Automation Solutionsâ power and water business.
The solution to patching these critical systems is to plan carefully. âYou look to do that in an outage window,â Foose says. âYou take a short outage, do it in the middle of the night, or a time where it's least disruptive to the process.â With proper preparation, she says, systems can be patched and rebooted in a controlled manner that doesnât interfere unduly with the processes they control.
In addition to patching, basic security steps normally undertaken in the business IT world can also help secure industrial systems. Implementing user account controls, installing malware protectionâincluding antivirus software and whitelisting-approved access points to prevent unauthorized accessâare all among the measures Emerson recommends. âThose very basic things that are common on our home computers and on our work computers are things that in an industrial control environment are sometimes not adopted,â Foose explains.
In all, Foose breaks down best practices for OT cybersecurity into four broad categories:
- Analyze your system to map out what is on your networks and where it resides. This will help you plan defenses and plug gaps in security.
- Deploy defenses, including closing open ports and services that arenât needed, installing patches, installing malware protection and making sure backups are in place and regularly updated in case all else fails.
- Monitor your systems for unusual activity and intrusions. Managing alarms and keeping track of them is vital for this to work.
- Incidence response is the final piece of the puzzle, ensuring that plans are in place for use when something does go wrongâwhich may include natural disasters and other incidents, not just cyber attacks.
Many of these ideas are relatively easy to follow, Foose says, and they are also codified in cybersecurity standards put out by authoritative sources such as the National Institute of Standards and Technology (NIST). NISTâs Cybersecurity for Internet of Things (IoT) guidance and its Guide to Industrial Control Systems (ICS) Security point the way to more secure systems, Kermani adds.
Lessons from NERC
Of special interest to critical infrastructure is NERCâs critical infrastructure protection (NERC CIP) standards.
If thereâs one organization in North America that is especially well equipped to guard against outages cause by cyber attacks and everything else, itâs NERC, which has 50 years of experience keeping the North American electric grid online. NERCâs chief security officer, Marcus Sachs, is unequivocal in his insistence that critical OT systems should remain isolated. âOur standards make that real clear,â he says. âAutomate all that you want, but thou shalt not let thy automation touch the Internet.â Though NERC standards donât dictate how systems should be built, he says, âWe don't want there to be a connection to the Internet. That's the standard.â
Sachs isnât against connectivity within an OT environment, whether itâs at a plant or remotely to engineers monitoring itâjust against linking it up willy nilly to the outside world. âIf you cross-connect the system with the wide open, public, unregulated, wild, wild West that we call the Internet, you run into problems,â he says.
After securing access to the broader Internet, Sachs says best practices call for doing away with a monoculture of connectivity. In other words, if every plant is engineered too similarly to others, it gives hackers the means to replicate their efforts, allowing them to leverage hacks on one installation to gain access to another. âGet the systems diverse so that if there's failure, it only fails one, maybe two places, but it can't cascade,â Sachs advises. âIt can't replicate. It can't go to other systems because they're different.â Fortunately, he says, the electric grid here in North America is in good shape in this regard.
Finally, Sachs says, itâs important to recognize that cyber attacks are launched by peopleâpeople using cyber tools to do their dirty work, but people nevertheless. At the same time, cybersecurity is also managed by people whose tools are important, but who must remain aware of the dangers and how to counteract them. âIt's not devices fighting devices,â he emphasizes. âIt's people fighting people.â
It was apparently a well-funded, well-trained group of cyber criminals who were likely to have been working for the Russian government who took down large portions of the power grid in the Ukraine in 2015 and again in 2016, according to analysis in Wired magazine. In the first attack, hackers were able to gain access to systems controlling circuit breakers because logging into them did not use two-factor authentication. This provided the security hole for the attackers to log in with hijacked credentials that did not have to be verified by other means.
Though the Ukrainian power plants were back online in a matter of hours after the first attack, and within an hour following the second, a clear shot had been fired across the bow of the worldâs industries. The takeaway lesson is that cybersecurity for OT cannot be taken for granted.
Companies in this Article

Leaders relevant to this article: