CREST Industrial Control Systems Technical Security Assurance Position Paper
CREST Industrial Control Systems Technical Security Assurance Position Paper
Published by:
CREST
Tel: 0845 686-5542
Email: [email protected]
Web: http://www.crest-approved.org/
The UK National Cyber Security Centre contributed to the production of this document, which encapsulates
the diverse views of the Industrial Control System community and proposes a model for gaining assurance in
ICS environments. The NCSC believes this paper provides a valuable contribution to the current thinking on this
challenging topic and we look forward to working with CREST, as well as ICS operators and the cyber-security
industry in the UK in order to make the UK the safest place to live and do business online.
Acknowledgements
CREST would like to extend its special thanks to those CREST member organisations and third parties who took
part in interviews and participated in the workshops.
Warning
This Guide has been produced with care and to the best of our ability. However, CREST accepts no responsibility
for any problems or incidents arising from its use.
© Copyright 2017. All rights reserved. CREST (GB).
DTP notes
For ease of reference, the following DTP devices have been used throughout the procurement Guide.
A Good Tip
! A Timely Warning
Key findings A practical technical security testing process for ICS environments
The key findings from research into the technical security assurance of Industrial Control System (ICS) environments conducted with As part of this project, a practical technical security testing process for ICS environments has been developed and is shown in Figure 1 below.
subject matter experts and specialist security testing organisations are shown below.
2 Technology (OT) convergence and technology evolution) and this is leading to a higher degree of exposure and a
• Confirm composition of testing team
Technical security testing specialists regard inadequate management support (eg. lack of budget, poor resourcing,
4 low risk appetite) as the most important factor affecting the ability to secure ICS environments and undertake
technical security testing activities. • onduct ICS device discovery exercise
C
Undertake discovery • Determine network topology
3a
• Gather and review ICS network and device configuration information
ICS security standards and guidelines are evolving but currently contain little information to directly help technical • Create and agree ICS technical infrastructure model
5 security testers. At present there is no definitive standard for technical security testing in ICS environments that is
mandated by regulatory bodies.
Multi-disciplinary testing teams should be assembled for ICS technical security testing consisting of members
7 with different testing skills, knowledge and perspectives on risk management (such as resident process engineers,
safety specialists and IT staff ).
Conduct technical
4 security tests
• Undertake and document offline and online tests
Because of the unique technologies, critical processes, and sensitive testing requirements there is a higher
8 demand placed on the skills, knowledge and situational awareness of technical security testers working in ICS
environments, as opposed to conventional IT environments.
Technical security testing approaches should be intelligence-led, threat-scenario based, draw on well–established • A nalyse test results and condolidate findings
9 technical security testing principles and where possible use red teaming concepts. 5
Analyse and report test • Document ICS environment remediation recommendations
results
• Review findings with key stakeholders
Promotion of the importance of technical security testing needs to be carried out so that ICS environment owners, Figure 1: A practical technical security testing process for ICS environments
10 process engineers and safety specialists have a better awareness of the importance of technical security testing in
the management of cyber risk.
The ICS technical security testing process is described in more detail in Part 4 –
Undertaking technical security testing in ICS environments.
4 5
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
• Education, training and knowledge sharing 16 The scope of this Position Paper has been restricted to focus on the
• Technical capability 16 Throughout the Position Paper you will find tips, main topics related to technical security assurance of ICS environments
warnings and quotes provided by a diverse set of that have emerged from the project research. It has therefore not
• Infrastructural environment 17 contributors, including expert suppliers (such as included topics that are either very generic or very specific, such as:
many CREST members), consumer organisations,
government bodies and academia. These bring • Penetration testing in general, which is covered in
Part 4 – Undertaking technical security testing in ICS environments 18 separate CREST guides (see www.crest-approved.org)
real-world, practical experience to the Position
• A practical technical security testing approach 18 Paper, allowing you to get a better feel for the • Hazard operations and safety culture in ICS
types of action that are most likely to apply to your environments
• Business process sensitivity 20
organisation. • In-depth analysis of infrastructure, devices and protocols
• Focused threat intelligence 20 in ICS environments
• Integrated risk assessment 21 • The specific technical security tests to be used in ICS
• Proven tools and methods 21 Audience environments
This Position Paper is aimed at organisations in both the • The operation of technical security testing tools
• Qualified technical security testers 22
private and public sector. Project research has revealed that the typically used by commercial technical security testing
• Combined testing teams 23 main audience for reading this Position Paper is IT managers, organisations.
information security managers and technical security testing The material in this Position Paper will provide valuable input to
specialists. It should also be of interest to process engineers, safety many of these topics, any of which could be the subject of a future
Part 5 – The way forward 24 specialists, business managers, procurement specialists and IT research project.
• Improve foundational elements of ICS technical security testing 24 auditors.
6 7
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
Rationale
This Position Paper is based on the findings of a research project
- conducted by Jerakano Limited on behalf of CREST – which
This Position Paper complements existing CREST
reports that have been produced on penetration
testing that can be found on
Part 2 – Setting the scene
The changing nature of ICS environments “ Because ICS is widespread and
the dependency is very high, the
prospect of a successful, universal
looked at the requirements organisations have to undertake
technical security assurance of ICS environments.
!
The increased connectivity of ICS environments
and their use of conventional IT infrastructure
http://www.crest-approved.org.
Project research
The research on this CREST project included:
Industrial control systems are deeply embedded in many
different industry sector organisations and play a vital role in
organisations that make up the critical national infrastructure of
most countries (eg. energy, water, transportation). Historically the
relative isolation and specialised nature of ICS environments has
attack propagating is particularly
alarming to those responsible for
critical infrastructure
“
helped to ensure exposure to attack has been relatively low. This
components and protocols has enlarged the • Performing desktop research on many different sources has changed in recent times with an increase in the connection
attack surface that can be exploited by ever more of information of ICS environments into the wider corporate network of many
sophisticated cyber security attackers, such as
• Conducting telephone interviews with key stakeholders, organisations (eg. to support business process efficiencies) and
state-sponsored attacks, organised cybercrime
the greater use of more conventional IT technologies (eg. to lower
and extremist groups.
such as CREST members and clients ICS incidents are real
costs associated with support and maintenance).
• Site meeting with CESG (now National Cyber Security
Centre) and CPNI to discuss feedback on the report Incidents in ICS environments are real and there is now a
The objectives of the CREST Industrial Control Systems Technical For the purpose of the project, the definition of an Industrial
Cyber Security Assessments of Industrial Control strong body of evidence that critical infrastructure is a target
Security Assurance project were to help organisations: Control System provided by NIST in SP.800-82r2 Guide to Industrial
Systems – A Good Practice Guide not only of adversarial nation states but also of determined
Control Systems (ICS) Security has been adopted.
• Make their ICS environments more difficult for cyber • Running two large workshops where experts in technical and skilled criminal attackers. Many will have heard of the
security adversaries to attack security testing from more than 30 organisations determined A device, or set of devices, Supervisory Control and Data major ICS incidents that have made the press in recent years
the scope of the project, validated the findings of this that manages, commands, Acquisition (SCADA) refewrs such as the Ukranian power plant hack. the Stuxnet attack
• Reduce the frequency and impact of cyber security
Position Paper and provided additional specialist material. directs or regulates to an industrial computer on the Iranian Nuclear facilities and the German steel mill
incidents affecting ICS environments
the behaviour of other system that monitors and incident and also possibly the emergence of ICS-focused
• Complement existing security guidance and standards
devices or systems. controls a process. malware such as Havex and Dragonfly. Unfortunately the
aimed at securing ICS Applicability media storm that has surrounded these isolated indicators has
• Meet compliance requirements and corresponding test Industrial Control Systems, particularly those that form part of the Industrial Control System (ICS) is a general term that in some respects been misleading as it has detracted from an
procedures Critical National Infrastructure, are high risk and high business encompasses several types of control systems used in overall picture that is far bleaker. In reality many organisations
• Familiarise themselves with cyber security attacks and impact and consequently require the highest level of technical industrial production, including supervisory control and data with ICS environments are unclear what level of threat they
the measures that are required to counter these threats. testing (see Figure 2). acquisition (SCADA) systems, distributed control systems face or whether they have already been breached. In 2015
(DCS), and other smaller control system configurations such SANS surveyed 314 respondents on security in their ICS
The work on the project also covered elements of cyber security The STAR and Penetration Testing services shown in Figure 2 as programmable logic controllers (PLC) often found in the environments. The results of this survey revealed that:
threat analysis; cyber security intelligence; penetration testing; are supported by comprehensive codes of conduct for both the
technical and management assurance techniques; detailed network industrial sectors and critical infrastructures.
company and the individual. These codes are used to ensure the • 32 % indicated their control system environments or
and infrastructure monitoring; and cyber security incident response. quality of the services provided, the integrity of the companies networks had been infiltrated or infected at some point
Computer-based solid-state
and individuals and adherence to audited policies, processes and devices that control industrial • 34% believe their systems had been breached more
The project included a detailed review of the DHS / CPNI
procedures. This provides a significant level of protection for any equipment and processes. than twice in the past 12 months
document Cyber Security Assessments of Industrial Control
organisation procuring these types of services.
Systems – A Good Practice Guide. • 15% reported needing more than a month to detect
As connectivity and access have increased and a better a breach
We deliver schemes that align to industry requirements understanding of ICS infrastructure has become more
• 44% were unable to identify the source of the infiltration.
High Levels of Assurance.
widely known this has led to an increase in the attack
Aligned to industry surface of ICS environments and an increased likelihood of Furthermore when asked about the source of attacks
Simulation of known industry threats
CREST malicious activity. The consequences of attack could be very respondents indicated that:
damaging, particularly in the case of critical infrastructure,
STAR
Simulated Target so it is important to ensure ICS environments are protected. • 42% saw external actors as the top 1 threat vector
Attack & Response
Technical security assurance is a vital element of the range • 19% saw integration of IT and OT as the top threat vector
Objective focused
Penetration Test of measures required to fully protect ICS environments
• 11% saw insider threats as the top 1 threat vector.
Defined Scope Penetration Testing
and will help ensure organisations are able to identify and
remediate vulnerabilities that could be exploited. Frequent From these findings it is clear that ICS environments have
Basic Levels of Assurance. technical security assurance provides stakeholders, both
Vulnerability Analysis Alignment with schemes such never been more exposed to external attackers and they are
as Cyber Essential. inside and outside the organisation, with objective fact-
No specific industry orientation using new points of ingress introduced through increased use
based information on what remediation is required, why it is
of conventional IT to carry out attacks.
required and how it should be applied.
Figure 2: CREST assurance schemes
8 9
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
!
Interviews with subject matter experts has revealed
that major incidents affecting ICS environments
often go unreported. While this may be for sensible
commercial and / or national security reasons
it does make it difficult to provide an accurate
•
•
Use of home-brew testing approaches typically
assembled from well known sources (eg. NIST SP.800-82r2)
Lack of accurate information on the devices in ICS
environments
Need for vendors to do more to secure their products in
Each of these factors alone makes achieving an acceptable level
of security in ICS environments difficult. Collectively they create a
formidable set of challenges that need to be addressed in order
to manage risk. For technical security testers understanding this
background in an ICS environment is important as most of these
“ Every ICS is unique. Every ICS is
different. You have to learn what’s
going on in your one
“
“
factors are both fundamental in nature and highly interrelated.
ICS environments.
view of the level of risk faced by organisations
- particularly those that are part of the Critical Research helped to identify the relative importance of these In response to research probing the use of technical security
National Infrastructure. Improved reporting and the factors. There was a Very High level of agreement that testing in ICS environments, respondents indicated their Very
more widespread sharing of incident data within The devices market is dominated by Inadequate management support is a key factor. All other
organisations and across the supply chain would
help to address this shortcoming.
•
Need to proceed with a high degree of caution during
technical security testing of ICS environments
Requirement for the use of qualified testers and the use of
testing techniques that are different from the conventional
the case that, with the adoption of conventional IT technology, In general soft skill factors are regarded as being more important
ICS technical architecture is becoming less obscure and easier to than hard skill factors in the extent to which they affect the ability • Lack of an authoritative approach for testing the security
understand and manage. to secure ICS environments. It should be noted that this may in ICS environments
Subject matter experts that were interviewed for reflect the advanced skill-set, experience and technical confidence • Need for more widespread training and education in ICS
Research conducted by the project into the challenge of securing
ICS environments revealed respondents Very High level of
! the project have pointed to the current lack of of participants who were predominantly drawn from a technical
security testing background.
security and technical security testing of ICS environments
adequate ICS-related technical security architecture • Requirement to provide technical assurance of ICS
agreement with the: environments.
reference models available in the public domain.
They confirmed that practitioners would benefit Difficulties in conducting technical
• Disappearance of the air gap as a viable control
from having access to a greater variety of industry- security tests There was a High level of agreement with the:
• Difficulty in obtaining suitable log data for attack analysis
specific types to help compare and improve their
and forensics. Because of the high sensitivity of many ICS environments, extreme
own measures. • Requirement for technical security testers to have a good
caution must typically be exercised in conducting technical security
tests. It is important to carefully consider the type and nature of knowledge of process environments and the unique
There was a High level of agreement with the: protocols and devices in ICS environments.
technical security testing that can be undertaken and test analysts
Key issues in ICS security should make use of a broad range of methods and alternative
• Reluctance of ICS environment owners and process
engineers to allow IT and security people access to ICS Project research helped to identify 9 main factors that could affect approaches as part of their testing methodology. In contrast with
Standards and guidance
environments for security testing purposes the ability to secure ICS environments (see Figure 3). conventional IT environments, ICS environments typically place
a higher value on ‘availability’ than ‘integrity’ or ‘confidentiality’. There are many standards and guidance related documents
This requires a different approach to technical security testing. available to help organisations in the management of security in ICS
Conventional technical security tests that are invasive in nature or environments. The work of the International Society of Automation
place a burden on the network may inadvertently cause damaging (ISA) has been particularly important in this area and has provided
Inadequate the basis for the development of the International Electrotechnical
1 management support 4 Merging of IT and OT 7 Increasingly large loss of service events and should be avoided. For example, where
attack surface a ‘ping sweep’ might be used in a conventional IT environment to Commission (IEC) IEC 62443 set of standards on ICS security that have
help identify hosts and nodes it might be more appropriate in an been published or are due to be published over the coming years.
Cultural barriers and High degree of ICS environment to examine router configuration files or even to Industry sector specific guidelines have also been produced to help
Insufficient help with technical complexity
2 resistance to change 5 what ‘good’ looks like 8 trace the physical wires for confirmation of connections. address the particular concerns of specific industries (eg. chemical,
and obscurity
power generation, water). Within the UK the Centre for the Protection
Testers need to understand the technologies that are unique to of National Infrastructure (CPNI) has created a range of documents that
Poor awareness of Difficulty in ICS environments, the processes that could be affected by testing cover the broad spectrum of key issues that need to be addressed to
Shortage of skilled undertaking technical
3 changed risk profile 6 resources 9 and the types of tests that can be used most effectively. This secure ICS environments (eg. Security for Industrial Control Systems - A
tests - super sensitivity
places a higher demand on the skills, knowledge and situational Good Practice Guide).
awareness of the tester. It calls for specialist individuals that are
supported by a well-founded methodology.
Soft skill factors Hard skill factors
10 11
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
“
CPNI Security for Industrial Control Systems – A Good obligation that comes with high office.
Practice Guide Technical security testing is a key element of ICS Risk Assurance
but it is only one aspect and proper consideration needs to be
A framework of documents that address the core issues in securing
given to the other constituent elements that are required in an
ICS environments. This framework is primarily intended for those
Executives do not necessarily overall framework (see Figure 4).
who are directly responsible for securing ICS, whether they are
looking to establish a new programme or complement one that
already exists. It will assist ICS professionals in improving their
knowledge of security as well providing IT professionals with
insight into ICS environments. Senior leaders in an organisation
are informed about the rationale for establishing an ICS security
understand the problem. People on
the ground get it but there seems to
be something lost in translation
“
capability and the activities required to secure ICS environments.
12 13
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
Owners
giving
Threats
using
require Management
Confidence Vulnerabilities Assurance Support Criticality
in require
Assets
14 15
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
Business assurance Research on the project showed that in response to questions The increased connectivity of IT and OT has also altered the
“
Domain knowledge and Process knowledge. The Cyber Security Evaluation Tool (CSET) from the US ICS-CERT the same level of malicious activity that affects conventional IT
is a no-cost, voluntary technical assessment which provides a environments. This potentially broadens the scope of any technical
• Technical security assurance activities should be
snapshot of an organization’s cybersecurity posture. It helps security testing that is required and necessitates the need for
•
business-led and signed off upon successful completion
(ie. there is a clear line of sight to corporate risk
management activities)
Technical security assurance activity must be
aligned with the risk appetite and risk attitude of the
Best practice in ICS technical
security testing needs to be
shared more effectively
“ ICS environment owners and operators assess cybersecurity
strengths and weaknesses within their control system
environments and can also be used to assess traditional IT
infrastructure.
greater situational awareness and more use of threat modelling
and intelligence-led testing (see Part 4 - Undertaking technical
security testing in ICS environments).
“
security testing
to understand the infrastructure and entities that make
• Access to industry advice and guidance for technical up the ICS architecture
security testers and other security practitioners to help
• Technical skills of testers and the organisations for whom
improve and refine their approach to technical security
they work.
testing (eg. through a definitive guide to conducting Technical security testing in
In response to questions about the types of tools and techniques
•
technical security testing in ICS environments) and
situational awareness
Effective sharing of up-to-date information on threats
and vulnerabilities (e.g, such as that provided by CERTUK
for incident information) both inside organisations and
used in ICS technical security testing, respondents rated the use of
Architectural review, Configuration review, Port scanners and Packet
sniffers as Very High. In terms of methods used in technical security
testing of ICS environments Laboratory assessment, Component
testing, Staff interviews and Risk assessment were rated as High.
the enterprise IT space is well
understood but there is little
advice in the ICS world and many
environments are not assured
“
along supply chains.
16 17
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
Conduct technical
4 security tests • Undertake and document offline and online tests
18 19
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
The overall process is generic in nature and similar to many well- There are also six defining characteristics that set this approach
established technical security testing approaches. It should be apart from conventional technical security testing, which are:
Threat intelligence
sufficiently flexible to be easily adapted as required to meet the unique
requirements of each different testing scenario. It is also important for • Business process sensitivity Proven tools and methods
Threat intelligence, also known as cyber threat intelligence (CTI),
the process to be straightforward and easy to follow for all stakeholders. • Focused threat intelligence While as a general rule online technical security testing in ICS
is organised, analysed and refined information about potential
This will help in demystifying the activity of technical security testing environments should be used with caution there are a variety of
• Integrated risk assessment or current attacks that threaten an organisation.
and aid effective communication about the engagement. The six key measures that can be taken to ensure services are aligned with the
• Proven tools and methods One of the primary purposes of threat intelligence is to help needs of the client and the risk of disruption is minimised. These
steps of the process and their main objective are:
• Qualified technical security testers organisations understand the type, nature, severity, source include:
Step Main objective • Combined testing teams. and origin (eg. nation-state, criminal gang, cyber activitst) of
threats that are either directly or indirectly targeted at their • Using business-based test scenarios
To agree a clear business-based scope • These characteristics of technical security testing in ICS
1 Define and agree scope
for the technical security tests aligned environments are described below. environment. • Exploiting the domain knowledge of in-house process
to the strategic, process and system engineers and safety specialists
In the case of ICS environments threat intelligence that is most
requirements of the organisation. relevant to the organisation will come from a wide variety of • Employing a progressive check-test-check approach that
sources including the dark web, inside industry sources, open is safety conscious
To explore the main threats and
2 Assess risks source monitoring, government sources and hacking forums. • Commencing with manual tests before moving to
vulnerabilities of the ICS environment Business process sensitivity In a military, business or security context, intelligence is
automated tests
and determine the key risks and likely risk ICS environments are part of business processes that typically
information that provides an organisation with decision support • Exploiting wherever possible offline, pre-production,
scenarios to be tested. need to operate effectively and without interruption to ensure the
and possibly a strategic advantage. Threat intelligence is a development or test bench environments to simulate
success of the enterprise. They are therefore directly linked with live environments
To determine the specific devices that component of security intelligence and includes both the
3a Undertake discovery business objectives that must be met and consequently should
make up the infrastructure, systems and information relevant to protecting an organisation from external Research on the project indicates that the typical tools and
be visible at the highest levels within the organisation. Potentially
services in the ICS environment. and inside threats as well as the processes, policies and tools techniques for conducting technical security testing in ICS
adverse events should appear on the risk register and there should
designed to gather and analyse that information. environments should be used.
To create a schedule of carefully constructed be a clear line of sight between risk identified on the ground and
3b Develop test plan
offline and online tests that are designed to the achievement of business objectives. It is important to be able to
assess the key risks of the ICS environment. make this connection for all stakeholders and ensure there is a good
understanding of the strategic, process and systems context as risk
Conduct technical
To conduct a combination of offline and identified in ICS environments will have relevance at all three levels Integrated risk assessment
“
4 security tests online tests that help to assess the ICS in the organisation. To ensure the approach to testing properly reflects the needs of the
environment in a progressive check-test- organisation, it is important for it to include the risk perspectives
check manner. of process engineers, safety specialists and those working in IT and
5
Analyse and report test
results
To document and report test results that are
aligned to the business objectives and scope
agreed with the ICS environment owner.
Technical security testing of ICS
environments should not take place
in a business vacuum
“ cyber security. Safety specialists and process engineers in particular
often have a deep understanding of the causes and consequences
of risks in ICS environments and can bring a unique perspective to
assessing risk. This is recognised in the NIST document NIST SP800-
While the overall process is generic in nature each step includes 82 (r2) which provides guidance on how to align and integrate the
activities that are unique to technical security testing in ICS perspectives of different stakeholders.
environments. This ensures the specific testing requirements of ICS
By making sure all key stakeholders are part of the risk assessment
environments are met and includes activities such as:
process it is possible not only to improve the nature of any technical
• Attuning technical security testing to the sensitivity security testing that is conducted but also to help promote
of business functions and processes that relate to the its benefits and allay any fears about the possible damaging
ICS environment (eg. by understanding the potentially Focused threat intelligence consequences of poorly executed tests.
adverse consequences of carrying out technical security Threat assessment of the ICS environment should be conducted to
testing and the capability of the incident response ensure there is a good understanding of the threats that apply to The introduction and use of a common risk management
capability that may be required) the specific technologies in use. Threat intelligence, particulalrly that approach such as ISO 31000 would also have the effect
• Employing up-to-date threat intelligence to help inform which is relevant to the target company and the industry sector, of combining different perspectives and would help
the technical security testing approach that is used should be used to help inform judgements about the level of threat introduce a common language for discussing terms such
• Developing the most appropriate mix of offline and in the ICS environment. as ‘threat’, ‘vulnerability’ and ‘impact’.
online tests that are safety and process conscious (eg. by
using a check-test-check method).
20 21
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
“
In response to questions about the importance of methods used To ensure that a chosen technical security testing partner will
in technical security testing respondents indicated their High
rating for:
•
•
Laboratory assessment
Component testing
There is nothing magic about ICS
pen testing, but it does need to be
approached with caution
“ meet your requirements it can be helpful to define a set of supplier
criteria, most of which your chosen supplier should be able to meet
– or exceed. These criteria are:
22 23
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
Part 5 – The way forward can be undertaken effectively within organisations (eg. see
Part 4 – Undertaking technical security testing
These are impediments to the use of technical security testing
and must be tackled to encourage more widespread and effective
Improve foundational elements of ICS in ICS environments). At present there are a number of technical testing. A regular and systematic programme of technical
technical security testing these elements that are not only poorly undertaken but also security testing is essential to help ICS environment owners and
foundational in nature. These elements require urgent attention operators gain assurances that risks are being managed.
There are many different elements of technical testing in to prevent holding back the more widespread use of technical
ICS environments that need to be addressed to ensure it security testing by ICS owners and operators (see Table 2).
CBEST – setting the standard for
Table 2: Foundational aspects of ICS technical security testing technical security testing
Foundational element High-level description CBEST, from the Bank of England, is a common framework that
A - Technical testing The lack of a definitive standard that describes how to conduct technical security testing in ICS environments delivers a controlled, bespoke, intelligence-led penetration test
guidance has led organisations to develop their own in-house approaches that are often piecemeal, largely unproven, against financial institutions’ critical systems. Critical systems are
poorly maintained and do not enjoy the confidence of senior management or other key stakeholders. those which are essential to the well-being of the institution and
the UK financial system as a whole. These tests mimic the tactics,
B - Practitioner support Inadequate peer group support for practitioners on how to conduct technical security testing in ICS
techniques and procedures of threat actors who are perceived by
environments is preventing the virtuous upward spiral of improvement that comes from the dissemination
Government and commercial intelligence providers as posing a
and development of good practice.
genuine threat to systemically important financial institutions.
C - Security maturity The relative immaturity of security practice in many ICS environments makes the uptake of technical security
testing less likely as more fundamental aspects of security are seen as a higher priority. Organisations who Under CBEST the traditional penetration test is augmented by
apply recognised good practice in information security management are more likely to benefit from technical further validation of the knowledge of the penetration tester.
security testing than those that are in poor shape. The quality of threat information is substantially increased by
D - Stakeholder Lack of understanding by key stakeholders such as process engineers, safety specialists and IT support staff of the inclusion of specific and targeted threat information from
education the value and importance of technical security testing is likely to hold back the introduction and wider use of specialist suppliers. This information will allow the penetration
technical security testing. tester to simulate more closely real life attacks from competent
adversaries. In addition, the cyber security maturity assessment
E - Management There is often inadequate financial and organisational support from ICS environment owners for undertaking
provides KPIs that will help to benchmark the ability of the
support technical security testing. Management support is required to provide the organisational context for risk
organisation to detect and respond to such attacks.
management.
CBEST sets the highest standard for technical security testing in
financial institutions. It is intended that the approach developed
in CBEST is used to help develop similar approaches for other
parts of the critical national infrastructure.
24 25
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper
Foundational element Examples Possible actions At present many organisations are not able to demonstrate Conclusions and recommendations
that these elements are solidly in place and therefore are poorly
A - Technical testing • Widely recognised technical security testing standard for A standard, or similar document, for undertaking This Position Paper sets out the business background and security
positioned to undertake effective technical security testing. Given
guidance organisations and individuals to follow technical security testing in ICS environments challenges that ICS owners face in managing the risks to their ICS
the pace of change in ICS environments this is unsurprising and
• Standards-based implementation advice including reference should be developed for use in all relevant ICS environment operators require more support across the board environments. There is a pressing need to improve security in ICS
models, architectural patterns and ‘how to’ guides industry sectors. environments and technical security testing has a significant role to
and also in the form of guidance, promotion and awareness raising
• Accreditation service for organisations providing technical The standard that is developed should be play in ensuring this is achieved. ICS environment owners require
before they are able to fully address these foundational elements.
security services supported by implementation advice to assist assurances that risk is being identified, assessed and evaluated.
“
should be used in ICS environments guidance on how to secure ICS environments – particularly those strength of measures to resist attack.
body such as CREST. that make up part of a nation state’s critical national infrastructure.
• Up-to-date threat intelligence that is relevant to the industry,
organisation and technology that is in use in the ICS Regulatory bodies, particularly those in utilities, This work has included very little on technical security testing and
should be encouraged to take a more active assurance and consequently there is still a poor understanding of its
role in helping foster the development of value and importance. In fact if there is any common message about ICS owners are caught in a cleft stick
practitioners with the requisite skills. technical security testing that has made its way into the collective – they want assurances that cyber
C - Security maturity •
•
Accurate recording of the scale, scope and inventory of the
ICS infrastructure
Defined security architecture with layered defences,
established procedures and practices and effective
Organisations should consider reviewing
their current status of ICS security against
established guidelines such as those from
NIST and ISA. ICS security assessment services
can also be obtained from CREST Members
thinking of ICS environment owners and operators it is that it can be
dangerous and should be conducted with extreme caution.
26 27
CREST balanced scorecard
CREST offers public and private sector organisations a level of assurance that the technical security
advisors they appoint are competent, qualified and professional with current knowledge. It also
ensures that the companies they engage with have the appropriate processes and controls in
place to protect sensitive client-based information.
Warning
This Guide has been produced with care and to the best of our ability.
However, CREST accepts no responsibility for any problems or incidents arising from its use.