Aww A Cyber Security Guidance 2019
Aww A Cyber Security Guidance 2019
MANAGEMENT GUIDANCE
Prepared by West Yost Associates
Disclaimer
The authors, contributors, editors, and publisher do not assume responsibility for the validity of the content or any
consequences of its use. In no event will AWWA be liable for direct, indirect, special, incidental or consequential
damages arising out of the use of information presented herein. In particular, AWWA will not be responsible for
any costs, including, but not limited to, those incurred as a result of lost revenue.
2
CONTENTS
ACKNOWLEDGEMENTS .................................................................................................................. 5
EXECUTIVE SUMMARY ................................................................................................................... 7
Use of this Guidance to Support AWIA §2013 Compliance ........................................................ 8
Cybersecurity Guidance and Tool Output Information Security................................................. 9
RECOMMENDED CYBERSECURITY PRACTICES............................................................................... 9
Overview ..................................................................................................................................... 9
Practice Categories...................................................................................................................... 9
Governance and Risk Management ...................................................................................... 10
Business Continuity and Disaster Recovery ........................................................................... 10
Server and Workstation Hardening ....................................................................................... 10
Access Control ........................................................................................................................ 10
Application Security ............................................................................................................... 10
Encryption .............................................................................................................................. 11
Data Security.......................................................................................................................... 11
Telecommunications, Network Security, and Architecture ................................................... 11
Physical Security of PCS Equipment ....................................................................................... 11
Service Level Agreements (SLA) ............................................................................................. 11
Operations Security (OPSEC).................................................................................................. 12
Education ............................................................................................................................... 12
Personnel Security.................................................................................................................. 12
Cyber-Informed Engineering ..................................................................................................... 12
CYBERSECURITY TOOL USER GUIDANCE...................................................................................... 13
Overview ................................................................................................................................... 13
User Interface ............................................................................................................................ 13
Use-Cases .................................................................................................................................. 13
Cybersecurity Controls .............................................................................................................. 14
Recommended Cybersecurity Practices and Improvement Projects ....................................... 16
AWWA Assessment Tool Output .............................................................................................. 21
REFERENCE STANDARDS .............................................................................................................. 24
Appendix A: America’s Water Infrastructure Act (AWIA) of 2018 §2013 .................................. 26
Appendix B: Network Architecture Reference Diagram and Definitions................................... 27
Appendix C: User Interface Questions ........................................................................................ 29
3
Appendix D: Cybersecurity Use-Cases ......................................................................................... 36
Appendix E: Cybersecurity Controls ............................................................................................ 40
Appendix F: Cross Reference to NIST 1.1 Cybersecurity Framework ......................................... 51
4
ACKNOWLEDGEMENTS
This project was funded by the American Water Works Association (AWWA), utilizing Water Industry
Technical Action Fund (WITAF), WITAF Project #039, and managed by Kevin M. Morley.
1
American Water Works Association, Cybersecurity Risk and Responsibility in the Water Sector, 2018.
2
The term process control system (PCS) is preferred over industrial control system (ICS) to avoid confusion with
incident command system (ICS) common in national emergency response planning.
3
Executive Order 13636 - Improving Critical Infrastructure Cybersecurity,
https://www.federalregister.gov/documents/2013/02/19/2013-03915/improving-critical-infrastructure-
cybersecurity
4
The text of AWIA §2013 is included in Appendix A.
These recommended practices are defined by a set of 99 cybersecurity controls that are organized in a
manner to facilitate implementation based on actionable tasks. The outputs of the AWWA Assessment
Tool are designed to present these controls to users in a concise, straightforward manner, facilitate
documentation and support future compliance actions and improvement.
The AWWA Assessment Tool generates a prioritized list of recommended controls based on specific
characteristics of the utility. The user provides information about the manner in which their PCS and
enterprise systems are used. Based on these practices, use cases are selected to recommend controls. For
each recommended control, specific references to existing cybersecurity standards are also provided.
The AWWA Assessment Tool emphasizes actionable recommendations with the highest priority assigned
to those that are expected to provide the greatest impact in the short term. It should be noted, however,
that the tool does not assess the extent to which a utility has implemented any of the recommended
controls. This is the responsibility of the utility. To facilitate this, additional tool outputs were added and
are discussed in the following sections.
This resource is a living document, and further revisions and enhancements will be made based on the
quickly evolving cyber-threat landscape and user feedback.
Utility staff responsible for AWIA §2013 compliance may not be cybersecurity technologists or
responsible for the secure and reliable operation of the PCS and/or enterprise systems. Therefore, it is
recommended that a utility convene internal and external support staff, including, but not limited to:
This approach will improve the quality and timeliness of data collection. In addition, it is expected to
reduce the overall time required to complete compliance actions while also improving the cybersecurity
posture 5 of the organization.
5
The cumulative strength of a utility’s cybersecurity policies, controls, and how effectively they mitigate risk.
6
Anderson, Robert S., Benjamin, Jacob, Wright, Virginia L., Quinones, Luis, and Paz, Jonathan. Cyber-Informed
Engineering. United States: N. p., 2017. Web. https://doi.org/10.2172/1369373
7
Wright, Virginia. Cyber-Informed Engineering. Fermilab Colloquium. September 21, 2016.
https://vms.fnal.gov/asset/detail?recid=1944478&recid=1944478
8
Bochman, Andy. The End of Cybersecurity. Harvard Business Review. May 2018.
Control
User Interface Identification/Priority Output
Self-Assessment Recommendation
Microsoft Excel Output
1. Start Here
The following sections provide additional detail on the individual inputs, processing steps, and outputs
of the AWWA Assessment Tool.
User Interface
First, the user answers questions on the policies, procedures and use of their PCS and enterprise
systems in the web application. The AWWA Assessment Tool automatically maps the utility’s PCS and
enterprise system configuration and practices to the recommended control. The questions designed to
capture the utility’s PCS and enterprise system configuration and practices are included in a worksheet
format in Appendix C of this guidance.
Use-Cases
A use-case is an elemental pattern of behavior as described by the user of a system; the use-cases in this
document are basic descriptions of important processes from the user's perspective. Based on the use-
cases selected, the tool provides recommended cybersecurity controls. Appendix D includes a table
Cybersecurity Controls
A security control is a measure to support effective cyber defense. Most of the controls in this document
are measures designed to reduce risk; they were developed from many industry standards which were
correlated, integrated, and enhanced. For example, multiple similar controls were merged into a single,
more comprehensive control. Some controls are complex and might resemble an administrative
program, a computer system, or an engineering design methodology. Many cybersecurity service
vendors provide computer systems to implement controls of greater complexity (e.g., network
monitoring tools). Appendix E provides a list of the cybersecurity controls developed for this document
and a table mapping the controls presented in Appendix E to the controls presented in the NIST
Cybersecurity Framework v1.1 is included as Appendix F.
Each control was assigned a priority level based on its criticality and potential impact to the security of
the utility. The recommended controls are categorized into priorities 1, 2, 3, and 4, with priority 1 being
the highest. For each recommended control, a reference is provided to a set of existing cybersecurity
standards. Priority levels are adapted from SANS 9 and are defined as follows:
• Priority 1 Controls – These controls represent the minimum level of acceptable security for PCS and
enterprise systems. If not already in place, these controls should be implemented immediately. In
some cases, they could be considered quick wins that provide solid risk reduction without major
procedural, architectural, or technical changes to an environment. Alternatively, a control may
provide substantial and immediate risk reduction against common attacks. Generally, these will be
cyber-hygiene measures. Utilities with many Priority 1 controls to implement will likely be reactive
to any cyber-attack.
• Priority 2 Controls – These controls build on those in the Priority 1 category. Despite being Priority
2, these controls have the potential to provide a significant and immediate increase in the security
of the organization. Generally, these will be more sophisticated cyber-hygiene measures to improve
the process, architecture, and technical capabilities of the utility. These improvements include
capabilities such as monitoring of networks and computer systems to detect attack attempts, locate
points of entry, identify already-compromised machines, interrupt infiltrated attackers' activities,
and gain information about the sources of an attack.
• Priority 3 Controls – These controls improve information security configuration and hygiene to
reduce the number and magnitude of security vulnerabilities and improve the operations of
networked computer systems, with a focus on protecting against poor security practices by system
administrators and end-users that could give an attacker an advantage. These controls lay the
foundation for sustained implementation of a managed security system. These controls include
9
SANS. CIS Critical Security Controls: Guidelines. https://www.sans.org/critical-security-controls/guidelines. Last
accessed May 1, 2019.
• Priority 4 Controls – These controls are more complex and provide proactive protection against
more sophisticated attacks. These include new technologies, policies, and methods that provide
maximum security but are more complex and potentially more expensive than commoditized
security solutions.
Maturity is a concept that is widely used in other sectors. Generally, the maturity of an organization’s
cybersecurity posture is the extent to which a utility has implemented the recommended controls. It is
also reflective of a utility moving from a reactive to a proactive cybersecurity posture. Adapted from
SANS, 10 Figure 2 illustrates notional levels of maturity.
Proactive
Cybersecurity
Long-Term Posture
Sustainment & Management
Culture Change
More
Sophisticated
Hygiene -
Promoting
Awareness &
Minimum Behavior Change
Fiduciary
Responsiblity
Focused
Hygiene
The maturity levels in Figure 2 are comparable to Tiers 1 through 4 in the NIST Cybersecurity
Framework. The Tiers range from Tier 1 – Partial to Tier 4 - Adaptive. The Tiers describe the degree to
which a utility’s cybersecurity risk management practices exhibit the characteristics defined in the NIST
Cybersecurity Framework. 11
Using this guidance and the Assessment Tool, utilities should assess the controls in place and their
associated implementation status (i.e. maturity) on a recurring basis relative to the current and
anticipated needs of the organization, the current cybersecurity posture of the organization, and the
10
SANS.org. https://www.sans.org/sites/default/files/10_24%20Blog%203%20Commandments.png. Last accessed
May 1, 2019.
11
NIST Cybersecurity Framework. An Introduction to the Components of the Framework.
https://www.nist.gov/cyberframework/online-learning/components-framework. Last accessed May 28, 2019.
4. Access Control
a. Secure PCS and enterprise system access.
i. Physical access to facilities and equipment.
ii. Application access to key software functions.
iii. External access should be controlled. Address requirements for:
1. File exchange into or out of a network. Include system and software
updates.
2. Data exchange between PCS and enterprise systems such as email (alarms),
historical databases, CMMS, LIMS, etc.
3. Establish off-line or isolated system for testing and patch management,
including applications and device programs.
4. Identify what is required for remote access. Restrict remote access to
lowest level of privilege required.
iv. Vendor, contractor system access on plant (incl. package systems). Vendor or
contractor access to system should be manually initiated.
v. Equipment (e.g. network equipment, field devices) access
b. Secure remote access
i. Use VPN technologies to protect information in transit.
ii. Require multifactor authentication (e.g. tokens) for remote access to sensitive
functions.
iii. Limit access to only the minimal level required (e.g. view-only web page).
5. Application Security
a. Require each PCS or enterprise system user to utilize unique credentials (usernames and
passwords) which provide only the required level of access needed to perform their job.
Establish policy for strength of password and periodic renewal. Implement automatic lock
out after adjustable number of failed log-in attempts.
b. Provide separate accounts for administrator and user functions. Do not allow users to
operate with administrator rights unless they are actually administering the system.
c. Provide separate credentials for PCS access compared to enterprise system access. Require
different passwords between systems.
d. Implement audit controls such as logging and monitoring of system access and modification.
e. Aggregate system logs and conduct frequent review of network, application and systems
events.
6. Encryption
a. Implement device and/or storage encryption where theft or loss of a device is a possibility:
i. Smartphones, tablets containing sensitive system information.
ii. Laptops containing programs or other sensitive information.
iii. Equipment (e.g. administrator passwords).
iv. Removable media (e.g. tape, disk, USB removable storage).
b. Implement communications encryption:
i. Wireless communications should be encrypted where possible, regardless of type or
range.
ii. Wired communications over shared infrastructure (e.g. leased, shared) should be
encrypted using VPN technologies to protect sensitive information in transit.
c. Implement “best available” encryption.
i. Use strongest available encryption on existing equipment.
ii. Identify encryption requirements in specifications for new equipment.
d. Implement encryption of confidential data in on-line repositories.
7. Data Security
a. Implement appropriate measures to accept, process, store, and/or transmit customer billing
information. The Payment Card Industry (PCI) priorities include:
i. Remove sensitive authentication data and limit data retention.
ii. Protect systems and networks, and be prepared to respond to a system breach.
iii. Secure payment card applications.
iv. Monitor and control access to your systems.
13. Education
a. Implement a cybersecurity awareness program that includes social engineering.
b. Provide on-going cross training for enterprise system and PCS staff that identifies current
best practices and standards for PCS cybersecurity.
c. Provide basic network and radio communications training for PCS technicians.
d. Participate in water sector programs that facilitate cybersecurity knowledge transfer.
e. Identify appropriate certifications for internal and external staff. Include certification
requirements in SLAs and contracts with external service providers.
f. Provide periodic security awareness training to all employees that identifies risky behaviors
and threats.
g. Promote information sharing within your organization.
12
ICS-CERT. Secure Architecture Design. https://ics-cert.us-cert.gov/Secure-Architecture-Design#nogo.
Last accessed May 1, 2019
13
DHS. Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth
Strategies. https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-
CERT_Defense_in_Depth_2016_S508C.pdf. Last accessed May 1, 2019. September 2016.
Yes
# Question Additional Details
/No
1 Are any data Examples of electronic data transfer include both automatic (e.g.
transferred to or from automated export of data from the PCS environment) and manual
your PCS network, by (e.g. transfer of data to/from the PCS environment via thumb
any electronic means? drive). Examples of data that may be transferred include:
2 Do users manually Users include anyone internal or external with access to PCS. This
transfer any electronic may include operators, technicians, and third-party consultants.
data to or from Users are able to initiate transfer of data to and from the PCS.
your PCS environment? Examples of manual data transfer include:
• USB
• Portable media device
• Temporary network connections (an ad hoc network
connection for transferring data from one computer to
another)
• Shared drives
• Cloud file share (e.g. DropBox)
5 Is remote access to Devices can be any network enabled device either corporate
your PCS network supplied or personal. This includes web view and read only.
allowed via mobile Examples of mobile devices include:
devices?
• Laptops
• Tablets
• Cellphones
• Smart Phones
6 Is remote access to Examples of remote access from physically secured fixed location
your PCS allowed at include:
physically secured fixed
location(s)? • Control center managing remote sites
• Control center remotely managing a treatment center
• Office desktop computer
• Computer at secured office used for managing remote
booster station
9 Do internal staff provide Remote access is from outside (for example, from home) of the
support for your PCS via controlled or control room environments. Devices can be any
remote access? smart phone, tablet, laptop either corporate supplied or personal.
Examples of internal staff providing support by remote access
include:
11 Does your PCS include Examples of 3rd party network communications services include:
3rd party network
communication • Cellular (3G, 4G, 5G)
services? • Dedicated leased line (copper, fiber)
• Communication over internet
• City/county communication network not dedicated to PCS
• Radio - 450MHz
• Radio - 900MHz
• WiFi - 2.4GHz
• WiFi - 5GHz
• WiFi - 6GHz
• Microwave
14 Do you use Wi-Fi within • Does your PCS communication network have wireless
the PCS environment to access points?
transfer data in support • Wi-Fi is defined in IEEE 802.11
of operations or
monitoring?
15 Do you use Virtualization Technology – Technology capable of creating a
virtualization virtual (rather than actual) version of something, including virtual
technology for computer hardware platforms, storage devices, and computer
your PCS? network resources. Examples of virtualization technology include:
• VMware
• Oracle VM
• HyperV
17 Does your organization This information may be collected and stored for service payment
accept, process, store purposes. Using a third-party company for processing PCI may cut
or transmit credit card down on risk exposure but does not exclude a company
or debit card from PCI DSS compliance. Customer billing information including:
information, or accept
payment with pre-paid • Credit/debit card numbers
cards branded with • Credit/debit card numbers with name, expiration date or
American Express, service code
Discover, JCB, • Sensitive authentication data (including magnetic stripe,
MasterCard or Visa PINs, CVV, etc.)
International logos?
NOTE: Includes organizations that have outsourced payment
services.
18 Does your organization PII is any information that may be used to identify an individual.
own, license, acquire or This includes customers, employees, and contractors. Examples
maintain any personally of PII include:
identifiable information
(PII)? • Customer billing information and addresses
• Employee personal information, including SSN, birthdate,
etc.
21 Does your organization Do you currently require your supplier to provide any chain-of-
have a supply chain risk custody documents? An example of supply chain risk
management program? management program includes ordering and confirming
treatment chemicals are NSF certified.
AWWA Guidance
Function Category Sub-Category Description
Control
IDENTIFY Asset ID.AM-1 Physical devices and systems within the organization PM-2
Management are inventoried
ID.AM-2 Software platforms and applications within the PM-2
organization are inventoried
ID.AM-3 Organizational communication and data flows are PM-2
mapped
ID.AM-4 External information systems are catalogued MA-3
ID.AM-5 Resources (e.g., hardware, devices, data, and software) PM-5
are prioritized based on their classification, criticality,
and business value
ID.AM-6 Cybersecurity roles and responsibilities for the entire PE-4, PS-2
workforce and third-party stakeholders (e.g., suppliers,
customers, partners) are established
Business ID.BE-1 The organization’s role in the supply chain is identified RA-2, PS-2,
Environment and communicated CM-5
ID.BE-2 The organization’s place in critical infrastructure and its MA-2
industry sector is identified and communicated
ID.GV-2 Information security roles & responsibilities are PS-2, AU-4, AU-6
coordinated and aligned with internal roles and external
partners
ID.GV-3 Legal and regulatory requirements regarding IR-3
cybersecurity, including privacy and civil liberties
obligations, are understood and managed
ID.GV-4 Governance and risk management processes address AU-3, AU-5, CM-6
cybersecurity risks
Risk Assessment ID.RA-1 Asset vulnerabilities are identified and documented AU-5, RA-1, IR-2
ID.RA-2 Threat and vulnerability information is received from AU-5, PM-3, IR-2
information sharing forums and sources
DETECT Anomalies and DE.AE-1 A baseline of network operations and expected data Not addressed
Events flows for users and systems is established and managed
DE.AE-2 Detected events are analyzed to understand attack SC-5
targets and methods
DE.AE-3 Event data are aggregated and correlated from multiple Not addressed
sources and sensors
DE.AE-4 Impact of events is determined PM-3
DE.AE-5 Incident alert thresholds are established CM-7
Security DE.CM-1 The network is monitored to detect potential CM-7
Continuous cybersecurity events
Monitoring The physical environment is monitored to detect
DE.CM-2 PE-1, CM-7
potential cybersecurity events
DE.CM-3 Personnel activity is monitored to detect potential CM-7, SA-5
cybersecurity events
DE.CM-4 Malicious code is detected SC-5
DE.CM-5 Unauthorized mobile code is detected SA-4
DE.CM-6 External service provider activity is monitored to detect IA-2
potential cybersecurity events
DE.CM-7 Monitoring for unauthorized personnel, connections, PS-1
devices, and software is performed
DE.CM-8 Vulnerability scans are performed IR-2
Detection DE.DP-1 Roles and responsibilities for detection are well defined PS-2
Processes to ensure accountability and adequate awareness of
anomalous events
DE.DP-2 Detection activities comply with all applicable IR-3
requirements