Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

Will CISA recommend securing industrial control systems?

  • Dale Peterson
  • May 25, 2022
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

The Cybersecurity and Infrastructure Security Agency (CISA) has always made recommendations along the lines of keeping the attackers out, performing cyber hygiene and detecting attacks, but they have rarely recommended the monitoring and controlling of the physical process be secured.

The best example of this is the recent INCONTROLLER/PIPEDREAM malware and CISA’s related Alert (AA22-103A) APT Cyber Tools Targeting ICS/SCADA Devices:

“The tools enable them to scan for, compromise and control affected devices once they have established initial access to the operational technology (OT) network.”

This is because the programmable logic controllers (PLCs), controllers and other Level 1 devices, as well as the industrial control system (ICS) protocols, are insecure by design. Access to operational technology (OT) equals compromise with the limitation being the attacker’s engineering and automation skills, and input/output (I/O) and physical process implementation, not an adversary’s security or hacking skills. 

This has been known for more than 20 years and was vividly demonstrated 10 years ago in Project Basecamp. The community and society have been lucky that we haven’t often seen this intentional and continuing design decision exploited by an extensible attack platform.

What has been missing for 20 years is the entity with the biggest megaphone, the U.S. government — now in the form of CISA — saying that we need basic source and data authentication and authorization in Level 1 devices and ICS protocols. The CISA alert fails to say this. Instead, they suggest some useful, and some less useful, cyber hygiene tasks to 1) reduce the likelihood of an attacker getting that initial access into the OT environment, and 2) increase the chances of the attack being detected after compromise.

The alert never addresses the core weakness that the attacker’s ICS target is lacking the most basic security controls. You don’t need to hack it. Just send it legitimate, documented commands. “Read the manual” is PLC and process hacking.

The missing bullet in the CISA alert’s mitigations is:

  • Develop and deploy a strategy to upgrade to secure ICS protocols and upgrade insecure legacy PLCs, controllers and other Level 1 devices.

One could be sympathetic that perhaps a strategy that may take 1-3 years of focused attention is actionable enough to be included in an alert mitigation; that alert recommendations should focus on immediate actions. If this is the case, we should see this fundamental security problem prominently addressed in other CISA and U.S. government documents. Let’s look.

CISA Critical Infrastructure Control Systems Cybersecurity Performance Goals and Objectives

Yes, it is mentioned in this document. Given this is the preeminent document according to CISA Director Jen Easterly, this is a positive sign. It’s addressed in the System and Data Integrity, Availability and Confidentiality section with this bulleted text:

“Ensure that data in transit is protected against unauthorized access or manipulation.”

“Sample Evidence of Implementation: Organization requires all control system data transmissions employ end-to-end encryption using transport layer security (TLS) to protect data in transit; legacy equipment that is unable to leverage encryption is prioritized for upgrade or replacement.”

This is the first time I’ve seen the U.S. government recommend that asset owners upgrade or replace Level 1 to get past insecure by design. Now, it is one of many objectives and buried a bit deep. And there is serious debate on whether wrap-it-in-TLS is really the best way to meet the integrity, rather than confidentiality, needs in ICS. Whether it is wise or not, Modbus Secure, CIP Secure and other ICS protocol efforts show that the wrap-it-in-TLS approach is carrying the day.

An opportunity was missed with INCONTROLLER/PIPEDREAM to highlight “legacy equipment that is unable to leverage encryption is prioritized for upgrade or replacement.” It would have been great to hear on “60 Minutes” that every CEO with a control system should be asking their CISO or VP of operations about their plan to upgrade ICS components that lack basic security. 

Without CISA highlighting and pushing this issue, that we actually have to secure the ICS, then this will be an easy goal to set aside. It has been for two decades already, even though it makes many of the other security goals inside the OT network of little value. To use CISA’s own words, “The tools enable them to scan for, compromise and control affected devices once they have established initial access to the operational technology (OT) network.”

CISA Securing Industrial Control Systems

Maybe … There is a bullet/goal that new OT products are secure by design. Later in the text the SCADA Apologist appears “traditional ICS can have 30-year lifecycles.” It’s a very broad, vision type document that could be read any way you like. It does not throw down the gauntlet saying legacy equipment needs to be upgraded or replaced.

CISA Recommended Cybersecurity Practices for Industrial Control Systems

No … If you are an optimist, you can feel good about “legacy equipment that is unable to leverage encryption is prioritized for upgrade or replacement” in the Performance Goals. Someone with authority finally said it, rather than falling back on how this is hard and will take decades. If this had been said and meant two decades ago, we could say we are securing ICS.

If you are a pessimist, it is one goal amongst many and hasn’t been highlighted. Cyber hygiene, especially patching and monitoring, are where the mindshare and communication effort is happening. INCONTROLLER/PIPEDREAM provided a powerful opportunity to push the point that we actually need to secure the communications and devices that monitor and control these critical infrastructures. For whatever reason, CISA was silent on how this demonstrates the need to “upgrade or replace” insecure by design systems.

For better or worse, CISA has the biggest megaphone in the U.S. and arguably the world. CISA not pushing that the root cause of the ICS security problem finally be addressed, 20 years late, means that only the enlightened few will pursue securing ICS in the near future.

Original content can be found at Dale Peterson.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Dale Peterson

Dale Peterson is the founder, chief executive and head catalyst of industry security provider Digital Bond.

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: Brett Sayles
  • Strategies

How to implement layered industrial cybersecurity in volatile times

  • Luis Narvaez
  • May 23, 2022
Read More
Next Article
  • Threats & Vulnerabilities

Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine

  • Tyler Wall
  • May 26, 2022
Read More
You May Also Like
Courtesy: CFE Media
Read More

What to know about the Bureau of Cyberspace and Digital Policy

New Freedom Waste Water Plant treatment plant, New Freedom, PA, is an example of how water districts recently replaced a legacy control system and now are using industrial Ethernet protocols to enable more cybersecurity resilience thanks to the Infrastructure Improvement and Jobs Act.
Read More

The 2021 Infrastructure Improvement and Jobs Act targets plant upgrades to enable resilient cybersecurity

Image contains wires plugged into a digital device.Image courtesy: Brett Sayles
Read More

CMMC 2.0 retains focus on maturity, streamlines governance and reduces cost of compliance

Courtesy: Brett Sayles
Read More

ISASecure Certification benefits

Courtesy: Brett Sayles
Read More

What is ISASecure certification?

As threat increases, college cybersecurity programs are more in demand
Read More

Structure of IEC 62443

Image courtesy: Brett Sayles
Read More

Enhance industrial network security by following IEC 62443-4-2

A lightbulb
Read More

What you need to know about the NERC CIP standards

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT