Reducing Cyber Risks For Industrial Control Systems
Reducing Cyber Risks For Industrial Control Systems
This document is intended to assist the professional and technical bodies within the organization, who are
in charge of the OT scene in general and the ICS in particular. This document is not intended to replace the
above bodies, but rather to serve as a tool for identifying the key issues related to cyber protection risks at the
ICS arena. This document offers professional protection recommendations, based on international standards,
research and professional documents, all of which are specified herein. It is understood that the implementation
of professional controls in the ICS arena, in a specific organization, requires a dedicated process of risk
management and the adjustment of those controls for the organization by suitable professionals.
1. Introduction 06
1.1. Introduction to ICS Environments 06
1.2. Purpose of this document 08
1.3. Target Audience 08
- UNCLASSIFIED - 5
1. Introduction
- UNCLASSIFIED - 6
the Engineering Workstation and to the
SIS (Safety Instrumented System), and
from there used the aforementioned
attack platform attempt try to change
the operation and programming of the
safety system controllers. The purpose
of the attacker was to cause damage so
as to disable and neutralize the system.
Safety in the Manufacturing Process4.
1 https://ics-cert.kaspersky.com/media/KL_ICS_CERT_H2_2018_REPORT_EN.pdf
2 https://ics-cert.kaspersky.com/media/KL_ICS_CERT_H2_2018_REPORT_EN.pdf
3 https://ics.sans.org/media/SANSICS_DUC4_Analysis_of_Attacks_on_US_Infrastructure_V1.1.pdf - Additional incidents
4 https://www.gov.il/BlobFolder/reports/sis/he/SIS-CERT-IL-W-400.pdf *In Hebrew
5 https://www.us-cert.gov/ics/alerts/IR-ALERT-H-16-056-01
- UNCLASSIFIED - 7
1.2 Purpose of this document • ICS engineers/technicians – those
who are in charge of ICS system
This document aims to provide installation and maintenance
the professional audience with the processes
basic knowledge required for better • ICS Operators – those who are
protection of ICS systems. The involved in the ongoing and
document shall import knowledge ongoing operations of the systems
along with methods and workflows to • Network security personnel in
increase resilience in the production ICS systems
line. At the same time, it includes • ICS Security Trustees - as part
representative examples and risks, of their responsibilities (most
ways of defense, recommendations often appointed by the CISO or a
and controls to mitigate risks in the management body)
operating environment. The document • Integration companies, consulting
constitutes a professional extension in companies and ICS service
the ICS arena to the cyber defense providers
methodology for an organization. • IT professionals
- UNCLASSIFIED - 8
2. Technology background
overview of ICS environments
(Topology and Main Components)
- UNCLASSIFIED - 9
• Human-Machine Interface (HMI) - • Communication infrastructure -
A human-machine interface that connects the control system to
displays process data & information units (communications: wired,
to the operator, enabling the radio, cellular, Wi-Fi, satellite).
operator to monitor and monitor • Intelligent Electronic Device (IED)
the process. - These devices form part of the
• Master Terminal Unit (MTU) - control systems such as sensors,
A centralized control system motors, transformers, pumps, etc.
designed to monitor, monitor, and and are also equipped with a tiny
operate the end components. reporting processor. These devices
• Programmable Logic Controllers are typically communicated via
(PLC) the Fieldbus protocol, function
• Logic controllers designed to as Slaves and are controlled by
receive input, run preloaded logic remote end units.
(and logic based on the transfer of • Internet of Things (IOT) - dedicated,
commands to end equipment). communication-based components
• Remote Terminal Unit (RTU) - and the ability to exchange data &
Remote monitoring units, which are information over the Internet.
involved in the process and in the • Industrial Internet of Things
process are connected to sensors (IIOT) - Designed components
and located on the process site. for the communications-based
• Historian - A system that stores manufacturing industry.
the props from the field over time
and shows trends in changing
the parameters measured in the
process. The system is usually
used by the control engineers to
improve and fine-tune the process.
• Sensors - Devices that measure
physical conditions and are
capable of activating actuators and
transmitting to control systems.
• Actuators - Actuated by the
sensors and trigger the required
change (such as valve opening).
- UNCLASSIFIED - 10
Enterprise Network
Control Center
Control Network
Physical Infrastucture
- UNCLASSIFIED - 11
Distributed Control System (DCS) - These models allow for structural
This system differentiates the DCS reference by hierarchy and control
from non-distributed systems that use system layer layers. In the Triangle
a single centralized controller. model, the systemic description
The DCS system typically uses process- presented through the five levels
optimized processors (hierarchical) in a triangle (Including the Air Gap)
and linked by communication networks is more simplistic and suitable for
for monitoring and control. complex systems. The PURDUE
model has a six-level distribution and
is suitable for larger organizations/
more complex environments.
As a general rule, both models
separate the IT domain - which
manages the organization’s business
system - from the OT and the domain
in which physical components are also
Figure 5: The main subsystems in the ICS world
managed, which receive instructions
through commands of electricity
power changes.
2.2. Classical topology in ICS
environment
2.2.1. The Triangle Model (suitable
mainly for simple environments
The ICS environment is a complex
and small organizations):
environment. The environment
incorporates a management
environment, sometimes linked to ERP
IT
and such other systems, operating Info Level
- UNCLASSIFIED - 12
Separation of the triangle after IT
differentiation inputs6: Enterprise Zone
• Business environment and IT
Level 5: Enterprise IT
involvement in the organization.
This network is sometimes directly Level 4: Site Business Planning and Logistics
GAPPED).
Cell Area Zone
• The command and control servers
Level 2: Area Supervisory Control
and controllers themselves, which
OT
make up the heart of the system - Level 1: Basic Control
model, the PLC, RIO, IED industrial Purdue Model for Control Hierarchy logical framework
6 The Airgap separation and primarily practiced on critical infrastructure. There are organizations where the separation
between environments is based upon VLAN, dedicated FW etc.
7 https://www.encompass-inc.com/top-10-automation-trends-in-2018
- UNCLASSIFIED - 13
enterprise IT systems and services enable the operator’s intervention
(Enterprise). This area includes as needed and according to his/
enterprise Internet connection, ERP her permissions. Malicious to
systems, etc8. program or change controller
• Level 3 - This area includes a commands (complex systems
production network management have several operators’ positions
environment, materials, manpower, (HMI), enabling operators to focus
inventory, availability of machines on different areas of the system,
(such as the MES systems, etc.). or to intervene as needed.
The Connection between layer • Level 1 - In this environment,
3 and layer 2 will be done by processes are managed using
firewall devices, or those where control computers (Automation
communication is one-way and Server) for all devices running
separated by a device to create RTU, PLC controllers, etc.
one-way traffic (diode) • Level 0 - represents the lowest
• Level 2 - In this environment there layer in the PURDUE model. This
is the control system in the HMI layer is connected to the sensors
interface, and its role is to enable and actuators, which operate the
the monitoring and control of machine.
the SIP processes as well as to
8 https://www.gov.il/BlobFolder/policy/protection_of_erp_systems/he/Protection%20of%20EPR%20systems_576699_4_
WEB.pdf * In Hebrew
- UNCLASSIFIED - 14
Possible
course of Layers
action for 4&5
attack
Infected Cross-Site Infected Social Credential
USBs Scripting Documents Engineering Phishing
Attack
Methods
Changed Modifies Firmware Flipped Relays Executes Rogue Encrypts Files for
PLC Setting Causes Damage Commands Ransomware
Layer 1
Opens Breakers, and Outages on PLC
Damages Damages Systems Disables Systems
Equipment
Impacts on
Changed Sensors Change Actuators Physical Functions and Enviromental
Layer 0
Settings Activity Damage Values Changes Conditions
- UNCLASSIFIED - 15
2.3. Programming and in a particular Vendors has a unique
communication between graphical interface that “compiles”
controllers and HMI the configuration file uniquely to the
same controller type (from the same
This paragraph describes the vendors).
background process in controller
programming with the aim of In a mixed environment, control
understanding the opportunities from engineers are required to become
the attacker’s point of view and risks familiar with some graphics software.
in the controller loading process (and In modern systems, the controller
programming ability). Over the years, programming is carried out in one
PLC controllers have been developed of the five languages defined in the
by different manufacturers, all of above standard, enabling application
whom have developed a unique transfer and integration “relatively
user interface and unique functions. easily” when working with various
Changing environments and needs - manufacturers’ controllers.
leading to increased operational and Controller Programming: In the past, it
security difficulties in communication was customary to program controllers
between programmed controllers by using a single method called Ladder
various manufacturers. Logic, and Control Computers (HMI)
- using HMI provider software. This
Mixed Controls Environment: Despite process is done by an Engineering
the need and manufacturer’s Station.
recommendations to use single
controllers (from the same Most Common Programming
manufacturer and the same family Languages:
of products), there are also mixed • Ladder Logic
environments that incorporate several A classic method, which allows a
controllers, produced by different programmer to translate the logical
vendors. Standard and Programming thinking process into a drawing and
Methods As described in IEC 61311- diagram. The programming process
3, the standard version, published is carried out through translation A
in 2013, defined five programming business process is desirable to
languages. sequence operations represented
Each family of controllers, produced by illustrations from the electricity
- UNCLASSIFIED - 16
sector simulating switch, digital • Information Security and
input, time counter and more. Architecture - Availability of
• Function Blocks information about architecture,
The function allows one software installation and maintenance
component to be used in several practices, structure of interconnection
different places, while maintaining configuration with controllers,
the uniformity of the operations controllers on controllers, and
and optimizing the writing of the famous and known cyber-attacked
software. victims across the Internet.
Note: It is important to note that • Using IoT Devices & Capabilities
controllers developed using these
measures are more immune to App layer
making changes to the software • Obsolete apps, written in an
process in a way that would impair unsecured way.
the process.
• More languages Configuration layer
IL (Instruction List), Structure Text • The systems have been built for
(STFC), Sequential Function Chart years running, without booting,
(SFC). so updates are very difficult to
implement.
2.4. Trends and Challenges • Many times, the passwords are
Common in ICS Environments burned in the Factory Default
Passwords code and sometimes
Production environment difficult to change.
• Standardization - Use of standard • There is usually difficulty in
operating systems that include encrypting (sensitive) fields.
cyber exploitable vulnerabilities. • Antivirus systems cannot always
• Need for connectivity - Linking be installed on equipment (for
networks or linking to IT and the operational and contractual
internet increases visibility and reasons), or systems that prevent
attack surface. unknown code execution.
• Unsecured connectivity - Modems, • Difficulty in managing and
remote maintenance approaches, identifying users, as this is an
wireless communication (such as operating environment.
Wi-Fi)
- UNCLASSIFIED - 17
Network layer scanning (Asset Management) due
• The development of technology to the fear and risk of delaying
has led to a trend of linking production processes (such as
isolated operational networks to Ping Sweep that caused past
an administrative environment, failures).
creating many vulnerabilities that • Operational and legal difficulties
expose them to a wide range of in conducting classic and active
threats. intrusion tests on the network and
• Focusing on real-time performance equipment for fear of dropping the
makes it difficult to introduce system.
network information security • Difficulty in encryption and network
components (Latency). segmentation.
• Difficulty performing network
- UNCLASSIFIED - 18
3. Presenting cyber risks on ICS systems
9 https://www.nozominetworks.com/downloads/US/Nozomi-Networks-TRITON-The-First-SIS-Cyberattack.pdf
10 https://www.us-cert.gov/ncas/alerts/TA18-074A#revisions
- UNCLASSIFIED - 19
Figure 9: The development of attack tools for
ICS environments in recent years11
11 https://www.nozominetworks.com/downloads/US/Nozomi-Networks-TRITON-The-First-SIS-Cyberattack.pdf
12 ?https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_
S508C.pdf
13 https://www.us-cert.gov/ncas/alerts/TA18-074A#revisions
- UNCLASSIFIED - 20
• Listen to the Communication
• Inserting a hostile code through
an upgrade Hostile code insertion
using an external device connection
Figure 10: An attack that began in the IT surface for the purpose of realizing intentions in OT14
In the ranking of the top ten threats on this issue for 2019, published by the
German BSI, the following picture emerges:
(D)Dos Attacks
14 /https://socprime.com/en/blog/dismantling-blackenergy-part-3-all-aboard
15 BSI: Industrial Control System Security - Top 10 Threats and Countermeasures 2019
- UNCLASSIFIED - 21
In many situations, operating guessing processes, collecting
networks are isolated and separated or jamming (such as using
from the Internet. These security electromagnetic inductance).
arrangements make it difficult to
organize and penetrate the process. In recent years, the power of computing
However, attacking ICS networks as has grown and the need for diverse
a differentiated network is usually connectivity with other systems, such
possible in four main axes (and as business analysis and forecasting,
according to their requirements and operational performance analysis,
protection inputs in the design stages output measurement, forecasting
below): failures, fault resolution, etc. These
• Internal threat (an operating capabilities are designed to leverage
incident caused by the employee organizational activities and provide
inadvertently or fraudulently) – and present and future business and
in cases where the attacker had functional needs. This connectivity
physical accessibility (including also rests on the integration of IoT
exploitation of technicians)16. technologies, which also enable
• Mapping and exploiting attack channels.
opportunities on the supply chain Due to the advantages of the
axis (such as exploiting by spoofing/ development of the above
activating a party that supports the technologies, the concept of a
site or installing malware on the “differentiated operating network”
vendor’s equipment). is dissolving. Nowadays search
• Exploitation of input and output engines like SHODAN can find
channels and attacking through access to operating environments
them (such as Data Sanitization & management interfaces.
Content Disarm and Reconstruction
-CDR, updates, etc.).
• Side Channel Attack-based
attacks – exploiting physical
& technological environment
limitations that exist in the
computing environment for data
16 https://www.gov.il/BlobFolder/generalpage/coping_thret/he/Organizational_coping.pdf * In Hebrew
- UNCLASSIFIED - 22
Figure 12: Isolated network from external network
- UNCLASSIFIED - 23
do not understand the change • Dependence on external parties17 –
needed to adapt their knowledge While the IT environment can be
when assessing risks, choosing used by enterprise employees
protection solutions, monitoring and local vendors with whom the
and preparing a recovery plan for organization has good familiarity
operating environments. (including background work/
• Collaboration - Most often, the reliability checks), in working with
trust that runs the operation and these manufacturers, support and
maintenance of the systems in maintenance are often provided
the production environment is by dependent professional parties
a factor that is not hierarchically and are under warranty, and the
subject to the Information Security client’s ability to influence them is
Manager, or to the manager of low (such as a system vendor or
the information systems and expert software from abroad).
communications networks in the
organization. The ability to make
reviews/changes and hardening
Technology
requirements requires deep
collaboration between the two
different units in the organization.
17 http://www.sviva.gov.il/subjectsEnv/Documents/public-comments/2018/toxins-permit-terms-information-and-cyber-
protection.pdf * In Hebrew
- UNCLASSIFIED - 24
is immediately translated into proportionately (in relation to the
large amount of money and risk organization’s financial cycle),
to the control process. As part the replacement of a controller
of risk reduction, a dedicated or component of SCADA involves
area for running of files and significant efforts, resources, and
simulations can be considered as financial cost to the organization.
a preliminary process before the This leads to a reality in the area
network online process. where equipment is 10-20 years
• “Halting/Downtime” cost - old or more, which is required to
Difficulty in balancing risk and protect it with the existing tools
locating appropriate controls that (which are limited and often never
prevent stopping the process fit into this content).
versus locating compensatory • Use of old and unchangeable
controls that allow risk reduction technologies - such as a network
without stopping & compromising that has not been given security
the production line. inputs in the characterization
and construction process, the
Technology: use of old controllers, protocols
• Limited supply of dedicated and traditional communication
protection solutions - While based on old, unsupported classic
solutions such as code analysis, technologies. Hence, there are
vulnerability detection and more difficulties running antivirus or
are available and embedded security updates, etc.
in many systems around the
world, they may not always be
compatible with dedicated ICS 3.3. Adapting the CIA Model as
environments. In addition, these the AIC Model to the Operating
tools are not always approved for Environment
use by the manufacturer or by
the equipment’s operators, due In the world of data protection, the
to concerns about operational subject of protection is information.
damage, liability coverage, etc. Damage to it may lead to loss of
• Equipment Lifecycle - While IT trade secrets and/or sensitive data,
equipment is replaced relatively impairment of data availability/data &
frequently in organizations and information as well as incidents of data
- UNCLASSIFIED - 25
breach (the disruption of information). and business continuity in the
These events are classified into the production line. Since the object
following categories: of defense in the OT world is
the operational process, the
C –Confidentiality first priority is the ability of
I –Integrity the organization to continue
A –availability producing. Confidentiality of data
& information takes on a slightly
In the operating world, most of the different level of prioritization. It
focus of the defense is not just on should be noted that sometimes
confidentiality information & sensitive the reliability of the data can be
data but more on safety aspects compromised in cases of human
and business operational implications life risk and safety incidents. In
related to the production line process, these cases, many entities will
which can be caused by a cyber- prefer parameter I over business
attack, which can result in human continuity (parameter A). Inputs
life, environmental damage, and will also be applied to maintain
major economic damage (in case Of the logic of the controller and
business continuity injury). In view to examine the field and truth
of this, the recognized CIA model is indicators.
required to be adapted to a dedicated
language, which is suitable for the
operating environment, the operating 3.4. The Star Model - Based on
personnel, the production engineers, NISTIR 8183
the process engineers, etc.
• This model focuses on the
When performing a risk assessment consequences of the injury. These
process, we can work, for example, consequences are aimed at the
with one of these two models: potential damage as a result of
the realization of a cyber event on
AIC model operational continuity, conservation
• This model changes the order of human life, environmental
of parameters of the recognized protection, quality control and trade
CIA model. The change reflects secrets. This model is represented
the importance of availability by the following diagram:
- UNCLASSIFIED - 26
Operational continuity
- UNCLASSIFIED - 27
Category Industrial Control Network IT Network
- UNCLASSIFIED - 28
Category Industrial Control Network IT Network
- UNCLASSIFIED - 29
3.6. Cyber risks according to layers of the PURDUE model
Cyber-attacks can exploit vulnerability in each of the model layers (ZONE) and
their transitions. This section will review the attacks that utilize the communication/
channel that connects the model layers (such as moving from layer 0 to layer 1
in the model).
Level 5
Internet
Web Servers email Servers
Level 4
IT system IT
Level
email Servers Web Servers Buisiness Enterprise
Servers Computers
Level 3.5
Systems
at DMZ
Historian Servers Remote Access AV/Patch
Servers Server Air Gap
Level 3
Industrial
Systems
Supervisor Mfg. Server Domain Engineering
HMI Cotroller Workstation
Operational Level
Level 2
HMI
Computers
Operator Redundant Operator
HMI Automation servers HMI
Level 1
PLC Control / Automation Level
Controllers
Managed switch PLC Process A PLC Process B PLC Process C
with VPN
Level 0
Sensors/ Sensors/ Sensors/
Control Field Level
Actuators & IEDs Actuators & IEDs Actuators & IEDs
Sensors - Process A - Process B - Process C (Sensors, Actuators)
Figure 15: Overlap zones between the models (PERDUE and the triangle model)
- UNCLASSIFIED - 30
3.6.1 Layer 0 cyber risks: 3.6.4 Cyber risks in transit 1-2:
• There are sensors and controllers in • This transition is based on
this layer that monitor the operation network communications (LAN)
of machines or active means of over protocols (over TCP), such as
operation, such as contacts, analog MODBUS, 3 DNP PROFINET, IEC
sensors and more. The risk at this 60870-5-104, and more. Outdated
level is manifested in the potential systems use serial communication
of physical or logical attack, which (RS-232), including protocols like
will lead to changes in some MODBUS, 1-DF, PROFIBUS, etc.
component (sensor, pressure The main risk is the ability
regulator, temp, taps, etc.), which to connect to the system,
will incorrectly measure and enter especially if the communication
incorrect data on the analysis of is wireless (unencrypted)
the processes and the implications and also the ability to bridge
thereof. networks and intervene in the
process. Poor configuration of
3.6.2 Cyber risks in transition 0-1: the protection systems (such
• The connection between the as the Firewall) between layers
Level 0 devices and the Level 1 and components will allow an
controller is conducted through attacker to exploit open ports for
electrical or serial and serial continued network expansion
communication connections. The and propagation.
risk at this level is the transmission
of fictitious & wrong data, as well 3.6.5 Layer 2 cyber risks:
as the possibility of tampering • In this layer is the center/control
with wiring or the replacement of server, which manages the process
a material component. and includes the HMI computers. It
should be taken into consideration
3.6.3 Layer 1 cyber risks: that there are HMI systems that
• Controller Mapping (PLC/RTU) that do not receive software updates
manages the controlled process. (Windows XP), mainly due to the
The main risks for this disabling fear of systems crashing after the
process are the change of logic, update. These systems are in the
configuration or alternative code control room, and there is a risk
implantation into the controller. that an unauthorized party will
- UNCLASSIFIED - 31
take unauthorized action, such as data from the control system in
inserting a USB device into one the IP/TCP protocol is transferred
of the computers and causing to the management environment,
the damage to spread. This layer the engineer positions and
also contains an engineering workstations.
server, which has operational • Layer 5: This network contains
information about the software in the IT systems that serve the
the controller and also the control OT systems (sometimes these
center software. stations are connected to the
Internet).
18 https://ics-cert.kaspersky.com/media/KL_ICS_CERT_H2_2018_REPORT_EN.pdf
- UNCLASSIFIED - 32
Figure 17: Component Mapping in the Layer Model (Standard IEC-62443-3-1)
19 https://www.energy.gov/sites/prod/files/Good%20Practices%20Guide%20for%20Firewall%20Deployment.pdf
- UNCLASSIFIED - 33
network) to the operational environment that is connected
network in a manner that prevents to the Internet or the Internet-
queries or direct commands to connected systems, and therefore,
controllers. in this layer, the implementation
- Ensure that settings are adjusted and definition of rules for
and the ability to detect and detect the prevention of direct and
threats in OT protocols. open (outbound and inbound)
- FW settings are suitable for vendor communication to the Internet
support outside the organization. must be ensured - in order to
- Related FW settings for wireless prevent unwanted communication,
connectivity (as needed and Denial-of-Service (DoS) attacks,
after an organization approval Corrupting or preventing internal
process) - To prevent illegitimate messaging.
communication and exploiting - Layer 3 - Dedicated inputs for
attack opportunities on these differentiation versus Layer 420 will
channels. be provided.
- Process for collecting and - Layers 0-2 - The control systems
analyzing attack IDs and defining layer, the HMI and its role to enable
definitions accordingly the monitoring and control of
- Inputs for managing strong command and control processes, to
privileges for changes in the FW enable the operator’s intervention
system. as needed and the permissions
- As part of the process of given to him. The definitions
ensuring compliance with safety and rules of FW that must be
requirements, make sure that applied are against bypass of
the protective measures and FW communications, possible actions
settings do not create failure involving the risk of causing harm
points. and unauthorized actions (both
in laws and restricting unwanted
Highlights for dedicated FW settings communication from the up and
based on the PURDUE model down layers).
20 https://www.sans.org/reading-room/whitepapers/ICS/secure-architecture-industrial-control-systems-36327
- UNCLASSIFIED - 34
3.6.7 Attention to the overall system structure in the organization
Differently from the PURDUE model, as well as from other models, four areas
connected to each other are addressed:
View
Consoles Internet
PLC
/RTU
- UNCLASSIFIED - 35
Extra-organizational connectivity exploiting this connection for attack
for support, service, Command purposes (including Man in the
and Control needs Middle (MITM) threats, Denial of
• This area includes the external Service attack (DoS), exploitation
parties which are required to by hostile parties, and more).
connect to systems, including The operating and control systems
suppliers, support service environment (production line) – This
providers, employees supporting includes the production process,
outside the organization, etc. the engineers’ computers, the HMI
The concern and danger are for systems and the controllers.
- UNCLASSIFIED - 36
4. Risk assessment and management in ICS systems
and principles for addressing in a work plan
21 https://pdfs.semanticscholar.org/cb14/b23b9d0d4242edb1057b722e7a6f923d4885.pdf
- UNCLASSIFIED - 37
Risks arising from lack of policy
Cyber risk management
plan for ICS systems
Risks arising from inherent weaknesses in software
Identification of
Mapping and identifying risk scenarios
Attack Scenarios
Locating risk
mitigation controls
ACCEPT
Figure 19: Cyber risk management process and work plan for IC environment
- UNCLASSIFIED - 38
Figure 20: Framework for SCADA Security Policy in the Organization
- UNCLASSIFIED - 39
• Identification of risk scenarios, things, on: those with an interest
which are also based on in attacking the organization,
intelligence and event history in their capabilities and tools at their
the organization and in the sector disposal, and past attacks.
- a process that is also accompanied
by a review of critical processes of A scenario bank can be used, or
the organization and how feasibility a common risk table, such as the
can affect these processes. The one included in the review in this
risk scenarios depend, among other document, or a table such as this one.
- UNCLASSIFIED - 40
• Assess the impact of the issue within the organization’s
expected damage, if any, on the management, see Supplemental
operating process, safety events, Documents on the Israel National
operational damages such as Cyber Directorate23 website.
disabling a unique system or
controller in a way that would
damage the production line, 4.3. Risk management in
financial damages, etc. the ICS environment versus
• Define defensive response risk management in the IT
and necessary compensatory environment
controls.
Risk management process in ICS
Please note: For a sample
environment is different from
template for conducting a risk
risk management process in IT
survey in operational environments
environment:
and for raising awareness of the
23 https://www.gov.il/he/departments/topics/organization_cyber_protection * In Hebrew
- UNCLASSIFIED - 41
Factor IT OT/ICS Notes
- UNCLASSIFIED - 42
Factor IT OT/ICS Notes
- UNCLASSIFIED - 43
5. ICS system controls
- UNCLASSIFIED - 44
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 45
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 46
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 47
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 48
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 49
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 50
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 51
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 52
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 53
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
The organization
will implement
system of servers
and critical sensors
in the control
environment for
the purpose of
process continuity.
- UNCLASSIFIED - 54
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 55
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 56
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 57
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 58
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 59
Control Title The Control Complementary Control Control
ID explanation Implementation Depth*
Example
- UNCLASSIFIED - 60
6. Bibliography and accompanying reading material
1. 1.0 ( תורת ההגנה הארגונית גרסהIn Hebrew – Organizational Defense Methodology for Organizations
Version 1.0)
2. Clint E. Bodungen, Bryan Singer, (+3) Hacking Exposed, ICS Secrets and Solutions
3. Andrew Ginter, 13 ways through a firewall: What you do not know can hurt you 2013
4. Mariano Nunez, Cyber-attacks on ERP systems, An analysis of the current threat landscape, 2012
Security, May 2015
8. ISO/IEC 27001-2013 and 27002, Cyber security for Information security management systems -ISMS
10. Threat landscape for industrial automation systems, Kaspersky Labs, H2-2018
11. Blake Sobzak, Hackers force water utilities to sink or swim 03-2018
12. https://ics-cert.us-cert.gov/Standards-and-References#conduct
- UNCLASSIFIED - 61
119
[email protected]
www.cyber.gov.il
Find us at: