Industrial Cybersecurity For SMB WP
Industrial Cybersecurity For SMB WP
Industrial Cybersecurity For SMB WP
Industrial Cybersecurity
for Small- and Medium-Sized
Businesses
A Practical Guide
Standards
Certification
Publishing
Contents
Executive Summary................................................................................................................................................. 5
Why Cybersecurity Management is Important...................................................................................................... 6
Protecting businesses from the impact of a cybersecurity incident............................................................................... 6
Risk Assessment.......................................................................................................................................................... 7
Common threats.................................................................................................................................................... 7
Common vulnerabilities and key mitigations........................................................................................................... 8
Potential consequences of inadequate cybersecurity management........................................................................ 11
Essential cybersecurity activities................................................................................................................................. 13
Identify..................................................................................................................................................................... 14
Create an inventory of all IT and OT assets............................................................................................................ 14
Assess the risk of a cyber incident......................................................................................................................... 14
Define a cybersecurity management policy........................................................................................................... 14
Protect...................................................................................................................................................................... 15
Secure network and equipment............................................................................................................................ 15
Protect sensitive information................................................................................................................................. 15
Manage access to systems and equipment............................................................................................................ 16
Detect....................................................................................................................................................................... 16
Define methods for monitoring............................................................................................................................ 16
Define responsibilities for monitoring.................................................................................................................... 16
Identify improvements.......................................................................................................................................... 16
Respond................................................................................................................................................................... 17
Maintain incident response plan........................................................................................................................... 17
Practice response processes.................................................................................................................................. 17
Identify improvements.......................................................................................................................................... 17
Recover..................................................................................................................................................................... 17
Maintain backups of all systems and equipment................................................................................................... 17
Practice recovery processes................................................................................................................................... 17
Identify improvements.......................................................................................................................................... 17
Awareness and training............................................................................................................................................ 18
Assessment and continuous improvement................................................................................................................. 18
Self assessment.................................................................................................................................................... 18
Third-party assessment......................................................................................................................................... 18
Continuous improvement..................................................................................................................................... 18
References and further reading................................................................................................................................. 19
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Executive Summary
Effective cybersecurity management is essential for all SMBs need to understand their cybersecurity risk and to
organizations, regardless of size. There are many standards take action to reduce this risk, just as they do with other
and guidance documents available to help organizations business risks. The absence of previous incidents, or the
determine a way forward. belief that the organization is not a likely target, is not
sufficient justification for ignoring this issue.
This document is intended to provide a starting point for
small- and medium-businesses (SMBs), particularly those SMBs can be at risk from a wide variety of threats, including
that manage industrial processes and employ some level amateur and professional hackers, environmental activists,
of automation. Specific examples include SMBs in the disgruntled employees or contractors and even nation
chemical and water and wastewater treatment sectors. states or terrorists. In addition, many cybersecurity incidents
are a result of accidents or unintentional actions. A com-
While it is generally accepted that Operational Technol- pany does not have to be a specific target to be affected.
ogy (OT) system security requires different or additional
measures than general-purpose Information Technology The consequence to an SMB can vary tremendously
(IT) system security, it is also true that smaller companies based on the nature of operations and the vulnerabilities
might have difficulty implementing much of the available of each. It is essential that the underlying vulnerabilities
guidance. are recognized and that these vulnerabilities be mitigat-
ed to minimize the likelihood of potentially dire events.
Standards and practices are often based on the assumption
that engineering and operations resources are available This document provides guidance based on well-established
to define, implement, and monitor the technology, busi- frameworks and standards. Further reference should be
ness processes, and associated controls. Unfortunately, this made to these frameworks and standards, focusing on
is often not the case. Smaller operations are typically not the recommendations in this document.
staffed to include such roles. It is more common to have
broadly defined staff roles, with support and operation of Cybersecurity management is not a one-time activity.
IT systems as only part of an individuals responsibilities. Like quality and safety management, cybersecurity
Smaller companies may not even be fully aware of the risks management is an ongoing activity where continuous
they face or that they can contract for cybersecurity-related improvement must be made in order to manage
services. This guide is intended to identify the essential the risks.
controls that need to be established.
5
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
There are two broad categories of systems and equipment: Information Technology (IT) and Operational Technology
(OT), each with their own characteristics, as shown in the table below.
Management of Change-control processes are largely Technological changes are part of the overall
Change self-contained within the IT function. Management of Change process. It can be difficult
to take equipment out of service to update.
Other factors It is becoming more common for employees Equipment and communications protocols tend to
to use their own devices, especially mobile be proprietary, and it can be difficult to implement
technology, to access business systems typical cybersecurity controls
New technologies are being adopted with Underlying technology can be antiquated and,
insufficient concern for security therefore, more vulnerable to basic cybersecurity
incidents
The equipment environment is almost always
heterogeneous, with devices of various ages and
sources
6
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Risk Assessment
Cybersecurity-related risks are evaluated using a process that: systematically identifies potential vulnerabilities to valu-
able system resources and threats to those resources; quantifies loss exposures and consequences based on probability
of occurrence; and (optionally) recommends how to allocate resources to countermeasures to minimize total exposure.
In simple terms, risk can be defined as a function of threat, vulnerability, and consequence. Each of these elements
must be assessed in order to gain a full understanding of the situation.
Common threats
When considering cybersecurity threats, many consider only deliberate, targeted attacks from professional hackers.
As a result, some dismiss the risk to their facilities.
The table below shows that SMBs are subject to numerous types of threats, both deliberate and otherwise. Cyber-
security incidents can arise as a result of accidents or unintentional actions by authorized individuals (employees,
vendors, or contractors). Many threats are often non-targeted and SMBs can be impacted as collateral damage.
In all of the examples below, SMBs could be impacted indirectly, simply because they have equipment similar to the
primary target.
Professional hackers Hackers with more skills and resources In 2016, the Lansing Board of Water & Light was
target organizations with ransom ware forced to pay a $25,000 ransom to unlock its internal
and other disruptive techniques and tools communications systems, which were hit as part of a
for profit. larger attack. The utility estimated the total cost of
responding to the attack and strengthening its
defenses against future attacks was $2.4M.
Environmental activists Groups can work with hackers to disrupt In 2011, the group Anonymous posted confidential
the operations of organizations whose information on 2,500 Monsanto employees and
business practices they oppose or are associates and shut down the companys international
contrary to their beliefs. websites for nearly three days.
Disgruntled employees or Using inside knowledge or privileged In 2012, a male programmerpassed over for promo-
contractors access, to gain revenge by disrupting tions at a Long Island power supply manufacturer
operations or to steal confidential infor- created an unauthorized program to harvest employees
mation to be sold to competitors logins and passwords.
After leaving the company, the person used his creden-
tials to get into the network and disrupt business and
inflict damage on the companys operations.
7
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
A mitigation is an action or solution that is implemented to: reduce the likelihood of a vulnerability being exploited or
offset the adverse effects of an incident should that vulnerability be exploited.
There are many cybersecurity vulnerabilities, and each organization possesses different ones depending on the equip-
ment they use and the policies and procedures they have in place. As noted previously in this white paper, SMBs can
be impacted by a non-targeted attack, simply because they utilize equipment similar to that used by the primary target.
The table below provides a list of common vulnerabilities found in all organizations to some degree, along with key
mitigations that should be implemented to control these vulnerabilities.
These key mitigations are essential for all SMBs to provide a basic level of cybersecurity management. It is highly rec-
ommended for SMBs to consider additional mitigations. Further guidance is available from several sources, including:
International Society of Automation (ISA). The ISA/IEC 62443 standards (Security for Industrial Automation and
Control Systems) provide detailed guidance on how to create a cybersecurity management system for OT environ-
ments. These standards are also available internationally as IEC 62443
The US Chamber of Commerce [6], Department of Homeland Security (DHS) [7], US Small Business Administration
(SBA) [9], National Institute of Standards and Technology (NIST) [10], as well as many business and technology
websites [5], [8]
The Center for Internet Security (CIS). CIS produces the Critical Security Controls [2], which identify the top 20
mitigations that reduce the likelihood and/or consequence of a cybersecurity incident. These controls are referenced
in the Key Mitigations table below as CSCxx where xx is 1 to 20 (for example, CSC17)
8
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Inadequately Equipment that is inadequately secured can: Where possible, keep equipment in locked
secured cabinets or rooms to avoid unnecessary
Lack appropriate physical security, allowing ease of ac-
equipment contact
cess to unauthorized users and increase the likelihood
of accidental actions Where not possible, use locks (physical and
electronic) to secure access to physical inputs
Lack appropriate protection on physical inputs, such as
USB ports and DVD drives, making it easier for malware Remove unnecessary applications and disable
to be transferred unnecessary services on equipment
(CSC1,2,3,6,7,11,13,18)
Contain unnecessary applications or run unnecessary
services, increasing the possibilities of a cyber incident
Inadequate Equipment running without anti-virus protection is vulner- Ensure anti-virus is operational and main-
anti-virus able to malware attack. With some malware, the infection tained on all equipment, where possible
management may not be obvious and this can lead to a spread of the
Where not possible, ensure equipment is
malware throughout the organization.
adequately secured to remove opportunity
A failure to maintain anti-virus protection (with the latest for introduction of viruses
security patches or with the latest malware signatures)
Use standalone machine to perform virus
makes equipment much more vulnerable to newer mal-
checking on incoming machines and media
ware threats.
(CSC8)
9
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
10
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
11
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
12
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
The US Cybersecurity Framework, produced by the National Institute of Standards and Technology (NIST) [1], is an
excellent starting point for SMBs. The Framework identifies five core functions that encapsulate cybersecurity manage-
ment. The Framework then further defines all the activities that may need to be undertaken for each function and
identifies relevant standards to help identify how to implement these activities.
The table below identifies the essential cybersecurity activities that should be undertaken by all SMBs. These are
described in more detail below the table.
Framework
Activities
Functions
Identify Create an inventory of all IT Assess the risk of cyber Define a cybersecurity
and OT assets incident management policy
Protect Secure network and Protect sensitive Manage access to
equipment information systems and equipment
Detect Define methods for Define responsibilities for Identify improvements Awareness and
monitoring monitoring training
Respond Maintain an incident- Practice response processes Identify improvements
response plan
Recover Maintain backups of all Practice recovery processes Identify improvements
systems and equipment
13
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Identify
The identify function focuses on understanding the nature of the systems inventory owned by the SMB and what risks
are associated with this inventory.
Additionally, some organizations identify equipment location, owner, and other useful information.
Risk assessments require the involvement of all key stakeholders (to ensure accuracy) and should identify the likely
threats and the vulnerabilities in the asset base. From this, the organization should identify the potential consequences,
e.g. loss of confidential information, loss of revenue, environmental impact, injury or death, and so on.
SMBs should rank their risks using a common methodology to allow the identification of risks in priority order.
The processes and procedures required for operational activities and to reduce cybersecurity risks
The expectations of employees (e.g. appropriate use of IT equipment, use of personal devices, etc.)
14
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Protect
The protect function is a core cybersecurity management activity that an organization must undertake on an
ongoing basis.
Physically locking or disabling all equipment inputs to prevent unauthorized use, including smart device charging
Using only dedicated devices that are kept secure, with anti-virus software scanning before and after use
Using a quarantine area to check incoming removable devices of unknown provenance and transfer files to
dedicated, known devices
Only allowing a transfer of files from removable devices under strict supervision and in compliance with anti-virus
checks
Applying recommended patches to operating system and application software in a timely manner
Limiting external access to equipment and networks to only those authorized to access them
Keeping confidential information secure (e.g. in locked cabinet or safe) and disposing confidential information in
a secure manner (e.g. shredding)
Being aware of who is around you and taking care to avoid disclosing sensitive information
Making sure you dont click on links or open attachments unless you are certain the sender is trustworthy
Making sure you do not download or install anything after following a link in a suspicious email
Making sure you do not provide confidential information via email unless you are certain the recipient is
appropriate/authorized
Making sure a supervisor or trained expert is available for advice before individuals take any action
15
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Maintaining physical and electronic security to ensure that only authorized persons have access to the equipment
they require in performing their role
Providing temporary external access as required, supervise during use, and remove once complete
Detect
Having established an understanding of its asset base and the risks to it, the SMB must then have methods to monitor
for incidents, so that it is able to respond promptly and effectively to minimize the impact.
In addition, all employees should receive awareness training, be instructed to be vigilant for signs of a cyber incident,
and be trained to report any type of cyber incident.
Identify improvements
Cybersecurity is an ever-changing situation. Threats, vulnerabilities, and risks change and SMBs need to be able to
adapt. In the detect function, SMBs must regularly review their monitoring methods and adjust them to suit changing
circumstances and according to incident experiences.
16
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
Respond
The respond function comes into effect when an incident occurs. However, preparation is essential to a successful
response, and so an organization must take actions well in advance of any incident.
Identify improvements
SMBs will need to update their incident management plans in response to changes in the cybersecurity landscape,
and also as a result of their incident response tests.
Recover
While the respond function comes into effect when an incident occurs, the recover function comes into effect once
the respond function is completed. As with the respond function, preparation is essential to a successful recovery, and
so an SMB must take actions well in advance of any incident.
Determine back-up frequency based on operational requirements (How long can you operate without a working
system? How much data can you afford to lose?)
Store clearly labeled backups securely on-site and off-site, preferably in a fireproof safe
Identify improvements
SMBs will need to update their recovery processes in response to changes in the cybersecurity landscape, and also as a
result of their incident recovery tests.
17
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
External classroom and online training courses are recommended for SMBs to give their employees a clear under-
standing. Internal resources, such as assessment (surveys, tests) and awareness (videos, posters, emails) tools, should
be used to complement external courses and provide a constant reminder to employees.
Effective cybersecurity management should be a high-profile business objective that is reported on by management so
that employees are constantly reminded of its importance.
The International Society of Automation (ISA) provides training courses and certificate programs based on the ISA/IEC
62443 (Security of Industrial Automation and Control Systems) standard [4].
Third-party assessment
For a nominal fee, ISA can review an SMBs survey responses. ISA utilizes a pool of international cybersecurity Subject
Matter Experts (SMEs) to provide this service. This third-party assessment will provide a more comprehensive, and
independent, review of the SMBs cybersecurity posture, with advice on how to proceed.
Continuous improvement
Effective cybersecurity management requires continuous improvement. The essential activities outlined above are only
the beginning.
For each of the five core functions of the Cybersecurity Framework, there are many degrees to which SMBs can go.
For example:
Network and equipment monitoring can be a manual activity in its simplest form, but SMBs can purchase speciality
software to assist
Third-party organizations can provide assessment services, including penetration testing, to validate the effective-
ness of cybersecurity mitigations
The degree to which SMBs should go will depend on the level of risk they perceive, and this may vary with time.
In addition, cybersecurity is continuously evolving, with new vulnerabilities, exploits, and threats arising all the time.
SMBs must continuously review their risk and adapt their mitigations to suit this changing landscape.
18
Industrial Cybersecurity for Small- and Medium-Sized Businesses
A Practical Guide
[3] IEC62443 Security For Industrial Automation and Control Systems, International Society of Automation (ISA),
https://www.isa.org/store/products/product-detail/?productId=116720
[4] IEC62443 Training Courses and Certificates, International Society of Automation (ISA),
https://www.isa.org/templates/two-column.aspx?pageid=124579
[7] Cybersecurity Resources for Small Businesses, Department of Homeland Security (DHS),
https://www.dhs.gov/publication/stopthinkconnect-small-business-resources
[9] Cybersecurity For Small Businesses Course, US Small Business Administration (SBA),
https://www.sba.gov/tools/sba-learning-center/training/cybersecurity-small-businesses
[10] Small Business Information Security: The Fundamentals, National Institute of Standards and Technology (NIST),
http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.7621r1.pdf
19
International Society of Automation
67 T.W. Alexander Drive
P.O. Box 12277
Research Triangle Park, NC 27709
PHONE +1 919-549-8411 The International Society of Automation (www.isa.org) is a nonprofit
FAX +1 919-549-8288 professional association that sets the standard for those who apply
EMAIL [email protected] engineering and technology to improve the management, safety, and
www.isa.org cybersecurity of modern automation and control systems used across
industry and critical infrastructure. Founded in 1945, ISA develops widely
used global standards; certifies industry professionals; provides education
and training; publishes books and technical articles; hosts conferences
and exhibits; and provides networking and career development programs
for its 40,000 members and 400,000 customers around the world.
ISA owns Automation.com, a leading online publisher of automation-
related content, and is the founding sponsor of The Automation Federation
(www.automationfederation.org), an association of non-profit organizations
serving as The Voice of Automation. Through a wholly owned subsidiary,
ISA bridges the gap between standards and their implementation with
the ISA Security Compliance Institute (www.isasecure.org) and the ISA
Wireless Compliance Institute (www.isa100wci.org).
EP02-7778-0517