0% found this document useful (0 votes)
267 views15 pages

CREST Industrial Control Systems Technical Security Assurance Position Paper

IS for Industrial Control Systems

Uploaded by

waleed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
267 views15 pages

CREST Industrial Control Systems Technical Security Assurance Position Paper

IS for Industrial Control Systems

Uploaded by

waleed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Industrial Control Systems

Technical Security Assurance


Position Paper
ICS Technical Security Assurance Position Paper

Published by:
CREST
Tel: 0845 686-5542
Email: [email protected]
Web: http://www.crest-approved.org/

Principal Author Reviewer Principal reviewer


Andrew Wilson, Jason Creasey, Ian Glover,
Jerakano Limited Jerakano Limited CREST

The UK National Cyber Security Centre contributed to the production of this document, which encapsulates
the diverse views of the Industrial Control System community and proposes a model for gaining assurance in
ICS environments. The NCSC believes this paper provides a valuable contribution to the current thinking on this
challenging topic and we look forward to working with CREST, as well as ICS operators and the cyber-security
industry in the UK in order to make the UK the safest place to live and do business online.

Acknowledgements
CREST would like to extend its special thanks to those CREST member organisations and third parties who took
part in interviews and participated in the workshops.

Warning
This Guide has been produced with care and to the best of our ability. However, CREST accepts no responsibility
for any problems or incidents arising from its use.
© Copyright 2017. All rights reserved. CREST (GB).

DTP notes
For ease of reference, the following DTP devices have been used throughout the procurement Guide.

A Good Tip

! A Timely Warning

Quotes are presented in bold, blue italics, like this.


2 3
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Key findings A practical technical security testing process for ICS environments
The key findings from research into the technical security assurance of Industrial Control System (ICS) environments conducted with As part of this project, a practical technical security testing process for ICS environments has been developed and is shown in Figure 1 below.
subject matter experts and specialist security testing organisations are shown below.

Stage Indicative activities


In the absence of periodic standards-based technical security testing, ICS environment owners and operators have
1 no objective way of gaining assurance that cyber risk is being adequately managed. •  efine business purpose of engagement
D
• Determine sensitivity of business functions and processes
1 Define and agree scope • Create and agree ICS business process model
ICS environments are rapidly changing (eg. due to process optimisation, Information Technology (IT) / Operational • Confirm specific systems, devices and infrastructure in scope

2 Technology (OT) convergence and technology evolution) and this is leading to a higher degree of exposure and a
• Confirm composition of testing team

risk profile that is characteristic of conventional IT environments.


•  ather threat intelligence
G
• Conduct threat modelling exercise
Securing ICS environments in many organisations is technically demanding and difficult to undertake (obscure
3 and often obsolete technology, limited resources, high degree of sensitivity).
2 Assess risks • Determine major vulnerabilities
• Assess risks and prioritise
• Agree risk-based approach to testing

Technical security testing specialists regard inadequate management support (eg. lack of budget, poor resourcing,
4 low risk appetite) as the most important factor affecting the ability to secure ICS environments and undertake
technical security testing activities. •  onduct ICS device discovery exercise
C
Undertake discovery • Determine network topology
3a
• Gather and review ICS network and device configuration information
ICS security standards and guidelines are evolving but currently contain little information to directly help technical • Create and agree ICS technical infrastructure model
5 security testers. At present there is no definitive standard for technical security testing in ICS environments that is
mandated by regulatory bodies.

•  reate test scenarios


C
To ensure the approach to testing properly reflects the needs of the organisation, it is important for it to include
6 the risk perspectives of process engineers, safety specialists and those working in IT and cyber security. 3b Develop test plan


Determine offline and online tests
Determine resource requirements
• Create and agree progressive test schedule

Multi-disciplinary testing teams should be assembled for ICS technical security testing consisting of members
7 with different testing skills, knowledge and perspectives on risk management (such as resident process engineers,
safety specialists and IT staff ).
Conduct technical
4 security tests
• Undertake and document offline and online tests
Because of the unique technologies, critical processes, and sensitive testing requirements there is a higher
8 demand placed on the skills, knowledge and situational awareness of technical security testers working in ICS
environments, as opposed to conventional IT environments.

Technical security testing approaches should be intelligence-led, threat-scenario based, draw on well–established • A nalyse test results and condolidate findings
9 technical security testing principles and where possible use red teaming concepts. 5
Analyse and report test • Document ICS environment remediation recommendations
results
• Review findings with key stakeholders

Promotion of the importance of technical security testing needs to be carried out so that ICS environment owners, Figure 1: A practical technical security testing process for ICS environments
10 process engineers and safety specialists have a better awareness of the importance of technical security testing in
the management of cyber risk.
The ICS technical security testing process is described in more detail in Part 4 –
Undertaking technical security testing in ICS environments.

4 5
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Table of contents Part 1 – Introduction Purpose and scope


and overview The purpose of this Position Paper is to set out the main challenges
Part 1 - Introduction and overview 7 and possible solutions for gaining technical security assurance of
About this Position Paper Industrial Control Systems. It provides the basis for further work on
• About this Position Paper 7 This Position Paper presents the findings from a CREST project the development of detailed guidance material that can be used by
• Audience 7 on the Technical Security Assurance of Industrial Control Systems specialists to help secure ICS environments and in particular those
(ICS). This document is based on detailed research and includes that make up the Critical National Infrastructure.
• Purpose and Scope 7
insights, commentary and analysis garnered from subject matter
• Rationale 8 experts through: The main requirements of this project are laid out in Table 1,
together with the part(s) of this Position Paper where more detail
• Applicability 8 • Requirements and validation workshops held at CREST can be found.
member facilities
Table 1: Project requirements
Part 2 - Setting the scene 9 • Desktop review of published literature on ICS security
• The changing nature of ICS environments 9 and ICS security testing Requirement Detail
Understand the context for the technical security
• Key issues in ICS security 10 • Structured interviews with subject matter experts on ICS Part 2
assurance of ICS environments
• Difficulties in conducting technical security tests 11 security
Learn about the challenges that organisations
• Standards and guidance 11 • Review of the US Department of Homeland Security face with in gaining technical security assurance Part 3
(DHS) and the UK Centre for the Protection of National of ICS environments
• The need for ICS risk assurance 13
Infrastructure (CPNI) document Cyber Security Consider a practical approach to gaining
Assessments for Industrial Control Systems assurance of the technical security of ICS Part 4
Part 3 – Technical security assurance of ICS environments 15 environments
• Analysis of the input pack on ICS security and ICS technical
Review the next steps that need to be taken to
• Important elements in technical security testing 15 security assurance that was completed by workshop
foster the uptake of technical security testing in Part 5
participants and members of the project review group.
• Business assurance 16 ICS environments

• Education, training and knowledge sharing 16 The scope of this Position Paper has been restricted to focus on the
• Technical capability 16 Throughout the Position Paper you will find tips, main topics related to technical security assurance of ICS environments
warnings and quotes provided by a diverse set of that have emerged from the project research. It has therefore not
• Infrastructural environment 17 contributors, including expert suppliers (such as included topics that are either very generic or very specific, such as:
many CREST members), consumer organisations,
government bodies and academia. These bring • Penetration testing in general, which is covered in
Part 4 – Undertaking technical security testing in ICS environments 18 separate CREST guides (see www.crest-approved.org)
real-world, practical experience to the Position
• A practical technical security testing approach 18 Paper, allowing you to get a better feel for the • Hazard operations and safety culture in ICS
types of action that are most likely to apply to your environments
• Business process sensitivity 20
organisation. • In-depth analysis of infrastructure, devices and protocols
• Focused threat intelligence 20 in ICS environments
• Integrated risk assessment 21 • The specific technical security tests to be used in ICS
• Proven tools and methods 21 Audience environments
This Position Paper is aimed at organisations in both the • The operation of technical security testing tools
• Qualified technical security testers 22
private and public sector. Project research has revealed that the typically used by commercial technical security testing
• Combined testing teams 23 main audience for reading this Position Paper is IT managers, organisations.
information security managers and technical security testing The material in this Position Paper will provide valuable input to
specialists. It should also be of interest to process engineers, safety many of these topics, any of which could be the subject of a future
Part 5 – The way forward 24 specialists, business managers, procurement specialists and IT research project.
• Improve foundational elements of ICS technical security testing 24 auditors.

• Increase promotion and awareness 27


• Conclusions and recommendations 27

6 7
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Rationale
This Position Paper is based on the findings of a research project
- conducted by Jerakano Limited on behalf of CREST – which
This Position Paper complements existing CREST
reports that have been produced on penetration
testing that can be found on
Part 2 – Setting the scene
The changing nature of ICS environments “ Because ICS is widespread and
the dependency is very high, the
prospect of a successful, universal
looked at the requirements organisations have to undertake
technical security assurance of ICS environments.

!
The increased connectivity of ICS environments
and their use of conventional IT infrastructure
http://www.crest-approved.org.

Project research
The research on this CREST project included:
Industrial control systems are deeply embedded in many
different industry sector organisations and play a vital role in
organisations that make up the critical national infrastructure of
most countries (eg. energy, water, transportation). Historically the
relative isolation and specialised nature of ICS environments has
attack propagating is particularly
alarming to those responsible for
critical infrastructure

helped to ensure exposure to attack has been relatively low. This
components and protocols has enlarged the • Performing desktop research on many different sources has changed in recent times with an increase in the connection
attack surface that can be exploited by ever more of information of ICS environments into the wider corporate network of many
sophisticated cyber security attackers, such as
• Conducting telephone interviews with key stakeholders, organisations (eg. to support business process efficiencies) and
state-sponsored attacks, organised cybercrime
the greater use of more conventional IT technologies (eg. to lower
and extremist groups.
such as CREST members and clients ICS incidents are real
costs associated with support and maintenance).
• Site meeting with CESG (now National Cyber Security
Centre) and CPNI to discuss feedback on the report Incidents in ICS environments are real and there is now a
The objectives of the CREST Industrial Control Systems Technical For the purpose of the project, the definition of an Industrial
Cyber Security Assessments of Industrial Control strong body of evidence that critical infrastructure is a target
Security Assurance project were to help organisations: Control System provided by NIST in SP.800-82r2 Guide to Industrial
Systems – A Good Practice Guide not only of adversarial nation states but also of determined
Control Systems (ICS) Security has been adopted.
• Make their ICS environments more difficult for cyber • Running two large workshops where experts in technical and skilled criminal attackers. Many will have heard of the
security adversaries to attack security testing from more than 30 organisations determined A device, or set of devices, Supervisory Control and Data major ICS incidents that have made the press in recent years
the scope of the project, validated the findings of this that manages, commands, Acquisition (SCADA) refewrs such as the Ukranian power plant hack. the Stuxnet attack
• Reduce the frequency and impact of cyber security
Position Paper and provided additional specialist material. directs or regulates to an industrial computer on the Iranian Nuclear facilities and the German steel mill
incidents affecting ICS environments
the behaviour of other system that monitors and incident and also possibly the emergence of ICS-focused
• Complement existing security guidance and standards
devices or systems. controls a process. malware such as Havex and Dragonfly. Unfortunately the
aimed at securing ICS Applicability media storm that has surrounded these isolated indicators has
• Meet compliance requirements and corresponding test Industrial Control Systems, particularly those that form part of the Industrial Control System (ICS) is a general term that in some respects been misleading as it has detracted from an
procedures Critical National Infrastructure, are high risk and high business encompasses several types of control systems used in overall picture that is far bleaker. In reality many organisations
• Familiarise themselves with cyber security attacks and impact and consequently require the highest level of technical industrial production, including supervisory control and data with ICS environments are unclear what level of threat they
the measures that are required to counter these threats. testing (see Figure 2). acquisition (SCADA) systems, distributed control systems face or whether they have already been breached. In 2015
(DCS), and other smaller control system configurations such SANS surveyed 314 respondents on security in their ICS
The work on the project also covered elements of cyber security The STAR and Penetration Testing services shown in Figure 2 as programmable logic controllers (PLC) often found in the environments. The results of this survey revealed that:
threat analysis; cyber security intelligence; penetration testing; are supported by comprehensive codes of conduct for both the
technical and management assurance techniques; detailed network industrial sectors and critical infrastructures.
company and the individual.  These codes are used to ensure the • 32 % indicated their control system environments or
and infrastructure monitoring; and cyber security incident response. quality of the services provided, the integrity of the companies networks had been infiltrated or infected at some point
Computer-based solid-state
and individuals and adherence to audited policies, processes and devices that control industrial • 34% believe their systems had been breached more
The project included a detailed review of the DHS / CPNI
procedures.  This provides a significant level of protection for any equipment and processes. than twice in the past 12 months
document Cyber Security Assessments of Industrial Control
organisation procuring these types of services.
Systems – A Good Practice Guide. • 15% reported needing more than a month to detect
As connectivity and access have increased and a better a breach
We deliver schemes that align to industry requirements understanding of ICS infrastructure has become more
• 44% were unable to identify the source of the infiltration.
High Levels of Assurance.
widely known this has led to an increase in the attack
Aligned to industry surface of ICS environments and an increased likelihood of Furthermore when asked about the source of attacks
Simulation of known industry threats
CREST malicious activity. The consequences of attack could be very respondents indicated that:
damaging, particularly in the case of critical infrastructure,
STAR
Simulated Target so it is important to ensure ICS environments are protected. • 42% saw external actors as the top 1 threat vector
Attack & Response
Technical security assurance is a vital element of the range • 19% saw integration of IT and OT as the top threat vector
Objective focused
Penetration Test of measures required to fully protect ICS environments
• 11% saw insider threats as the top 1 threat vector.
Defined Scope Penetration Testing
and will help ensure organisations are able to identify and
remediate vulnerabilities that could be exploited. Frequent From these findings it is clear that ICS environments have
Basic Levels of Assurance. technical security assurance provides stakeholders, both
Vulnerability Analysis Alignment with schemes such never been more exposed to external attackers and they are
as Cyber Essential. inside and outside the organisation, with objective fact-
No specific industry orientation using new points of ingress introduced through increased use
based information on what remediation is required, why it is
of conventional IT to carry out attacks.
required and how it should be applied.
Figure 2: CREST assurance schemes

8 9
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

!
Interviews with subject matter experts has revealed
that major incidents affecting ICS environments
often go unreported. While this may be for sensible
commercial and / or national security reasons
it does make it difficult to provide an accurate


Use of home-brew testing approaches typically
assembled from well known sources (eg. NIST SP.800-82r2)
Lack of accurate information on the devices in ICS
environments
Need for vendors to do more to secure their products in
Each of these factors alone makes achieving an acceptable level
of security in ICS environments difficult. Collectively they create a
formidable set of challenges that need to be addressed in order
to manage risk. For technical security testers understanding this
background in an ICS environment is important as most of these
“ Every ICS is unique. Every ICS is
different. You have to learn what’s
going on in your one


factors are both fundamental in nature and highly interrelated.
ICS environments.
view of the level of risk faced by organisations
- particularly those that are part of the Critical Research helped to identify the relative importance of these In response to research probing the use of technical security
National Infrastructure. Improved reporting and the factors. There was a Very High level of agreement that testing in ICS environments, respondents indicated their Very
more widespread sharing of incident data within The devices market is dominated by Inadequate management support is a key factor. All other
organisations and across the supply chain would
help to address this shortcoming.

While aspects of ICS environments are unique it is increasingly


a small number of vendors. Vendors
in the ICS field do not enjoy a great
reputation for security
“ factors recorded a High level of agreement from participants
apart from High degree of technical complexity and
obscurity and Insufficient help with what ‘good’ looks like
which recorded a Medium level of agreement.
High level of agreement with the:


Need to proceed with a high degree of caution during
technical security testing of ICS environments
Requirement for the use of qualified testers and the use of
testing techniques that are different from the conventional
the case that, with the adoption of conventional IT technology, In general soft skill factors are regarded as being more important
ICS technical architecture is becoming less obscure and easier to than hard skill factors in the extent to which they affect the ability • Lack of an authoritative approach for testing the security
understand and manage. to secure ICS environments. It should be noted that this may in ICS environments

Subject matter experts that were interviewed for reflect the advanced skill-set, experience and technical confidence • Need for more widespread training and education in ICS
Research conducted by the project into the challenge of securing
ICS environments revealed respondents Very High level of
! the project have pointed to the current lack of of participants who were predominantly drawn from a technical
security testing background.
security and technical security testing of ICS environments
adequate ICS-related technical security architecture • Requirement to provide technical assurance of ICS
agreement with the: environments.
reference models available in the public domain.
They confirmed that practitioners would benefit Difficulties in conducting technical
• Disappearance of the air gap as a viable control
from having access to a greater variety of industry- security tests There was a High level of agreement with the:
• Difficulty in obtaining suitable log data for attack analysis
specific types to help compare and improve their
and forensics. Because of the high sensitivity of many ICS environments, extreme
own measures. • Requirement for technical security testers to have a good
caution must typically be exercised in conducting technical security
tests. It is important to carefully consider the type and nature of knowledge of process environments and the unique
There was a High level of agreement with the: protocols and devices in ICS environments.
technical security testing that can be undertaken and test analysts
Key issues in ICS security should make use of a broad range of methods and alternative
• Reluctance of ICS environment owners and process
engineers to allow IT and security people access to ICS Project research helped to identify 9 main factors that could affect approaches as part of their testing methodology. In contrast with
Standards and guidance
environments for security testing purposes the ability to secure ICS environments (see Figure 3). conventional IT environments, ICS environments typically place
a higher value on ‘availability’ than ‘integrity’ or ‘confidentiality’. There are many standards and guidance related documents
This requires a different approach to technical security testing. available to help organisations in the management of security in ICS
Conventional technical security tests that are invasive in nature or environments. The work of the International Society of Automation
place a burden on the network may inadvertently cause damaging (ISA) has been particularly important in this area and has provided
Inadequate the basis for the development of the International Electrotechnical
1 management support 4 Merging of IT and OT 7 Increasingly large loss of service events and should be avoided. For example, where
attack surface a ‘ping sweep’ might be used in a conventional IT environment to Commission (IEC) IEC 62443 set of standards on ICS security that have
help identify hosts and nodes it might be more appropriate in an been published or are due to be published over the coming years.
Cultural barriers and High degree of ICS environment to examine router configuration files or even to Industry sector specific guidelines have also been produced to help
Insufficient help with technical complexity
2 resistance to change 5 what ‘good’ looks like 8 trace the physical wires for confirmation of connections. address the particular concerns of specific industries (eg. chemical,
and obscurity
power generation, water). Within the UK the Centre for the Protection
Testers need to understand the technologies that are unique to of National Infrastructure (CPNI) has created a range of documents that
Poor awareness of Difficulty in ICS environments, the processes that could be affected by testing cover the broad spectrum of key issues that need to be addressed to
Shortage of skilled undertaking technical
3 changed risk profile 6 resources 9 and the types of tests that can be used most effectively. This secure ICS environments (eg. Security for Industrial Control Systems - A
tests - super sensitivity
places a higher demand on the skills, knowledge and situational Good Practice Guide).
awareness of the tester. It calls for specialist individuals that are
supported by a well-founded methodology.
Soft skill factors Hard skill factors

Figure 3: Factors that make ICS security difficult

10 11
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

“ There is a need to encourage people


to conduct technical security tests
more regularly to a specific standard
“ Note: A detailed review of the main ICS security standards and
guidance documents that are currently available has been
conducted as part of the project and can be found in the
document CREST ICS Technical Security Assurance – Research
documents, which is available upon request from CREST.

ICS security standards and guidelines Cyber Security Assessments for


An extensive number of ICS security standards and guidelines were Industrial Control Systems
analysed as part of the project research and some of these are
summarised below. The purpose of this guide from the US Department of
IEC 62443: Industrial communication networks - Network Homeland Security and the UK Centre for the Protection of
and system security National Infrastructure is to ‘educate asset owners on the
A newly emergent international standard for securing ICS general process of a cyber security test and provide insight
environments based on ISA99. The primary goal of the IEC 62443 on specific testing methods so owners learn to prescribe a
series is to provide a flexible framework that facilitates addressing custom assessment that will maximise the output of their
current and future vulnerabilities in Industrial Automation and testing budget’.
Control Systems and applying necessary mitigations in a systematic,
defensible manner. The full set of documents that make up this As an educative document it largely achieves this goal but
standard are still under development and will not be completed for it does not contain sufficient detail in the process or any
a number of years. At present there is no direct coverage of technical measurement or assessment criteria that would enable
security testing but a number of documents in the series may be practitioners to clearly determine the make-up of an effective When undertaking any testing in ICS environments it is important
relevant to the development of a technical security testing approach.
While guidance, standards and good
ISA99: Industrial Automation and Control Systems Security
cyber security assessment in an ICS environment.
! practice on ICS security in general have been
to be aware of the different stakeholders that could be involved
and the different drivers and motivations that they have that could
A series of standards, technical reports, and related information that The guide is useful for those individuals who are new to ICS available to practitioners for many years affect the assessment. ICS environment owners, process engineers,
define procedures for implementing electronically secure Industrial security and want to understand more about cyber security these sources of information have included safety specialists and security practitioners will typically have
Automation and Controls Systems (IACS). These documents testing in these environments. Despite being aimed at ‘asset very little on how to undertake technical different perspectives of the risk related to an ICS environment and
form the basis of IEC 62443 and their purpose is to improve the owners’ (an undefined term in the document) it is most security testing of ICS environments. consequently will have different expectations about the types of
confidentiality, integrity, and availability of components or systems likely to appeal to process engineers who have the time and test that should be conducted and the nature of the assurance they
used for manufacturing or control and provide criteria for procuring inclination to read a relatively long document and want to require. This is particularly the case in the absence of any recognised
and implementing secure control systems. understand the broad sweep of issues associated with testing The need for ICS risk assurance standard for undertaking technical security testing or a regulatory
NIST SP.800-82r2 Guide to Industrial Control Systems ICS security. directive on technical security testing.
(ICS) Security Business leaders require assurance that risk in ICS environments that
Parts of this document (eg. an improved version of the could affect the operation of critical business processes is being
A comprehensive document that is well structured and threat
process) could be incorporated into either 1) a framework managed effectively. Systematic and rigorous technical security
/ vulnerability / controls oriented. The document provides a Guidance on how to align and integrate the
for ICS technical security testing, 2) a procurement guide for testing helps clarify the security status of ICS environments and
notional overview of ICS, reviews typical system topologies and perspectives of different stakeholders on assessing
architectures, identifies known threats and vulnerabilities to these ICS technical security testing services, and 3) to help create plays a key role in the identification, assessment and remediation
and managing risk in ICS environments can be
systems, and provides recommended security countermeasures to awareness raising and training material. of cyber risk – a key part of the risks that can affect organisations.
found in the document NIST SP.800-82(r2).
mitigate the associated risks. By reporting cyber risk, business leaders have a ‘clear line of sight’ to
risks that require remediation and ensure they are able to meet the


CPNI Security for Industrial Control Systems – A Good obligation that comes with high office.
Practice Guide Technical security testing is a key element of ICS Risk Assurance
but it is only one aspect and proper consideration needs to be
A framework of documents that address the core issues in securing
given to the other constituent elements that are required in an
ICS environments. This framework is primarily intended for those
Executives do not necessarily overall framework (see Figure 4).
who are directly responsible for securing ICS, whether they are
looking to establish a new programme or complement one that
already exists. It will assist ICS professionals in improving their
knowledge of security as well providing IT professionals with
insight into ICS environments. Senior leaders in an organisation
are informed about the rationale for establishing an ICS security
understand the problem. People on
the ground get it but there seems to
be something lost in translation

capability and the activities required to secure ICS environments.

12 13
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

ICS Risk Assurance Part 3 – Technical security


assurance of ICS environments All of these elements are important and have significant
implications for how technical security testing in ICS environments
Important elements in technical is conducted (eg. the use of a standard assurance approach, support
Assurance security testing and guidance on how to undertake technical security testing,
Techniques Evaluation specialist skills in technical security testing). It is therefore important
Structured interviews conducted with subject matter experts and
technical security testing specialists helped to identify a number to ensure that any approach to technical security testing of ICS
of important elements that need to be addressed as part of an environments adequately addresses the underlying issues related to
gives evidence of these elements.
effective ICS technical security testing approach (see Figure 5).
produce Assurance

Owners
giving
Threats

using
require Management
Confidence Vulnerabilities Assurance Support Criticality

in require

Countermeasures Merging of IT Awareness


and OT

to minimise ICS technical


testing
Risk
Changing risk Advice and
profile guidance
to

Assets

Technical Technical Technical


Testing Complexity skills

ICS Risk Assessment


Figure 5: Important elements in technical security testing of ICS environments
Figure 4: The elements required to provide ICS risk assurance
These themes are grouped by:

Business assurance – Assurance; Management support; Criticality


For ICS environment owners to have confidence in the clear or inadequate or where there is no systematic programme of
countermeasures that are in place to manage risk, it is necessary Evaluation the ICS Risk Assurance process will be less valuable. Education, training and knowledge sharing – Awareness; Advice and guidance; Threat status
to have effective Assurance Techniques and a programme The same holds true where the scope of an ICS environment (ie.
of Evaluation. The process of assessing countermeasures can Assets) is unclear or poorly defined or where Threats are not Technical capability – Technical security testing; Technical complexity; Technical skills
be achieved with a clear understanding of the Threats and fully analysed. All elements are necessary and essential to provide
Vulnerabilities that apply to the ICS environment and the Risk Technical Security Assurance to management; where any Infrastructural environment – Merging of IT and OT; Changing risk profile
that needs to be mitigated. Where Assurance Techniques are not element is missing this will lead to weakness in the approach.

14 15
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Business assurance Research on the project showed that in response to questions The increased connectivity of IT and OT has also altered the

ICS environment owners require assurance that there is adequate


about the knowledge testers require to conduct technical security ICS-CERT Cyber Security risk profile of ICS environments. The gradual growth in remote
testing in ICS environments, respondents indicated that there was connectivity and connection to the corporate network has served
protection in place to manage the risk of cyber security incidents a Very High level of agreement with the need for Technical Evaluation Tool to increase the attack surface. Previously isolated OT environments
however there is often reservation about approving tests that knowledge and a High level of agreement with the need for that would have been difficult to attack are now exposed to
could possibly be disruptive. In order to achieve this:


Domain knowledge and Process knowledge. The Cyber Security Evaluation Tool (CSET) from the US ICS-CERT the same level of malicious activity that affects conventional IT
is a no-cost, voluntary technical assessment which provides a environments. This potentially broadens the scope of any technical
• Technical security assurance activities should be
snapshot of an organization’s cybersecurity posture. It helps security testing that is required and necessitates the need for


business-led and signed off upon successful completion
(ie. there is a clear line of sight to corporate risk
management activities)
Technical security assurance activity must be
aligned with the risk appetite and risk attitude of the
Best practice in ICS technical
security testing needs to be
shared more effectively
“ ICS environment owners and operators assess cybersecurity
strengths and weaknesses within their control system
environments and can also be used to assess traditional IT
infrastructure.
greater situational awareness and more use of threat modelling
and intelligence-led testing (see Part 4 - Undertaking technical
security testing in ICS environments).

The infrastructural environment challenges in developing an


The CSET exists as a downloadable application (free of charge),
organisation; it should reflect the criticality of processes, effective ICS technical security testing approach concern the:
which can be installed locally on a standalone workstation
systems and information of the ICS environment
or laptop. Once installed, the tool guides an ICS environment • Convergence of IT and OT in ICS environments and what
• Reliable, effective and transparent technical security
assurance processes and procedures must be in place
Technical capability owner through a step-by-step process to assess their this means for technical security assessment
environment, based upon a series of questions derived from
(eg. documented test plans) Modern ICS environments typically include a combination of • Changing risk profile of ICS environments and how
industry recognized standards, guidelines, and best practices
• Management support is required to approve and information technology (IT) and operational technology (OT). this affects the tests that should be conducted, the
(eg. NERC CIP-002 through CIP-009 Rev 4).
support technical security testing. While well-established methods, tools and techniques exist to frequency of testing and the visibility of reporting.
assess technical security in IT environments this is not the case in Once the questions are answered, CSET provides a graphical
OT environments where legacy technology, obscure protocols, a representation, identifying areas of strength and weakness,
Education, training and knowledge heightened degree of sensitivity and a widespread reluctance to as well as a prioritised listing of options for increasing the
sharing test has hampered the development of good practice and held organisation’s overall cybersecurity defence-in-depth.
back the emergence of effective ‘play books’. It makes it more likely
Key stakeholders such as ICS environment owners, process
that periodic ‘errors’ will occur in testing as the best ways of working
engineers, safety specialists, IT staff, and cyber security specialists
require a good understanding of the unique challenges associated
and the best tools are not shared and refined. Infrastructural environment
with securing ICS environments. It is also important that they As IT and OT increasingly converge in ICS environments this
An effective technical security testing approach must address the
are aware of the strengths and weaknesses of technical security creates new challenges not only for solution architects, designers
technical capability challenges that concern the:
testing in ICS environments. To achieve this there needs to be: and implementation teams but also for technical security testers.
• Technical security testing tools that should be used and For example the use of network scanners in OT environments is
• Education and awareness programmes in place to help the technical security testing techniques that should be problematic and can be disruptive or even cause devices to fail.
key stakeholders understand the importance of securing applied in ICS environments (eg. intelligence-led testing) Network security products designed to work within IT environments
ICS environments and the use and benefit of technical have not been prepared to work within an OT world that operates
• Technical complexity of ICS environments and the need
within more exacting communication parameters.


security testing
to understand the infrastructure and entities that make
• Access to industry advice and guidance for technical up the ICS architecture
security testers and other security practitioners to help
• Technical skills of testers and the organisations for whom
improve and refine their approach to technical security
they work.
testing (eg. through a definitive guide to conducting Technical security testing in
In response to questions about the types of tools and techniques


technical security testing in ICS environments) and
situational awareness
Effective sharing of up-to-date information on threats
and vulnerabilities (e.g, such as that provided by CERTUK
for incident information) both inside organisations and
used in ICS technical security testing, respondents rated the use of
Architectural review, Configuration review, Port scanners and Packet
sniffers as Very High. In terms of methods used in technical security
testing of ICS environments Laboratory assessment, Component
testing, Staff interviews and Risk assessment were rated as High.
the enterprise IT space is well
understood but there is little
advice in the ICS world and many
environments are not assured

along supply chains.

16 17
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Part 4 – Undertaking technical security testing in ICS environments


A practical technical security testing approach
Project research identified a variety of possible approaches to conducting technical security testing. Feedback from subject matter experts
confirmed that the overall context for all technical security testing should be provided by ICS environment owners (eg. all technical security
testing should be business-led) and that the approach should be standards based (see Figure 6)
Business-led
Responding to the business drivers, governance
requirements and assurance needs of the organisation

Combined testing teams Business process sensitivity


•  efine business purpose of engagement
D
• Process engineers • Determine sensitivity of business functions and processes • Strategic context
• Safety specialists 1 Define and agree scope • Create and agree ICS business process model
• Process context
• Confirm specific systems, devices and infrastructure in scope
• IT experts • Confirm composition of testing team • Systems context
• Technical testers
•  ather threat intelligence
G
• Conduct threat modelling exercise
2 Assess risks • Determine major vulnerabilities
• Assess risks and prioritise
• Agree risk-based approach to testing

•  onduct ICS device discovery exercise


C
Qualified technical security testers 3a Undertake discovery • Determine network topology Focused threat intelligence
• Gather and review ICS network and device configuration information
• Create and agree ICS technical infrastructure model
• Experienced • Industry specific
• Knowledgeable • Company specific
• Professional •  reate test scenarios
C • Technology specific
• Determine offline and online tests
3b Develop test plan
• Determine resource requirements
• Create and agree progressive test schedule

Conduct technical
4 security tests • Undertake and document offline and online tests

Proven tools and methods Integrated risk assessment


• A nalyse test results and condolidate findings
Analyse and report test
• Offline testing 5 results • Document ICS environment remediation recommendations • Process risk
• Review findings with key stakeholders
• Online testing • Safety risk
• Red teaming • Security risk

Standards-based testing process


A consistent approach to ICS technical testing that is
Figure 6: A practical technical security testing approach for ICS environments transparent, free to use and supported by industry

18 19
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

The overall process is generic in nature and similar to many well- There are also six defining characteristics that set this approach
established technical security testing approaches. It should be apart from conventional technical security testing, which are:
Threat intelligence
sufficiently flexible to be easily adapted as required to meet the unique
requirements of each different testing scenario. It is also important for • Business process sensitivity Proven tools and methods
Threat intelligence, also known as cyber threat intelligence (CTI),
the process to be straightforward and easy to follow for all stakeholders. • Focused threat intelligence While as a general rule online technical security testing in ICS
is organised, analysed and refined information about potential
This will help in demystifying the activity of technical security testing environments should be used with caution there are a variety of
• Integrated risk assessment or current attacks that threaten an organisation.
and aid effective communication about the engagement. The six key measures that can be taken to ensure services are aligned with the
• Proven tools and methods One of the primary purposes of threat intelligence is to help needs of the client and the risk of disruption is minimised. These
steps of the process and their main objective are:
• Qualified technical security testers organisations understand the type, nature, severity, source include:
Step Main objective • Combined testing teams. and origin (eg. nation-state, criminal gang, cyber activitst) of
threats that are either directly or indirectly targeted at their • Using business-based test scenarios
To agree a clear business-based scope • These characteristics of technical security testing in ICS
1 Define and agree scope
for the technical security tests aligned environments are described below. environment. • Exploiting the domain knowledge of in-house process
to the strategic, process and system engineers and safety specialists
In the case of ICS environments threat intelligence that is most
requirements of the organisation. relevant to the organisation will come from a wide variety of • Employing a progressive check-test-check approach that
sources including the dark web, inside industry sources, open is safety conscious
To explore the main threats and
2 Assess risks source monitoring, government sources and hacking forums. • Commencing with manual tests before moving to
vulnerabilities of the ICS environment Business process sensitivity In a military, business or security context, intelligence is
automated tests
and determine the key risks and likely risk ICS environments are part of business processes that typically
information that provides an organisation with decision support • Exploiting wherever possible offline, pre-production,
scenarios to be tested. need to operate effectively and without interruption to ensure the
and possibly a strategic advantage. Threat intelligence is a development or test bench environments to simulate
success of the enterprise. They are therefore directly linked with live environments
To determine the specific devices that component of security intelligence and includes both the
3a Undertake discovery business objectives that must be met and consequently should
make up the infrastructure, systems and information relevant to protecting an organisation from external Research on the project indicates that the typical tools and
be visible at the highest levels within the organisation. Potentially
services in the ICS environment. and inside threats as well as the processes, policies and tools techniques for conducting technical security testing in ICS
adverse events should appear on the risk register and there should
designed to gather and analyse that information. environments should be used.
To create a schedule of carefully constructed be a clear line of sight between risk identified on the ground and
3b Develop test plan
offline and online tests that are designed to the achievement of business objectives. It is important to be able to
assess the key risks of the ICS environment. make this connection for all stakeholders and ensure there is a good
understanding of the strategic, process and systems context as risk
Conduct technical
To conduct a combination of offline and identified in ICS environments will have relevance at all three levels Integrated risk assessment


4 security tests online tests that help to assess the ICS in the organisation. To ensure the approach to testing properly reflects the needs of the
environment in a progressive check-test- organisation, it is important for it to include the risk perspectives
check manner. of process engineers, safety specialists and those working in IT and

5
Analyse and report test
results
To document and report test results that are
aligned to the business objectives and scope
agreed with the ICS environment owner.
Technical security testing of ICS
environments should not take place
in a business vacuum
“ cyber security. Safety specialists and process engineers in particular
often have a deep understanding of the causes and consequences
of risks in ICS environments and can bring a unique perspective to
assessing risk. This is recognised in the NIST document NIST SP800-
While the overall process is generic in nature each step includes 82 (r2) which provides guidance on how to align and integrate the
activities that are unique to technical security testing in ICS perspectives of different stakeholders.
environments. This ensures the specific testing requirements of ICS
By making sure all key stakeholders are part of the risk assessment
environments are met and includes activities such as:
process it is possible not only to improve the nature of any technical
• Attuning technical security testing to the sensitivity security testing that is conducted but also to help promote
of business functions and processes that relate to the its benefits and allay any fears about the possible damaging
ICS environment (eg. by understanding the potentially Focused threat intelligence consequences of poorly executed tests.
adverse consequences of carrying out technical security Threat assessment of the ICS environment should be conducted to
testing and the capability of the incident response ensure there is a good understanding of the threats that apply to The introduction and use of a common risk management
capability that may be required) the specific technologies in use. Threat intelligence, particulalrly that approach such as ISO 31000 would also have the effect
• Employing up-to-date threat intelligence to help inform which is relevant to the target company and the industry sector, of combining different perspectives and would help
the technical security testing approach that is used should be used to help inform judgements about the level of threat introduce a common language for discussing terms such
• Developing the most appropriate mix of offline and in the ICS environment. as ‘threat’, ‘vulnerability’ and ‘impact’.
online tests that are safety and process conscious (eg. by
using a check-test-check method).

20 21
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper


In response to questions about the importance of methods used To ensure that a chosen technical security testing partner will
in technical security testing respondents indicated their High
rating for:



Laboratory assessment
Component testing
There is nothing magic about ICS
pen testing, but it does need to be
approached with caution
“ meet your requirements it can be helpful to define a set of supplier
criteria, most of which your chosen supplier should be able to meet
– or exceed. These criteria are:

• Solid reputation, history and ethics



Combined testing teams
Technical security testing teams should be made up from a
combination of skilled staff from both the testing organisation and
• Technical documentation review • High quality, value-for-money services key internal stakeholders. Given the sensitive and demanding nature
• Research and development capability in ICS of technical security testing in ICS environments it is important to
• Functionality and configuration review
environments be able to stop, take stock and re-align testing whenever unknown,
• Staff interviews high-risk or unforeseen circumstances arise. In these circumstaces
• Highly competent, technical security testers
• Risk assessment. the testing organisation must be able to work as a partner rather
Qualified technical security testers • Security and risk management than in isolation. Ideally a multi-disciplinary approach should be
Research on the project has shown that Red Teaming is regarded A key requirement is that the technical security testing partner • Strong professional accreditation and complaint process. taken with a team of domain, process and knowledge experts
by technical security testers working in ICS environments as a must have a deep understanding of ICS technologies and the role drawn from both the host organisation and the testing organisation.
particularly valuable testing technique. The objective of Red they play in the business processes that they enable. Above all
Teaming is to break the mould of conventional thinking about else the testing organisation must be able to work as a partner as CREST Members – and the technical security
the threats and vulnerablities in an environment. Conventional technical security testing in ICS environments ideally requires a testers that they employ – are required to
thinking shaped by organisational, cultural and situational multi-disciplinary approach and should consist of a team drawn adhere to a rigorous code of conduct for both
factors serves to constrain decision making and can led to a poor from both the host organisation and the testing organisation. the individual testers and the organisations for
anticipation of what actions adversasries could take and how they whom they work; backed up by an independent
could attack an organsiation. We are all at risk of conventional Previous research suggests that the reasons why an ICS investigation scheme should conflicts arise. Detail
thinking when it comes to identifying threats and vulnerabilities. environment operator would partner with a technical security of the code are available from CREST at: http://
Having a third party skilled in Red Teaming can help to shift our testing organisation are because they can: www.crest-approved.org/about-crest/what-
thinking, improve our risk analysis and help determine more we-do/code-of-conduct/index.html
effective mitigations. • Provide more experienced, dedicated technical staff
who understand how to carry out penetration tests
As technical security assessment becomes established within an effectively, using a structured process and plan
organisation, consideration should be given to using tests to help • Perform and independent assessment of their security
measure the relative maturity of the capability. This depends to arrangements
a considerable degree on having a recognised maturity model
• Carry out a full range of testing (eg. black box, grey box,
in place to help determine when the criteria associated with a
white box; internal or external infrastructure or web
particular level of maturity have been met. The results of all tests
applications; source code review; and social engineering)
should be linked to business objectives and ICS environment
owners should have visibility of test outcomes and any • Conduct short-term engagements, eliminating the need
remediation actions. to employ you own specialised (and often expensive)
technical staff.

22 23
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Part 5 – The way forward can be undertaken effectively within organisations (eg. see
Part 4 – Undertaking technical security testing
These are impediments to the use of technical security testing
and must be tackled to encourage more widespread and effective
Improve foundational elements of ICS in ICS environments). At present there are a number of technical testing. A regular and systematic programme of technical
technical security testing these elements that are not only poorly undertaken but also security testing is essential to help ICS environment owners and
foundational in nature. These elements require urgent attention operators gain assurances that risks are being managed.
There are many different elements of technical testing in to prevent holding back the more widespread use of technical
ICS environments that need to be addressed to ensure it security testing by ICS owners and operators (see Table 2).
CBEST – setting the standard for
Table 2: Foundational aspects of ICS technical security testing technical security testing
Foundational element High-level description CBEST, from the Bank of England, is a common framework that
A - Technical testing The lack of a definitive standard that describes how to conduct technical security testing in ICS environments delivers a controlled, bespoke, intelligence-led penetration test
guidance has led organisations to develop their own in-house approaches that are often piecemeal, largely unproven, against financial institutions’ critical systems. Critical systems are
poorly maintained and do not enjoy the confidence of senior management or other key stakeholders. those which are essential to the well-being of the institution and
the UK financial system as a whole. These tests mimic the tactics,
B - Practitioner support Inadequate peer group support for practitioners on how to conduct technical security testing in ICS
techniques and procedures of threat actors who are perceived by
environments is preventing the virtuous upward spiral of improvement that comes from the dissemination
Government and commercial intelligence providers as posing a
and development of good practice.
genuine threat to systemically important financial institutions.
C - Security maturity The relative immaturity of security practice in many ICS environments makes the uptake of technical security
testing less likely as more fundamental aspects of security are seen as a higher priority. Organisations who Under CBEST the traditional penetration test is augmented by
apply recognised good practice in information security management are more likely to benefit from technical further validation of the knowledge of the penetration tester.
security testing than those that are in poor shape. The quality of threat information is substantially increased by
D - Stakeholder Lack of understanding by key stakeholders such as process engineers, safety specialists and IT support staff of the inclusion of specific and targeted threat information from
education the value and importance of technical security testing is likely to hold back the introduction and wider use of specialist suppliers. This information will allow the penetration
technical security testing. tester to simulate more closely real life attacks from competent
adversaries. In addition, the cyber security maturity assessment
E - Management There is often inadequate financial and organisational support from ICS environment owners for undertaking
provides KPIs that will help to benchmark the ability of the
support technical security testing. Management support is required to provide the organisational context for risk
organisation to detect and respond to such attacks.
management.
CBEST sets the highest standard for technical security testing in
financial institutions. It is intended that the approach developed
in CBEST is used to help develop similar approaches for other
parts of the critical national infrastructure.

Each foundational element that needs to be improved can be


addressed through undertaking a range of possible actions. Some of
these actions can be undertaken within the ICS operator organisation
itself while other actions may require an industry-wide solution and
therefore will probably require the assistance of industry associations
or regulatory support (see Table 4).

24 25
ICS Technical Security Assurance Position Paper ICS Technical Security Assurance Position Paper

Table 4: Improving foundational elements of ICS technical security testing

Foundational element Examples Possible actions At present many organisations are not able to demonstrate Conclusions and recommendations
that these elements are solidly in place and therefore are poorly
A - Technical testing • Widely recognised technical security testing standard for A standard, or similar document, for undertaking This Position Paper sets out the business background and security
positioned to undertake effective technical security testing. Given
guidance organisations and individuals to follow technical security testing in ICS environments challenges that ICS owners face in managing the risks to their ICS
the pace of change in ICS environments this is unsurprising and
• Standards-based implementation advice including reference should be developed for use in all relevant ICS environment operators require more support across the board environments. There is a pressing need to improve security in ICS
models, architectural patterns and ‘how to’ guides industry sectors. environments and technical security testing has a significant role to
and also in the form of guidance, promotion and awareness raising
• Accreditation service for organisations providing technical The standard that is developed should be play in ensuring this is achieved. ICS environment owners require
before they are able to fully address these foundational elements.
security services supported by implementation advice to assist assurances that risk is being identified, assessed and evaluated.

• Availability of experienced, knowledgeable, professional


practitioners. Increase promotion and awareness Above all else they need to know that there are appropriate
Testing organisations and individuals should measures in place to manage risk.
technical security testing organisation and individuals Until relatively recently technical security in ICS environments was
be required to meet minimum standards in
considered an obscure field that did not attract or require much ICS environments are more sensitive than conventional IT
the technical testing of ICS environments.
attention. In recent years this has changed with the realisation on environments and technical security testing that could potentially
B - Practitioner • Training and education geared towards the specific needs ICS environments require the highest the part of governments, legislators, industry bodies, the media and be damaging should be planned and undertaken with a high
support of technical security testers working in ICS environments possible standards for technical testing the general public that cyber incidents in ICS environments can degree of caution. The ‘deterministic’ nature of the devices in ICS
• Technical testing advice groups that can provide help in and training and education for individuals have potentially very serious consequences. As a result there has environments requires a different approach but not one that is so
the specific tests, techniques and safety conscious practices should be aligned and assessed against those been considerable effort put into the development of standards and impoverished that it provides little value or assurance about the
standards by a recognised and experienced


should be used in ICS environments guidance on how to secure ICS environments – particularly those strength of measures to resist attack.
body such as CREST. that make up part of a nation state’s critical national infrastructure.
• Up-to-date threat intelligence that is relevant to the industry,
organisation and technology that is in use in the ICS Regulatory bodies, particularly those in utilities, This work has included very little on technical security testing and
should be encouraged to take a more active assurance and consequently there is still a poor understanding of its
role in helping foster the development of value and importance. In fact if there is any common message about ICS owners are caught in a cleft stick
practitioners with the requisite skills. technical security testing that has made its way into the collective – they want assurances that cyber
C - Security maturity •


Accurate recording of the scale, scope and inventory of the
ICS infrastructure
Defined security architecture with layered defences,
established procedures and practices and effective
Organisations should consider reviewing
their current status of ICS security against
established guidelines such as those from
NIST and ISA. ICS security assessment services
can also be obtained from CREST Members
thinking of ICS environment owners and operators it is that it can be
dangerous and should be conducted with extreme caution.

Promotion of the importance of technical security testing needs to


be carried out so that:
risk is being managed but they are
fearful of the potentially damaging
consequences of poorly executed tests

managerial, technical and procedural controls
(see www.crest-approved.org).
• Dedicated security function with trained and experienced • ICS environment owners have a better awareness of the
security practitioners importance of technical security testing in helping to
• Established programme of security review and improvement manage cyber risk (eg. it should not be seen as a super Research on the project has helped to identify the high-level
D - Stakeholder • Education of process engineers and safety specialists in the Organisations should establish an educational high-risk activity that should be avoided at all costs) characteristics of a practical technical security testing approach and
education and fundamentals of ICS cyber security programme to help ICS operators understand • ICS environment stakeholders such as process engineers organisations should consider how this could add value to how
awareness the role and function of ICS security. and safety specialists have a better understanding of they approach technical testing at present.
• Formation of multi-disciplinary teams for undertaking
selected ICS security related activities Multi-disciplinary teams should be technical security testing and how it can be conducted
This Position Paper has identified a variety of actions that can be
established for all ICS security activities that in a carefully controlled manner in support of their
• Awareness raising on the requirements and process for taken to help improve the uptake and use of technical security
require risk to be assessed. objectives (eg. to ensure service continuity)
conducting technical security testing in ICS environments testing in ICS environments but of fundamental importance is the
Periodic awareness raising initiatives should • Practitioners can understand how technical security testing need to develop a standard for conducting technical security testing
• Regular notification of the risk status of the ICS environment
be undertaken to remind ICS operators of the will support them in their efforts to secure ICS environments. and the certification of organisations capable of providing technical
including the changing threat intelligence profile
importance of ICS security and its changing testing services against this standard. Work should be commenced to
risk status (typically in response to the The availability of extensive information on ICS security while welcome develop this standard to help provide assurance that cyber risks are
increasing threat of external attack). is largely aimed at security practitioners and is mostly passive in nature being managed in ICS environments.
E - Management • Establishing the business context for risk management in ICS owners should ensure that the enterprise (eg. online documentation). In the absence of specific legislation in the
support ICS environments risk management framework and architecture UK to mandate minimum levels of security in ICS environments (eg.
• Creating the governance oversight for effective safety extends to include the ICS environment. This through a compliance regime) more active awareness raising should
conscious technical security testing will lead to improved reporting of risk through be conducted focusing initially on those organisations working in the
the enterprise risk register, regular review of critical national infrastructure and then expanding to include others
• Allocating adequate resources and budget to support
ICS risk status and the allocation of budget and such as those within the digital supply chain.
technical security testing internally and by third parties
resource proportionate to the level of risk and
• Establishing a clear line of sight of risks occurring on the risk appetite of the organisation.
ground and how they affect enterprise risk management.

26 27
CREST balanced scorecard

The quadrants in this diagram outline the four main areas


that deliver the benefits of the CREST vision.
CREST is a not-for-profit organisation that represents the technical information security industry,
particularly penetration testing, cyber security incident response and security architecture services.

CREST offers public and private sector organisations a level of assurance that the technical security
advisors they appoint are competent, qualified and professional with current knowledge. It also
ensures that the companies they engage with have the appropriate processes and controls in
place to protect sensitive client-based information.

For further information contact CREST at


http://www.crest-approved.org

Warning
This Guide has been produced with care and to the best of our ability.
However, CREST accepts no responsibility for any problems or incidents arising from its use.

© Copyright 2016. All rights reserved. CREST (GB).

You might also like