Cyber Security. Protecting the UK water industry



Similar documents
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

HMG Security Policy Framework

Cyber security and critical national infrastructure

What is Cyber Liability

Energy Cybersecurity Regulatory Brief

DeltaV System Cyber-Security

Keeping the Lights On

Cyber Security - What Would a Breach Really Mean for your Business?

How To Secure Your System From Cyber Attacks

What Risk Managers need to know about ICS Cyber Security

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Resilience and Cyber Essentials

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

developing your potential Cyber Security Training

How Secure is Your SCADA System?

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Nine Steps to Smart Security for Small Businesses

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

CYBER SECURITY. Is your Industrial Control System prepared?

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Chief Information Officer

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

OPC & Security Agenda

A specification for security-minded building information modelling, digital built environments and smart asset management

MANAGE THIRD PARTY RISKS

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

CYBER SECURITY TRAINING SAFE AND SECURE

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Committees Date: Subject: Public Report of: For Information Summary

THE HUMAN COMPONENT OF CYBER SECURITY

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

A GOOD PRACTICE GUIDE FOR EMPLOYERS

CYBER SECURITY Audit, Test & Compliance

Asset Management. Enabling effective estates strategies >

Designing & Building an Information Security Program. To protect our critical assets

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

Cybersecurity Converged Resilience :

How To Protect Your Data From Theft

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Secure by design: taking a strategic approach to cybersecurity

Oxford City Council ICT Strategy

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Unit 3 Cyber security

Cisco Security Optimization Service

How To Protect Your Business From A Cyber Attack

Information security controls. Briefing for clients on Experian information security controls

Security for NG9-1-1 SYSTEMS

future data and infrastructure

Industrial Cyber Security 101. Mike Spear

Information Technology Strategy

The Cyber Threat Profiler

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Better secure IT equipment and systems

Defensible Strategy To. Cyber Incident Response

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

NNIT Cybersecurity. A new threat landscape requires a new approach

Mitigating and managing cyber risk: ten issues to consider

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

How To Manage Risk On A Scada System

Compliance Guide: ASD ISM OVERVIEW

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Sytorus Information Security Assessment Overview

Reducing Cyber Risk in Your Organization

SCADA Security: Challenges and Solutions

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Business Case. for an. Information Security Awareness Program

Procurement Capability Standards

Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Protection from cyber threats

Who s next after TalkTalk?

Secure Web Applications. The front line defense

Cyber Security for audit committees

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

Address C-level Cybersecurity issues to enable and secure Digital transformation

A Guide to the Cyber Essentials Scheme

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Protecting critical infrastructure from Cyber-attack

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Transcription:

Cyber Security Protecting the UK water industry

In today s connected world, cyber attacks are a daily occurrence. These attacks can have potentially disastrous consequences for water companies and the millions of customers served by major water treatment assets. 7 MONTHS AVERAGE TIME TAKEN TO DETECT A SUCCESSFUL INTRUSION INTO A COMPANY SYSTEM MANDIANT 2014 1M AVERAGE COST PER EVENT OF THE MOST DAMAGING ATTACKS BIS, 2014 UP TO1 MILLION CYBER ABUSE ATTACKS IN THE UK EVERY DAY CERT-UK, 2015 80% OF LARGE BUSINESSES HAVE EXPERIENCED SOME FORM OF CYBER ATTACK BIS, 2014 76,000 NUMBER OF INDUSTRIAL CONTROL SYSTEMS (ICS) IN THE WORLD. 80% OF THESE ARE CONNECTED TO THE INTERNET 40% PERCENTAGE OF COMPANIES WITH ICS WITH IDENTIFIED OR SUSPECTED SECURITY BREACHES IN 2014 UP FROM 28% IN 2013 SANS, 2014 SHODAN, 2014

The number of targeted attacks on industrial control systems (ICS) has seen a sharp increase with 2014 reporting the highest number to date. In some cases these have resulted in significant physical and environmental damage. 2000 SCADA SYSTEM SABOTAGED MAROOCHY, AUSTRALIA Disgruntled ex-employee hacks SCADA system to cause raw sewage spill (Abrams & Weiss, 2008). 2006 WATER TREATMENT SYSTEM HARRISBURG, PENNSYLVANIA, US Foreign hacker plants malicious software via insider laptop (Tudor & Fabro, 2010). 2007 2008 2008 CANAL SYSTEM, WILLOWS, CALIFORNIA, US SCADA system sabotaged (McMillan, 2007). CITY TRAM NETWORK, LODZ, POLAND Teenager causes derailments by using modified TV remote control to change track switches (Leyden, 2008). STUXNET WORM IRAN Nuclear centrifuges damaged (Kushner, 2013). 2010 2009 2014 2011 DIGITAL ROAD SIGNS AUSTIN, TEXAS, US Hacker changes multiple signs to read Zombies Ahead (Computer Weekly, 2011). WATER TREATMENT PLANT ILLINOIS, US ICS passwords stolen from vendor database; thousands of homes affected (The Guardian, 2011). STEEL MILL GERMANY Hackers cause significant damage to blast furnace (Zetter, 2015). It is therefore critical that all companies take measures to protect assets from remote access, interference, insider threats, and third party risks. The UK water industry is facing increasing encouragement from the government to ensure it is adequately protected from cyber attacks. ICS typically used by water companies tend to be older, legacy systems designed before internet connectivity was so common. Whilst the technical protections associated with corporate or customer data are relatively mature, the vulnerability of operational technology or ICS has not been widely understood.

Make sure your people are not the weak link Dealing with cyber security demands a multi-disciplinary approach with people, process, and technology all working together to form multiple security layers. Whilst there is clearly a need for technological improvements to protect assets, the most significant reduction in risks can be achieved through interventions associated with people and processes. Focussing on human factors in complex and diverse technical environments such as cyber security enables organisations to achieve maximum value from existing assets through a defence in depth approach. Each organisation has a large number of operational staff, maintenance staff, and system administrators, all with different levels of access to the company s critical systems and information. With people routinely moving between departments, joining or leaving the organisation, there needs to be robust controls, access procedures, selective security vetting, and clear behavioural expectations set around cyber security. Cyber security is everyone s responsibility To date, cyber security has typically involved technical specialists using technical language and sophisticated technology, and only a modest amount of general user awareness has been needed. With increasing threats to ICS, organisations need to ensure all employees understand and appreciate the risks involved, and take responsibility for how they behave to keep themselves and their organisation protected from cyber attacks. Third party risks The UK water industry relies heavily on third party contractors and key software vendors, which means potentially large numbers of contractors have access to critical company systems. The majority of these also use their own hardware to connect to company systems, which poses additional risk of infection (deliberate or accidental). Robust controls are needed to manage these third party risks. Asset databases and BIM Data aggregation will increasingly be an area of vulnerability and will require careful management. Strategic advice on detection and response Technology strategy and architecture Security governance and processes Our service offering We believe cyber security should be considered in the context of a broader holistic security framework and requires interface with existing enterprise governance frameworks such as corporate risk management. Our cyber security services integrate six strands: DEEP INDUSTRY KNOWLEDGE Risk and vulnerability assessment Education and awareness Asset management

Our approach Arup has extensive experience in integrating people, processes and technology, having delivered a number of projects for clients in the aviation, finance, highways, nuclear, oil and gas, rail, and utilities markets. We understand the issues being faced by the UK water industry including the outcomes from the latest periodic review PR14 and associated financial pressures. As approved UK government security consultants we have clearance for UK water CNI security installations. We are strong supporters of the UK Government National Cyber Security Programme with close links to DEFRA and its cyber security programme. People We believe the key focus areas for the water industry are senior leadership, key practitioners, and employees. Programmes to deliver cultural change are a strong part of Arup s portfolio with our team of behavioural psychologists working closely with technical specialists to design a range of bespoke interventions to influence wide scale behavioural change for our clients. These are characterised by increasing staff awareness, understanding, and care for assets and systems. Process A number of standards, guides, and frameworks exist for cyber security. We help clients by translating these complex technical standards and applying a simple approach to advise on best practice and ensure understanding and compliance. Technology We advise clients on implementing a policy-driven security architecture that is closely integrated with an organisation s enterprise architecture, IT and OT governance framework, and corporate risk management framework. As well as protecting information and systems, an effective security architecture must provide assurance that this information is being protected, and must enforce transparency and accountability for actions. Asset information We are committed to promoting the successful application and implementation of BIM and other Big Data initiatives. We understand both the benefits and impacts on projects, and help our clients to develop riskbased processes to mitigate the emerging threats associated with their adoption. PEOPLE Education and cyber care training for all staff Executive coaching on managing cyber risks Critical National Infrastructure cyber management Leadership development Organisational design Knowledge management Team performance PROCESS Cyber security process review Compliance monitoring for cyber Governance & strategy Security vetting Managing Third Party cyber risks Risk assessment OUR APPROACH TECHNOLOGY Policy-driven security Enterprise security architecture ICS security / vulnerability reviews Technology strategy Identity & access management Asset management Communications security IT = Information technology OT = Operational technology (which includes ICS) Industry standards compliance Procurement support

Case studies GILES ROCHOLL PHOTOGRAPHY NATS LLDC GILES ROCHOLL PHOTOGRAPHY Sellafield Classification of documents and personnel security clearance Following the creation of the Infrastructure Strategic Alliance (ISA), we were appointed to provide cyber security consultancy to ensure the secure processing of classified documents in our main project office. Our team provided guidance on personnel security/vetting procedures, physical requirements and operation procedure to the project teams and their support staff. In addition to providing practical advice, we also produced security instructions and supporting documentation. As a result, the project office was accredited by the client. NATS Information security We provided security programme management for NATS enterprise information assurance and cyber security programme. This involved a complete threat and risk assessment, solution design, technical solutions, governance, education and training, and a cultural change programme. We also provided identity and access management services to enable flexible, cost-effective secure access to IT services anytime, anywhere and from any device. This will enable NATS to achieve substantial reductions in IT operating costs and carbon emissions, whilst providing staff with significantly greater flexibility, agility and convenience in their use of information services. Olympic Delivery Authority Secure information exchange We helped define and deliver a secure portal for information exchange classed at RESTRICTED level in the Government Security Classification Scheme. This involved complex stakeholder management and required a holistic approach to integrate people, process, and technology. Our team translated the client s business needs into detailed definitions of requirements; evaluated the options; and used TOGAF to deliver the solution acting as the client s representative. We provided secure remote access services; Electronic Document and Records Management System (EDRMS) packages; locked down and highly secured end-points; advised on technology requirements; developed and implemented robust starters and leavers processes; and developed security training packages. Physical security for UK water companies We are providing physical consultancy for assets including critical national infrastructure, chemical stores and office facilities. Our team has completed audits of existing protective measures to infrastructure, developed strategies for protecting new and refurbished installations, undertaken a CDM Coordinator role, and has completed design, tender and contract administration of installation work. We have produced a design guide to help engineering teams establish baseline security measures using threat and risk assessment techniques, and have also provided fence specifications and audited the installations for compliance. References Abrams, M., Weiss, J., (2008), Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia, [on-line] http://csrc.nist.gov/groups/sma/fisma/ics/documents/ Maroochy-Water-Services-Case-Study_report.pdf last accessed 12.01.15 BIS (2014), Information Security Breaches Survey Technical Report, [on-line] https://www.gov.uk/government/uploads/ system/uploads/attachment_data/file/307296/bis-14-767- information-security-breaches-survey-2014-technical-reportrevision1.pdf Computer Weekly (2011), Hacker Movie: Zombies Ahead, [on-line] http://www.computerweekly.com/blogs/itdowntime-blog/2011/03/movie-zombies-versus-hackers.html Kushner, D. (2013), The Real Story of Stuxnet, [on-line] http:// spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet Leyden, J. (2008), Polish teen derails tram after hacking train network, [on-line] http://www.theregister.co.uk/ Print/2008/01/11/tram_hack/ Mandiant (2014), 2014 Threat Report: Beyond the breach, [on-line] https://dl.mandiant.com/ee/library/ WP_M-Trends2014_140409.pdf McMillan, R. (2007), Insider charged with hacking California canal system, [on-line] http://www.computerworld.com/ article/2540235/disaster-recovery/insider-charged-withhacking-california-canal-system.html Rose, A. (2013), The internet of things is set to change security priorities, [on-line] http://www.computerweekly.com/feature/ The-internet-of-things-is-set-to-change-security-priorities last accessed 12.01.15 SANS (2014), Breaches on the Rise in Control Systems: A SANS Survey [on-line] http://ics.sans.org/media/sans-ics-securitysurvey-2014.pdf Shodan (2014), Map of industrial control systems on the internet, [on-line] https://icsmap.shodan.io/ The Guardian (2011), Cyber-attack claims at US water facility, [on-line] http://www.theguardian.com/world/2011/nov/20/ cyber-attack-us-water-utility Tudor, Z., Fabro, M. (2010), What Went Wrong? A Study of Actual Industrial Cyber Security Incidents, The Security Incidents Organization, US Zetter, K. (2015), A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever, [on-line] http://www.wired.com/2015/01/german-steel-mill-hackdestruction/ last accessed 20.01.15

About Arup Arup is the creative force at the heart of many of the world s most prominent projects in the built environment and across industry. We offer a broad range of professional services that combine to make a real difference to our clients and the communities in which we work. We are truly global. From 90 offices in 38 countries our 11,000 planners, designers, engineers and consultants deliver innovative projects across the world with creativity and passion. Founded in 1946 with an enduring set of values, our unique trust ownership fosters a distinctive culture and an intellectual independence that encourages collaborative working. This is reflected in everything we do, allowing us to develop meaningful ideas, help shape agendas and deliver results that frequently surpass the expectations of our clients. The people at Arup are driven to find a better way and to deliver better solutions for our clients. For further information please contact: David Essex, Associate Director david.essex@arup.com +44 7867 483882 www.arup.com We shape a better world.