SANS Institute Information Security Reading Room
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
SANS Institute Information Security Reading Room Road Map to a Secure, Smart Infrastructure ______________________________ Barbara Filkins Copyright SANS Institute 2020. Author Retains Full Rights. This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.
Road Map to a Secure, Smart Infrastructure A SANS Whitepaper Written by Barbara Filkins August 2017 Sponsored by Rapid7 ©2017 SANS™ Institute
Introduction In June 2016, New York Magazine depicted a fictional re-enactment1 of New York being brought to its knees by a group of hackers. The events—such as cars driving themselves into walls and snarling traffic, and hospital systems freezing as their ranks fill up with the injured—are based on what could actually happen at the hands of attackers. In the real world, tampering with European and U.S. election systems has already occurred, and earlier this year the WannaCry ransomware took down hospital and transportation systems in the U.S. and Europe.2 Industroyer, a recent variant of the malware that brought down the Ukraine electric grid, is an order of magnitude easier to use than previous malicious programs aimed at our infrastructures—Industroyer is almost “plug and play.”3 Malware is also getting more invasive and less visible to the end user, as evidenced by the Zusy malware, which spreads via PowerPoint slides with no clicking required.4 The ease of new malware, coupled with the fact that much of our infrastructure runs on older, legacy operating systems,5,6 has created the perfect storm of opportunity for attackers to exploit the many risks in our infrastructure system. Infrastructure is critical to the human existence, yet constraints on qualified IT and risk management resources continue to limit our ability to protect and respond to attacks on these systems. According to SANS surveys, those constraints are usually due to lack of budget, tools or skilled personnel.7 The industry sectors that comprise critical infrastructure are diverse: water/power and energy, financial systems, transportation and more. Yet, there are similarities in the threats to these various sectors, so we created a road map that addresses the needs of all industry sectors, covering the most critical infrastructure risks and protections. For example, security, dependability, safety, timeliness, availability/reliability, integrity and confidentiality all join in the list of essentials that require some measure of implementation regardless of infrastructure sector. This paper provides a multifaceted security approach for securing infrastructure systems that are being targeted by attackers and malware, keeping in mind that as technology and operational trends continue to transform in the industry, so will the security trends and issues. 1 “The Big Hack,” http://nymag.com/daily/intelligencer/2016/06/the-hack-that-could-take-down-nyc.html 2 “ A Quarter of Orgs Worldwide Victims of WannaCry or Fireball,” www.infosecurity-magazine.com/news/quarter-orgs-worldwide-wannacry/ 3 “ Malware Discovered that Could Threaten Electrical Grid,” www.usatoday.com/story/tech/news/2017/06/12/malware-discovered-could-threaten-electrical-grid/102775998/?elq_mid=3153 and “Industroyer: Biggest Threat to Industrial Control Systems Since Stuxnet,” www.welivesecurity.com/2017/06/12/industroyer-biggest-threat-industrial-control-systems-since-stuxnet/?elq_mid=3153 4 “ Zusy Malware Spreading Via PPTs, No Clicking Required,” www.infosecurity-magazine.com/news/zusy-malware-spreading-via-ppts/?elq_mid=3153 5 “ Microsoft Issues Another Emergency Windows XP Patch,” www.bankinfosecurity.in/microsoft-issues-another-emergency-windows-xp-patch-a-9995?rf=2017-06-19_ENEWS_SUB_BIS_Slot1&mkt_ tok=eyJpIjoiWTJZek5tRTJZVFl5TXpNMCIsInQiOiJLalhudTJYS3lPcHRSZERpXC9KRkxnRmprMDNwSUVYSFFlSDVKMU1iSkNSakFraDFVM0V2Ukp1U2ZcL0FYalF 6 “ Microsoft Resurrects Windows XP Patches for Second Month Straight,” www.computerworld.com/article/3200791/windows-pcs/microsoft-resurrects-windows-xp-patches-for-second-month-straight.html 7 “ Network Security Infrastructure and Best Practices: A SANS Survey,” May 2017, www.sans.org/reading-room/whitepapers/analyst/network-security-infrastructure-practices-survey-37795 SANS ANALYST PROGRAM 1 Road Map to a Secure, Smart Infrastructure
Critical Infrastructure: The Challenges of an Automated World Critical infrastructure provides the essential services and fundamental assets that underpin a nation’s society and serve as the backbone of its economy, security and health.8 Industrial Sectors Associated with Critical Infrastructure • Electricity generation, transmission and distribution • Gas production, transport and distribution • Oil and oil products production, transport and distribution Whereas a sector • Telecommunication such as agriculture • Water supply (drinking water, waste water/sewage, stemming of surface water— e.g., dikes and sluices) may not be heavily • Agriculture, food production and distribution dependent on • Heating (e.g., natural gas, fuel oil, district heating) industrial automation, • Public health (hospitals, ambulances) it relies on the sectors • Transportation systems (fuel supply, railway network, airports, harbors, inland that are, such as shipping) • Financial services (banking, clearing) telecommunications • Security services (police, military) and electricity. However, the two Supporting the Human Need worlds are converging, The industrial sectors most commonly associated with the term critical infrastructure and the road map lie at the very heart of what is fundamental to the human existence—providing a needs to address these global view, as opposed to a national view, of the challenges faced in securing their differences. infrastructure. Maslow’s hierarchy of needs, a motivational theory in psychology, states that the most basic needs are for physical survival and that these needs must be fulfilled before we are motivated to achieve the next highest level.9 A Balance Between IT and ICS Critical infrastructure is not just limited to information technology. It encompasses, to varying degrees within each sector, industrial control systems (ICS), which consist of different connected devices for different sectors. 8 Adapted from www.dhs.gov/what-critical-infrastructure 9 www.simplypsychology.org/maslow.html SANS ANALYST PROGRAM 2 Road Map to a Secure, Smart Infrastructure
Critical Infrastructure: The Challenges of an Automated World (CONTINUED) Table 1, drawn from NIST guidelines, shows some of the key differences between IT and ICS that can influence how a sector may approach infrastructure design, deployment and security/response support of its infrastructure. Table 1. Comparison of IT and ICS10 Category IT System ICS Performance Response must be consistent. Response time is critical. requirements High throughput is demanded. Modest throughput is acceptable. High delay and jitter may be High delay or jitter is not acceptable. acceptable. Response to human and other emergency Less critical emergency interaction. interaction is critical. Tightly restricted access control Access to ICS should be controlled but not can be implemented to the be stopped or interfere with human-machine degree necessary for security. interaction. Availability Responses such as rebooting are Responses such as rebooting may not be (reliability) acceptable. acceptable because of process availability requirements Availability deficiencies can requirements. often be tolerated, depending Availability may require redundant systems. on the system’s operational Outages must be planned and scheduled days requirements. or weeks in advance. High availability requires exhaustive pre- deployment testing. Risk Data confidentiality and integrity Human safety is paramount, followed by management is paramount. protection of the process. requirements Fault tolerance is less important— Fault tolerance is essential; even momentary momentary downtime is not a downtime may not be acceptable. major risk. System operation Systems are designed for use with Operating systems differ and are possibly typical operating systems. proprietary, often without security capabilities Upgrades are straightforward built in legitimate ICS. with the availability of automated Software changes must be carefully made, deployment tools. usually by software vendors because of the specialized control algorithms and perhaps modified hardware and software involved. Resource Systems are specified with enough Systems are designed to support the intended constraints resources to support the addition industrial process and may not have enough of third-party applications such as memory and computing resources to support security solutions. the addition of security capabilities. Communications Communications protocols are Communication protocols and media are standard. standard and nonstandard. IT networking practices are Networks are complex and sometimes require typical. the expertise of control engineers. Change Software changes are applied in Software changes must be thoroughly tested management a timely fashion in the presence and deployed incrementally throughout a of good security policy and system to ensure that the integrity of the procedures. The procedures are control system is maintained. ICS outages often often automated. must be planned and scheduled days or weeks in advance. ICS may use operating systems that are no longer supported. Component Lifetime is on the order of three to Lifetime is on the order of 10 to 15 years. lifetime five years. Components Components are usually local and Components can be isolated and remote, and location easy to access. require extensive physical effort to gain access to them. 10 Adapted from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf, p. 31. SANS ANALYST PROGRAM 3 Road Map to a Secure, Smart Infrastructure
Critical Infrastructure: The Challenges of an Automated World (CONTINUED) As can be seen, there are inherent differences between how IT and ICS can affect an overall operation. As an example, denial of service to an IT system may be extremely significant to a business process, whereas in ICS, the manipulation of sensors or the process is more disturbing because it could lead to the failure of safety systems designed to protect human life or induce the process to injure personnel. Profiling the Adversary What are the “habits” of an effective attack on infrastructure systems? Common methods for exploitation, attack, and hiding and embedding are generally well known and documented in the IT community. An understanding of critical infrastructure needs to be built out to include the common patterns attackers use to achieve their objectives, as DEFINATION shown in Figure 1. An attack pattern is an abstraction mechanism for describing how a type of observed attack is executed. In short, an attack pattern is a blueprint for an exploit but not a description of a specific exploit.11 An example of an attack pattern would be privilege abuse or fingerprinting. Figure 1. Attack Objectives and Attacker Methods12 11 “Introduction to Attack Patterns,” www.us-cert.gov/bsi/articles/knowledge/attack-patterns/introduction-to-attack-patterns 12 Developed from “The Industrial Control System Cyber Kill Chain,” SANS, October 2015, www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297 SANS ANALYST PROGRAM 4 Road Map to a Secure, Smart Infrastructure
Cyber Dependencies: Factors to Consider Overall, a sector will generally emphasize one leg of the confidentiality, integrity and availability (CIA) security triad13 over the other two in support of its business mission. For example, public health will emphasize confidentially over availability and integrity, while finance (banking) will emphasize availability. This emphasis must be taken into account in establishing business continuity, an important factor for critical infrastructure and the essential services it delivers. Mapping Cyber Dependencies In critical infrastructure, the state of one asset usually influences or relies upon the state of another. An asset can be considered to have a cyber dependency if its “operation depends on information transmitted via electronic or informational links.”14 Cyber dependencies can be broadly categorized as related to: • Network performance • Data use and processing • Endpoint services A cyber security strategy needs to consider all three of these dependencies as they apply to each sector. Network Performance The Purdue Enterprise Reference Architecture provides a useful way to distinguish between IT and ICS system components, and enables an understanding of how interfaces within the infrastructure might be specified and designed. Figure 2 presents six broad levels in the Purdue reference architecture, showing representative levels of speed and confidence. Figure 2. Purdue Enterprise Reference Architecture15 13 http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA 14 “Assessment of Critical Infrastructure Cyber Dependencies,” https://cip.gmu.edu/2015/10/23/assessment-of-critical-infrastructure-cyber-dependencies/ 15 www.tandfonline.com/doi/figure/10.1080/23742917.2016.1252211?scroll=top&needAccess=true SANS ANALYST PROGRAM 5 Road Map to a Secure, Smart Infrastructure
Cyber Dependencies: Factors to Consider (CONTINUED) Overall network performance needs to account for these disparate time frames with a clear understanding of how parameters such as transfer rate, latency and speed affect data flow and service quality. Data Use and Processing The actual quality of the data matters at all phases: at rest (physically stored), in motion (being transferred), and in use (under change). Compromise of the data at any step can have severe consequences, especially for control data between transmitting and receiving assets. For example, data flow can affect infrastructure system confidentiality, integrity and availability in the following ways: • Interruption—when the data does not get to the receiver, whether a data repository or control device. The interruption affects data availability. • Interception—when the data is captured between the transmitter and the receiver, such as a man-in-the-middle attack. The interception affects data confidentiality. • Modification—when the data is processed (degraded or changed) before reaching the receiver. Modification can result in false information or potentially a loss of safety. The modification affects data integrity. • Fabrication—when the data received by the receiver is not originating from the good (or approved) transmitter. Again, this can result in false information being trusted or a loss of safety. The fabrication thus affects data authenticity. Classification schemes based on established sensitivity levels are used to establish protective controls on the most available information on traditional IT systems. On the other hand, ICS-level data typically lacks appropriate identification and classification and should also be included in security and risk management to protect infrastructure devices. Endpoint Services Endpoint security and risk management services are part of the CIS Critical Security Controls, which prioritize these activities as the top three needed to achieve cyber security hygiene. A misconfigured or rogue device can severely compromise infrastructure if the proper controls are not in place. The introduction of ICS into the security program further compounds this issue due to informal procedures, lack of knowledge about legacy systems, and lack of best practices around hardening assets that were never intended to be hardened. The gradual shift from proprietary platforms to modern IT-style computers running Windows or Unix-style operating systems will better enable automated asset management, but the discipline needed make it a standard operating procedure that still needs to be built up. SANS ANALYST PROGRAM 6 Road Map to a Secure, Smart Infrastructure
Cyber Dependencies: Factors to Consider (CONTINUED) Protecting the Dependencies The cyber dependencies show us what to protect. The CIS Critical Security Controls serve as a guide for how to protect. Table 2 addresses how the controls address the phases in the kill chain model, a model that applies equally to the mix of IT and ICS in critical infrastructure. Table 2. CIS Critical Security Controls by Kill Chain Phase Kill Chain Phase CIS Critical Security Controls Reconnaissance Understand How Your Organization Appears to Outsiders, Harden Internal Resources, Decrease Attack Surfaces Inventory of Authorized and Unauthorized Devices (CSC 1) Inventory of Authorized and Unauthorized Software (CSC 2) Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations (CSC 3) Continuous Vulnerability Assessment and Remediation (CSC 4) Weaponization and Limitation and Control of Network Ports, Protocols, Services (CSC 9) Delivery Penetration Tests and Red Team Exercises (CSC 20) Identifying Attacker Presences with Physical and Technical Controls Security Skills Assessment and Appropriate Training to Fill Gaps (CSC 17) Application Software Security (CSC 18) Boundary Defense (CSC 12) Email and Web Browser Protection (CSC 7) Exploitation and Prevent, Detect and Respond to Malware Installation Continuous Vulnerability Assessment and Remediation (CSC 4) Malware Defenses ( CSC 8) Command and Control/ Detect Unauthorized Internal Activities and Lateral Movement, Reduce Exploration “Living Space” for Attackers Controlled Use of Administrative Privileges (CSC 5) Account Monitoring and Control (CSC 16) Maintenance, Monitoring, Analysis of Audit Logs (CSC 6) Secure Configuration for Devices Like Firewalls, Routers, Switches (CSC 11) Act on Objectives Detect and Disrupt Data Exfiltration and Other Actions Before Damage, Minimize Effects Data Protection (CSC 13) Controlled Access Based on Need to Know (CSC 14) Incident Response and Management (CSC 19) SANS ANALYST PROGRAM 7 Road Map to a Secure, Smart Infrastructure
Cyber Dependencies: Factors to Consider (CONTINUED) Plan and Invest But knowing what to protect and how to protect it is only part of constructing the road map. We need to address the planning, the investment and the actions that will allow us to actually follow the map toward our destination. Here are the steps: • Design and maintain a secure infrastructure that minimizes both the exposure to and the effects of an attack. • Meet the key functions of identify, protect, detect, respond and recover, as stated by the NIST Cybersecurity Framework (CFS). • Account for both operational recovery and continuity in the delivery of critical services to the population. Critical infrastructure demands planning for recovery, business continuity and contingency planning. NIST Cybersecurity Framework Key Functions • Identify. Develop the organizational understanding to manage cybersecurity risk to systems, assets, data and capabilities. • Protect. Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. • Detect. Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. • Respond. Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. • Improve. Incorporate lessons learned from current and previous detection and response activities into organizational response plans. • Recover. Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. SANS ANALYST PROGRAM 8 Road Map to a Secure, Smart Infrastructure
Keeping Things in Balance Success is slowly coming. In the wake of the 2015 cyber attack on the Ukraine electrical grid, the U.S. federal government, some states and the private sector are implementing programs that focus on information sharing and improved collaboration, to keep critical infrastructures such as the power grid safe from similar threats.16 We have emerging and improving standards for cyber security, especially as ICS embraces some of the technologies and techniques from IT. There is a growing emphasis on creating an educated cyber security workforce that, hopefully in time, will resolve some of the human resource limitations. But we have a key failure: We are still not taking enough action. We tend to focus on the breaches of information but fail to note the telltale signs that should be a call to action and help shape that strategic direction. The events that comprise WannaCry may fade into memory like so many other attacks, but the cause-and-effect pattern that got us here needs to be considered. Future malware attacks, similar to what may be possible with Industroyer, could ultimately cause our fixation on privacy breaches to pale in comparison. Aging Equipment We also need to take a retrospective view of our infrastructure. Much of the critical infrastructure is 15 to 20 years old with legacy operating systems baked into the design. Even with slowly improving technology, we must realize that legacy assets and their vulnerabilities must still be taken into consideration. Microsoft has realized it needs to do so, with a second round of releases to patch Windows XP, three years after its official end of life in 2014. So what is preventing us from adequately protecting critical infrastructure? Common threads, gleaned from multiple SANS surveys, include limited availability of skilled and experienced staff in the market, lack of management buy-in for investments in security, and the need for better automation that provides visibility into the state of cyber dependencies in the infrastructure. 16 “Cyber Threats to the U.S. Electric Grid Are Real,” http://nationalinterest.org/blog/the-buzz/cyber-threats-the-us-electric-grid-are-real-19000 SANS ANALYST PROGRAM 9 Road Map to a Secure, Smart Infrastructure
Keeping Things in Balance (CONTINUED) How do we achieve this balance between protection and resource outlay for critical infrastructure? A first step is to build out a strategic approach to the investment. “The Sliding Scale of Cyber Security,” shown in Table 3, defines five phases of investments an organization can make to contribute to its cyber security strategy. Table 3. The Sliding Scale of Cyber Security17 Investment Phase Protections Architecture Understand the infrastructure, its strengths, and its inherent vulnerabilities that lead to risk. Determine trade-offs between infrastructure design and policy/procedure in achieving cyber security objectives within schedule and budget. Evaluate the design, including business functionality and security requirements (i.e., defense in depth). Factors to consider include: • Data—information flow, protections • Application—custom, COTS, hybrid • Infrastructure—cloud, on-prem, hybrid • Network—segmentation, perimeter Passive Defense Establish and prioritize the defenses needed to defend critical assets such as the network or data. Infrastructure (network) protections, starting from outside to inside: • Policies, procedures, awareness • Physical security • Perimeter defense • Network segmentation • Asset hardening • Application hardening • Protocol and transport defense • Embedded device hardening Active Defense Establish the procedures for active defense that are based on the consumption of threat intelligence. It is comprised of four phases, with each phase continually feeding into another in order to create an ongoing process: • Network security monitoring—collecting, detecting and analyzing data from the environment • Incident response • Threat and environment manipulation (e.g., malware analysis) • Threat intelligence consumption Intelligence Closes gaps in defense through 1) collecting data, 2) converting data to information, 3) assessing information to gain knowledge, and 4) disseminating and integrating knowledge into enterprise defense practices. Offense Action taken against the attacker. May not be the best course of action for critical infrastructure sectors. How these phases map out is dependent on the organization, the phase in which it will begin its investment, and its current dependency on IT and ICS. 17 “The Sliding Scale of Cyber Security,” August 2015, www.sans.org/reading-room/whitepapers/analyst/sliding-scale-cyber-security-36240 SANS ANALYST PROGRAM 10 Road Map to a Secure, Smart Infrastructure
Keeping Things in Balance (CONTINUED) Invest Step two is taking the strategic investment phases into a set of plans that can shape a cyber security strategy. With its close alignment to basic human needs, the protection of critical infrastructure entails more than a set of properly configured technical security controls. Design Consider secure infrastructure design. A reference architecture, such as the Purdue model shown in Figure 2, provides guidance on where protections should be in the infrastructure, given an enterprisewide view of risk management. A security architect can visualize how the technical aspects of applications, network devices and endpoint systems, including IoT and sensors, are integrated within the enterprise through well- designed interfaces and well-understood information flows. We need to consider But design needs to go one step further. The process of design needs to address the an expanded bigger picture. Networks and endpoints in the enterprise are not necessarily stand-alone definition of for those sectors that are part of critical infrastructure. Understanding and modeling the infrastructure that dependency relationships among connected infrastructures, such as those presented includes people and in Figure 1, can help mitigate the devastating cascade unleashed by the hackers that process—along with brought the fictional city in the New York Magazine article to a standstill. technology—as part Maintain of the definition of Keeping up with changes is another ongoing challenge. Change management critical infrastructure. requires investment, policy and planning. Automation for asset and configuration management is crucial. Otherwise, even for smaller networks, the initial baseline quickly becomes dated, resulting in essential activities such as continuous monitoring no longer being effective and potentially abandoned. Unfortunately, many organizations do not have any handle on the current state of their assets and thus cannot confidently understand risk exposure. Some make the mistake of deferring these activities until late in the system design cycle, only to find that they have underestimated the resources needed to automate and maintain management of the approved baseline. Organizations attempting to place legacy networks under configuration management face the limitations imposed by older infrastructures whose assets may not be compatible with the use of automation to capture and maintain an asset inventory. Workflows are needed to capture both the manual and automated parts of the process. SANS ANALYST PROGRAM 11 Road Map to a Secure, Smart Infrastructure
Keeping Things in Balance (CONTINUED) Close the Gaps Threats to critical infrastructure can be fast moving. While automation is key as a force multiplier, decisions and acting on decisions remain the responsibility of the human element. Gaps in workforce awareness, technical know-how and skills to prepare, respond and defend against cyber assaults need to be resolved. A key factor to consider is communication. There are significant differences between IT systems and ICS with respect to cyber security. Failure to understand these differences can lead to conflicts between IT and ICS administrators, resulting in less-than-optimal security for the enterprise. Building trust across this potentially contentious boundary between IT and ICS experts requires fostering understanding of these differences and promoting communications to resolve and avoid conflict. Road maps need to represent a solution that is people- and process-centric as well as technology-centric. SANS ANALYST PROGRAM 12 Road Map to a Secure, Smart Infrastructure
Taking Action: Shaping the Road Map Planning should balance technology with engaging secure processes and enhancing security capacity among the human stakeholders (the workforce, including employees, contractors, managers and vendors). Therefore, the emphasis on our final road map is not so much around the technical assets that are truly the bedrock of critical infrastructure but the planning that integrates people and process into the cyber security strategy. Our proposed road map has several different planning cycles, each one resulting in artifacts to establish, maintain and expand the capability of the infrastructure. These cycles are defined in Table 4 with samples of those planning artifacts belonging in each cycle. Table 4. Critical Infrastructure Road Map Cycles and Associated Artifacts Cycle Emphasis Example Artifact Operational Operational Procedures Cyber Security Standard Operation Procedures Objective (< 12-month • P erform processes to prevent and protect as well as respond Incident Response Plan/Processes window): Maintain and recover. Continuous Monitoring Process security across daily • Maintain business continuity readiness. operations, gather Business Continuity Readiness lessons learned from Monitor and Measure Lessons Learned Review and Updates experience to inform tactical and strategic • E stablish meaningful security metrics aligned with the planning. dependency of the sector on its cyber dependencies. • M onitor these metrics frequently enough to minimize the impact of any incident. • H ave a plan of action that is rapid, efficient and effective. Tactical Communication and Engagement Cyber Security Operation Plan Short to Midrange • R esolve communication and conflict in the workforce (e.g., IT Incident Response Plan Objective (12- to and ICS admins). 24-month window): Communication and Engagement Plan • E ngage stakeholders. Communicate with executive Short-term activities management to ensure that decision makers understand the Training and Awareness Plan that shape the cyber appropriate actions regarding a possible incident and the need Cyber Security Governance Plan security strategy, to invest in protective measures to avoid or mitigate damage. including plan, Risk Management Plan policy and procedure • P lan to communicate. Coordinate response activities with Business Contingency Plan and Recovery Plan development; review; internal and appropriate external (e.g., law enforcement) and update. stakeholders. Coordinate recovery and continuity activities with internal and external parties, such as coordinating centers, ISPs, owners of attacking systems, victims, other CSIRTs and vendors. Training and Awareness • E stablish learning objectives for awareness and training programs. Governance • E stablish key policies, procedures and processes for cyber security. Note: Much of what is needed may be done elsewhere. Build the plan to identify activities, party responsibly and objectives. • M anage and monitor regulatory, legal, risk, environmental and operational requirements that inform and measure cyber security risk. • A ddress information assurance issues, specifically around data classification and protection. SANS ANALYST PROGRAM 13 Road Map to a Secure, Smart Infrastructure
Taking Action: Shaping the Road Map (CONTINUED) Cycle Emphasis Example Artifact Risk Management • E stablish organization’s priorities, constraints, risk tolerances and assumptions used to support operational risk decisions. • D evelop risk management plan that tells how to assess and manage risk as well as safeguards and controls to be established. Contingency Planning • P lan immediate recovery activities that ensure timely restoration of systems or assets affected by cybersecurity events. • A ddress maintaining business continuity, including scenario- based risk and impact assessment. Strategic Cyber Security Strategic Planning Cyber Security Strategic Plan Long-Range Objective • Incorporate lessons learned from tactical cycle to project needs Budget (24 to 36 months): for future activities. Stability and growth of • E nsure yearly planning cycle that updates strategic outlook to cyber security activities meet the event horizon of three to five years. in the long term with no event horizon Technology Review and Refresh longer than five years, • R eview current assets against evolving security requirements planning to align with and factors such as asset end of life and ability to perform enterprise strategic against evolving threats. plans and mission statement. • D etermine architectural implications—new technology or revised process? • P erform cost-benefit analysis taking into account other factors, such as required training or implementation resources. SANS ANALYST PROGRAM 14 Road Map to a Secure, Smart Infrastructure
Conclusion Different critical infrastructure industries have common cyber dependencies but will vary in terms of technical controls, especially given each sector’s varying dependence on IT and ICS as well as the core business systems that support that sector’s mission. In expanding the definition of infrastructure to process and people, however, we can identify areas where commonalities in approach have either emerged or can emerge: • Information assurance. A generic data classification schema can be defined across sectors such as below: Military IT Commercial IT ICS Unclassified Public releasable DCS/SCADA acquisition and historian data Confidential Business proprietary ICS process logic and Secret Trade secrets programming Top secret HR- and management- Control systems and sensitive plan design • Governance. Frameworks can support organizations as they actively work to encourage a culture of compliance around cyber security. Interestingly, the culture of safety in the aviation industry serves as an excellent model for a governance framework in public health. • Business continuity and disaster recovery. Most sectors follow the same steps, despite regulatory differences. • Incident handling. Most organizations embrace the six-step process that originated in the late 1990s: 1) preparation, 2) identification, 3) containment, 4) eradication, 5) recovery, and 6) lessons learned.18 • Communication planning and management. This includes techniques related to stakeholder engagement with an emphasis on communication with decision makers such as executive management or the board of directors. • Metrics and reporting. Standardizing the meaning inferred from measurements can ensure common understanding of key issues across sectors, especially for those that share common dependencies and help in the effort to share information. Timely sharing of information is a vital effort that must become more prevalent and effective across critical infrastructure sectors as our reliance on automation increases along with the threats of disruption to services our lives depend upon. The areas listed above are key to achieving this goal. 18 https://countuponsecurity.com/2012/12/21/computer-security-incident-handling-6-steps/ SANS ANALYST PROGRAM 15 Road Map to a Secure, Smart Infrastructure
About the Author Barbara Filkins, a senior SANS analyst who holds the CISSP and SANS GSEC (Gold), GCIH (Gold), GSLC (Gold), GCCC (Gold), GCPM (Silver), GLEG (Gold) and GSNA (Silver) certifications, has done extensive work in system procurement, vendor selection and vendor negotiations as a systems engineering and infrastructure design consultant. She is deeply involved with HIPAA security issues in the health and human services industry, with clients ranging from federal agencies (Department of Defense and Department of Veterans Affairs) to municipalities and commercial businesses. Barbara focuses on issues related to automation—privacy, identity theft and exposure to fraud, as well as the legal aspects of enforcing information security in today’s mobile and cloud environments. Sponsor SANS would like to thank this paper’s sponsor: SANS ANALYST PROGRAM 16 Road Map to a Secure, Smart Infrastructure
Last Updated: October 31st, 2020 Upcoming SANS Training Click here to view a list of all SANS Courses SANS Sydney 2020 Sydney, AU Nov 02, 2020 - Nov 14, 2020 Live Event SANS Secure Thailand Bangkok, TH Nov 09, 2020 - Nov 14, 2020 Live Event APAC ICS Summit & Training 2020 Singapore, SG Nov 13, 2020 - Nov 28, 2020 Live Event SANS Community CTF , Nov 19, 2020 - Nov 20, 2020 Self Paced SANS Local: Oslo November 2020 Oslo, NO Nov 23, 2020 - Nov 28, 2020 Live Event SANS OnDemand OnlineUS Anytime Self Paced SANS SelfStudy Books & MP3s OnlyUS Anytime Self Paced
You can also read