Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Networks

Securing the ICS: Measure solution effectiveness, maturity

  • Robert Henderson
  • December 27, 2021
Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Total
0
Shares
0
0
0
0

Many articles focused on cybersecurity stress how important it is to secure an industrial control system (ICS) and share ways to implement this security. In this article, the assumption is this advice has already been taken to secure the ICS and a plan has been implemented.

Now what? How do people determine how well a security plan has been implemented? What is the difference between a system that meets a security rule in a minimalist fashion and one that performs in a more mature manner?

To help answer these questions, the J. M. Huber Corp. began the process of building a formal corporate ICS security program in 2016. It invited MAVERICK Technologies, a Rockwell Automation Company, to join the project in 2017. MAVERICK and Huber have been working together for the last four years to develop the Industrial Control System Maturity Assessment Program (ICSMAP). The ICSMAP is a custom program derived from principles contained in the ISA/IEC 62443 series of standards. Elements of this article are based on previous publications by Drew Franklin (J. M. Huber) and the author. ICSMAP will be discussed here as one way to evaluate the effectiveness and maturity of an ICS security program.

Evaluating ICS security effectiveness

To evaluate the effectiveness of an ICS security program, facilities must start with a specific set of security controls. These controls may be the result of a thorough risk-based evaluation of the process and its vulnerabilities such as the ISA/IEC 62443 process. These controls may be a list downloaded from the internet. Whatever the source, the desired controls must be documented. In most cases, there will be a primary set of top-level controls, and a second set of sub-controls that goes into greater detail. Table 1 shows the ICSMAP controls and sub-controls around redundancy, backup and recovery.

Table 1: Redundancy, backup and recovery. Courtesy: Maverick Technologies
Table 1: Redundancy, backup and recovery. Courtesy: Maverick Technologies

Effectiveness is assessed through inspection, observation and inquiry. The assessment can be performed via a formal audit program, an informal self-assessment or something in between. Each control will receive a score varying between one and five to describe the extent to which the control was achieved. Having a scale with an odd number of values allows for a midpoint or neutral value. Having only three possible scores does not allow for enough variability and having more than five possible scores quickly reaches the point where the difference between scores becomes arbitrary. The ICSMAP also allows for a score of 0 indicating the control is not applicable. The ICSMAP sub-objective for backup methodology is shown in Table 2, along with its test procedure and possible effectiveness scores.

Once an effectiveness review is complete, there will be a score identified for each control or sub-control. Where a larger control is broken into a set of sub-controls, effectiveness should be measured and reported at the sub-control level to provide the best possible visibility into the operation of that control. The set of control scores can easily be color coded to quickly identify areas of high and low effectiveness (see Table 3).

Table 2: ICSMAP sub-objective for backup methodology. Courtesy: Maverick Technologies
Table 2: ICSMAP sub-objective for backup methodology. Courtesy: Maverick Technologies

Defining maturity

There are often many ways to implement a security control, and people need to be able to distinguish between the quality of various methods. Methods are not inherently good or bad, but variations between immature methods and mature methods can be identified.

An immature system may be labor-intensive, prone to error, difficult to analyze and depends on people rather than processes. A mature system may be automatic, resilient, self-documenting and leverages technology and processes.

A low-maturity program for backing up process controllers might be completely manual. Based on a calendar schedule, a technician carries a laptop to each controller, backs up the programs to a local hard drive, backs up the hard drive to tape and carries tapes offsite in a briefcase. This procedure has multiple single points of failure, is prone to human error, may have no action log and may miss critical changes between scheduled backups.

Table 3: Color-coded identification scores. Courtesy: Maverick Technologies
Table 3: Color-coded identification scores. Courtesy: Maverick Technologies

A high-maturity program for the same system might be completely automatic. A program monitor could continuously evaluate the state of the process controllers and trigger automatic backups whenever a change is detected. It could pull backups over the network to secure shared storage and log all its actions. The shared storage could be backed up offsite using validated commercial solutions. Each element of the systems — from networks to servers to commercial services — could be built redundant and resilient.

Evaluating maturity

One portion of the maturity evaluation process is developing the judged maturity score (JMS) for each security control area. As the maturity is more evaluative and less prescriptive, maturity scores are often developed at the control level rather than at the sub-control level. Each security control’s maturity is evaluated in five areas, which are common for all controls:

  • Documentation
  • Efficiency
  • Resiliency
  • Monitoring
  • Use of available technology.

For each of the areas, a specific list of descriptive scoring criteria is required. When developing the overall JMS for a control, the five component JMS scores are averaged to create a single JMS score. The ICSMAP has the following score descriptions in the efficiency category (see Table 4).

Table 4: Score descriptions in the efficiency category. Courtesy: Maverick Technologies
Table 4: Score descriptions in the efficiency category. Courtesy: Maverick Technologies

At some time prior to evaluating the maturity of the ICS security controls, the enterprise should conduct an exercise to determine a set of required maturity scores (RMS) for the system. This exercise is a management activity, but industrial controls professionals may be called on to assist. Management should incorporate the risk profile of the process and the risk appetite of the business into the overall decision on how mature specific systems are required to be.

For example, a control may be judged to be critical due to the potential negative effects of failure. The business unit may assign that control an RMS of five because it needs to perform at the highest level possible with current technology. A separate control may be assigned an RMS of two because older, more manual and less mature systems are considered acceptable to the business unit.

A full maturity evaluation is possible once JMS and RMS values have been identified for each control objective and the differential between the two has been determined by subtracting the RMS from the JMS. This differential will be referred to as the differential maturity score (DMS). A DMS of zero (0) indicates the JMS, representing the in-place systems, exactly matches the RMS, representing the required state. A positive DMS indicates the in-place systems are more mature than what is required by the business. A negative DMS indicates the in-place systems do not meet the requirements. The one to five range on JMS and RMS scores results in a score range of negative four to four for DMS.

Business intelligence

With the analyses complete, the effectiveness and maturity can be combined to glean business intelligence from the base data. Effectiveness and maturity are complementary, but separate, metrics designed to measure the way ICS security systems meet business needs. Effectiveness describes how well the programs are followed and implemented. Maturity describes the programs in place on an ICS. Combining the two can give actionable information about how ICS programs are performing.

Take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can make general statements about the systems under consideration (see Figure 1).

Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies

Starting at the top left, we see high effectiveness with a negative DMS. This is where capable experts might be running manual systems. Their logbooks are filed in pristine binders and have meticulous notes. There is room for investment in efficiency and automation. The top right is where a company may have over-invested on the latest and greatest. The business value of the investments is low. The installation is more mature than it needs to be. The bottom right quadrant is where there may be a false sense of security. Advanced systems have been built, but they are not being used effectively. High-maturity systems may be ignored or underused. Systems may be misunderstood because operators are not fully trained. In the bottom left is the critical quadrant and suggest immediate intervention is warranted.

A formal, repeatable process

Building an ICS security program within an organization is a major undertaking, but the job is not complete until it is built and operating. It needs to be periodically evaluated to ensure it is still performing as designed and it remains synchronized with business needs. The evaluation process needs to be formalized and repeatable. Even the evaluation process itself should be subject to review and adjusted as business and technical circumstances change. By evaluating the ICS security program’s effective and maturity, organizations can have confidence that their security programs are performing as designed, risks are appropriately mitigated and value is gained from the security investment.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Robert Henderson

Robert Henderson (Robert.henderson@mavtechglobal.com) is a principal engineer with Maverick Technologies. He has 27 years of experience in industrial control systems and currently leads the Maverick cybersecurity and network architecture teams.

Related Topics
  • CFE Content
  • Featured
Previous Article
Graph of the total volume of mitigated threats globally for the last 30 days
  • Threats & Vulnerabilities

Hackers attacked businesses more than 700 million times in last 30 days

  • Edward G.
  • December 23, 2021
Read More
Next Article
Courtesy: CFE Media
  • Strategies

Cybersecurity risk is business risk

  • Antoinette King
  • December 28, 2021
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT