Chapter 11
Chapter 11
11.1. Introduction
For each phase, a number of areas have been identified. They include a
list of security measures to be implemented.
Data/physical process
Applications
Machines
Network
Perimeter
Physical access
Organization and
human factor
In addition, the measures put in place can be more or less well controlled.
Quality of implementation is assessed using the level of maturity, such as that
proposed by the IEC 62443 approach (Chapter 7), inspired by the CMMI
scale.
276 Cybersecurity of Industrial Systems
– BP03: ensure that off-network exchanges via removable media are also
partitioned (section 11.11);
– BP04: user access control and user authorization management (section
11.14);
– BP05: harden the configurations (section 11.12);
– BP06: set up a logging of abnormal events and generate alarms (section
11.16.1);
– BP07: manage PLC configurations and programs to avoid unwanted
changes (section 11.13);
– BP08: make validated backups (section 11.19.1);
– BP09: have up-to-date documentation on the installation, reserved for
the authorized users (section 11.4.2);
– BP10: implement antivirus protection with regular updates (section
11.12.6);
– BP11: apply security patches regularly (section 11.17.2);
– BP12: protect the PLCs as well as possible given the technical
possibilities (section 11.12.3);
– BP13: pay particular attention to engineering stations, ensuring that the
good practices mentioned above are properly applied, especially for mobile
consoles (section 11.12.2).
These measures are all detailed below. They provide a satisfactory level
of security for a non-critical installation.
12. Secure
interactions with
suppliers
– Identification:
1) inventory the facility (section 11.4);
2) assess the risk (section 11.5);
3) set up a governance system and, optionally at first, a risk
management system (section 11.6).
– Detection:
13) implement an incident detection system (section 11.16);
14) set up security monitoring (section 11.17).
– Response:
– Recovery:
11.4.1. Mapping
The objective of this step is to assess the risk level of the installation. Risk
assessment methods are presented in Chapter 9. The question is:
– on the one hand, what the impacts of a cyber-attack may be, particularly
in terms of material damage to people or property, or on production
capacities;
– on the other hand, what is the likelihood of occurrence of the
undesirable events that caused these impacts.
This likelihood may depend on the vulnerability of the ICS, but also on
the operating security measures to protect against poor control system
behaviour.
The objective of this analysis is to identify the most critical parts of the
installation and, depending on this criticality, to decide on the different
security measures to be implemented.
To perform this risk analysis, either the risk analysis methods presented in
Chapter 9 or the ANSSI class approach (Chapter 6), which allows the
criticality level to be determined in a simplified way, may be used.
Implementation of the ICS Cybersecurity Management Approach 281
Wireless network
PLC, RTU Workstations,
management, network
sensors, business
equipment, servers,
Actuators, servers, web,
printers, mobile
etc. etc.
terminals, firewall, IDS
IPS, etc.
Policy
Why should it be done?
Who should do it?
Procedures
How and when?
The ICS security policy can begin by describing the context and scope of
the ICS and then recall the challenges of industrial security. It then defines
the ICS security organization with the definition of roles and responsibilities,
in particular between the IT and OT world, as well as relations with external
service providers. In the case of an operator of essential service (OES), the
aspects concerning relations with the authorities must be defined.
The security policy must also address issues such as user account
management, use of removable media, remote access, mobile devices, use of
Implementation of the ICS Cybersecurity Management Approach 283
Training should ensure that staff are aware of the security policy and
procedures and implement them. The first step is to develop an awareness
program for all employees involved. This awareness must be supported by
management. It must then be followed by regular communications to remind us
of the risks and important points.
Access management based on roles and staff taking into account new
employees and employment termination must be provided.
A policy for the use of this type of media must be defined. At a minimum,
the software restrictions (no autostart from removable media) must be
activated.
For greater security, these media should not be used, and transfers should
be made through a dedicated and secure workstation with antivirus software.
The Cloud platform must be configured with the appropriate controls and
supplied with the correct certificates.
11.12.6. Antivirus
Older, or less powerful, hardware does not always have very advanced
authentication capabilities, which can be a problem. In addition, it is often
difficult to implement centralized authentication management, such as LDAP
(Lightweight Directory Access Protocol, a protocol for querying directory
services).
App
Dupond Admin installation
Network access
Engineer
Dupuis
Read/write
Operator files
SCADA
One or more roles application
Rights for
each role
In all its life phases, the security of an ICS depends heavily on a number
of external suppliers or service providers. Recent attacks as Stuxnet have
demonstrated this.
The questions that arise are the types of events to be recorded and the
storage period in order to limit the size of storage. These logs can be
centralized with a SIEM.
The monitoring activity is based on mapping, and it will be all the more
effective if the mapping is exhaustive.
The response to incidents in the ICS case must take into account the
physical aspect of the process: it is not possible to stop it in any situation and
a mechanism must be provided to bring it back to a safe situation, or to
Implementation of the ICS Cybersecurity Management Approach 293
provide for operation in degraded mode. The answer must also take into
account the fact that the system operates in real time, and be fast enough.
11.19. Recovery
If certain feared events occur, damage may occur to the ICS and the
installation. It is therefore important to be prepared to restart the activity as
soon as possible. Two levels of damage can be considered:
– the first one concerns programs and data, and a recovery allows to
restart;
– the second concerns physical damage and, in this case, more extensive
rehabilitation is required.
11.19.1. Backup