Article 3: 50 Questions to Be Answered by a CISO Before Starting an IT/OT Cybersecurity Strategy

As we continue our journey toward establishing a robust OT enterprise cybersecurity program, the next critical step involves thorough preparation and understanding. For a Chief Information Security Officer (CISO) and their team, asking the right questions at the outset is essential for crafting an effective strategy. This article outlines key questions that need to be addressed to ensure a solid foundation for an IT/OT cybersecurity enterprise program and to make sure any engagement with a consultant is well-defined.

Before diving into the questions, you may want to revisit the previous articles in this series for foundational insights:

Organizational Overview

  1. Who are your supporters among your leadership and board of directors?
  2. What are the primary verticals of your organization’s operations?
  3. Do you have a formal IT/OT team?
  4. Do you have an OT cybersecurity leader?
  5. In which industry sectors does the company operate?
  6. How many locations does your organization have, and where are they located?
  7. What are the key OT systems and processes critical to your operations?

Current Cybersecurity Posture

  1. Do you currently have an IT cybersecurity program?
  2. Do you have an OT cybersecurity program in place?
  • If yes, what are the main components of your existing program? How do you handle IT and OT convergence? What is the org chart of the IT/OT organization?

Governance and Compliance

  1. What are the regulatory and compliance requirements applicable to your industry (e.g., NERC CIP, IEC 62443, ENISA, etc.)?
  2. Do you have a governance framework for managing OT cybersecurity?
  3. How do you ensure compliance with relevant standards and regulations?

Risk Management

  1. What is the risk score for each of your company’s operation sites?
  2. Do you conduct regular risk assessments for OT systems?
  • If yes, what are the main cybersecurity risks and threats to your OT environment?
  1. How do you prioritize and mitigate these risks?

Asset Management

  1. Are all your OT assets connected to the network?
  2. Do you maintain an inventory of all OT assets?
  3. Are these assets classified and prioritized based on criticality?
  4. How do you classify these assets?

Network Security

  1. Do you have an IT/OT reference network architecture?
  • If yes, have you applied it to all of your sites?
  1. How is your OT network segmented from your IT network?
  2. How many of your sites or subsystems are air-gapped?
  3. What security measures do you use for air-gapped network security?
  4. How do you measure your OT network security effectiveness?
  5. What protection mechanisms are you using?
  6. What detection mechanisms are you using?
  7. What network security measures (e.g., firewalls, IDS/IPS) are in place?
  8. Do you employ network traffic analysis tools for OT environments?
  9. How do you handle network anomalies and suspicious activities?

Access Control

  1. What access control mechanisms are implemented for OT systems?
  2. What are the main specifications of the typical OT access control technology?
  3. Do you use zero trust and multi-factor authentication (MFA) for accessing critical OT systems?
  4. Do you conduct regular audits of access control policies? (Added)

Incident Response

  1. Do you have an incident response plan specific to OT environments?
  • If yes, is it integrated with your main corporate plan?
  1. How often do you conduct OT incident response drills and simulations?
  2. How often do you conduct IT/OT incident response drills and simulations?

Continuous Monitoring

  1. What tools and technologies do you use for continuous monitoring of OT environments?
  2. What are the standard specifications you use for OT monitoring tools?
  3. How do you measure the effectiveness of the monitoring tools?
  4. How do you integrate threat intelligence into your monitoring processes?
  5. Do you use advanced analytics for threat detection?

Training and Awareness

  1. Do you have clear job descriptions for each of your employees?
  2. Do you offer an OT cybersecurity training program for all levels within the company?
  • If yes, how is this program integrated into the company-wide functional training program?
  1. Do you conduct regular cybersecurity training for employees, especially those working with OT systems?
  2. How do you promote cybersecurity awareness within the organization?

Vendor and Supply Chain Security

  1. How do you assess the cybersecurity practices of your OT vendors and suppliers?
  2. How is this linked to your corporate policies as a whole?
  3. What measures are in place to secure the supply chain and ensure a secure bill of materials?

Budget and Resources

  1. What is your current budget for OT cybersecurity?
  2. Do you have sufficient resources (personnel, tools, technologies) to manage OT cybersecurity effectively?

By addressing these questions, a CISO and their team can gain a comprehensive understanding of their current state and identify the necessary steps to build an effective OT cybersecurity program or at least a scope of work aiming to close the gaps identified from the questionnaire. This preparation sets the stage for developing a strategic plan that addresses the unique challenges of securing OT environments.

Stay tuned for our next article, where we will delve into the basic strategy of an enterprise OT cybersecurity program, outlining the essential components and sub-components to build a resilient and robust security posture. Feel free to contact me directly if you need support or have any questions.

 

Conversely, OT environments might seem less complex from a network and software perspective because they typically involve fewer, more specialized systems and experience fewer changes over time. However, this surface simplicity belies the intricate nature of OT. These systems focus on real-time communication and swift control actions, dedicating most machine resources to operational tasks rather than computational diversity. OT systems are integral to industrial automation, controlling everything from standard operations to emergency systems, fire and gas protection, and access control within physical plants.

Addressing the Skills Shortage

The convergence of IT and OT has necessitated a collaborative approach under unified leadership to effectively tackle integration challenges. Reports indicate that over 60% of industry professionals cite a “Shortfall of OT Cybersecurity skills” as a major barrier to enhancing security, with more than 50% pointing to a lack of awareness about OT threats as a primary concern.

What Are Key OT Systems?

In the realm of industrial automation, technological evolution has significantly enhanced the control and monitoring capabilities of various systems. At the heart of this progression are Programmable Logic Controllers (PLCs), Distributed Control Systems (DCS), and Supervisory Control and Data Acquisition (SCADA) systems, each playing the main role in the modern industrial landscape.

Diving Deeper into Technology

PLCs are digital computers specifically designed for automating electromechanical processes such as controlling machinery on factory assembly lines, hot oil heaters in a gas plant, or gas turbines in a power generation facility. They are programmable, allowing them to perform a wide array of functions including logic, sequencing, timing, and counting based on inputs and outputs they receive. PLCs are known for their robustness and are predominantly used to handle discrete events. They are also more cost-effective, making them commonly used in automation discussions.

The real complexity of OT lies in its integration with physical processes.

In most cases, proprietary software and communication protocols are used. Any malfunction in OT can have immediate physical impacts, potentially leading to severe damage or even loss of life. This is in stark contrast to the IT environment, where similar failures might result in data loss or service downtime, but rarely pose immediate physical danger. Thus, while the OT environment might appear simpler in terms of IT components like PCs and networks, its operational complexity and the critical nature of its functions make it a challenging domain requiring specialized, nuanced cybersecurity approaches that are intimately connected with its physical operational imperatives.

Understanding Operational Technology (OT)

OT comprises the hardware and software systems that monitor and control physical processes, devices, and infrastructures, such as PLCs, DCS, and SCADA systems. Essential for ensuring the smooth operation of industrial processes and infrastructures, OT is a prime target for cyber threats. The implementation of OT varies widely across industries, influenced by factors like the environment, location, and the level of integration with corporate IT systems.

Examples of OT Cybersecurity in Key Sectors

Oil and Gas

In the oil and gas industry, operational technology (OT) systems are responsible for controlling complex integrated processes. These processes include power generation, water treatment, building management, wastewater management, wellhead control, drilling (mostly standalone control systems), production, refining, and distribution. It’s important to note that these systems are often located in remote areas and are intended to be standalone. As a result, they require robust, resilient, and secure communication systems due to their isolation and the complex integration between plant-level and site business IT networks, as well as communication with corporate IT. Cybersecurity measures in this sector must take into account these unique operational conditions to effectively protect against potential threats.

Petrochemicals and Chemicals

OT systems in petrochemical and chemical plants manage operations from chemical reactions to product formulation and packaging. Cybersecurity strategies here focus on preventing disruptions that could lead to significant safety incidents or environmental damages. This involves implementing stringent access controls, real-time monitoring, and comprehensive incident response strategies.

Power and Utilities

In this sector, OT systems control critical infrastructures such as power plants, substations, and grid operations. Cybersecurity efforts aim to ensure the reliability and resilience of the grid to prevent disruptions that could compromise safety or cause widespread outages. This sector also emphasizes regulatory compliance and security standards, directly impacting people’s day-to-day work.

Building Automation and Utilities

Building automation systems (BAS) integrate various building services like HVAC, lighting, and security, often within urban environments and integrated with smart technologies and IoT devices. Cybersecurity for BAS focuses on protecting against unauthorized access, ensuring data integrity, and maintaining the operation of critical building functions in large buildings you may find a DCS as a controller

Manufacturing

In most cases, proprietary software and communication protocols are used. Any malfunction in OT can have immediate physical impacts, potentially leading to severe damage or even loss of life. This is in stark contrast to the IT environment, where similar failures might result in data loss or service downtime, but rarely pose immediate physical danger. Thus, while the OT environment might appear simpler in terms of IT components like PCs and networks, its operational complexity and the critical nature of its functions make it a challenging domain requiring specialized, nuanced cybersecurity approaches that are intimately connected with its physical operational imperatives.

Understanding Operational Technology (OT)

OT comprises the hardware and software systems that monitor and control physical processes, devices, and infrastructures, such as PLCs, DCS, and SCADA systems. Essential for ensuring the smooth operation of industrial processes and infrastructures, OT is a prime target for cyber threats. The implementation of OT varies widely across industries, influenced by factors like the environment, location, and the level of integration with corporate IT systems.

Examples of OT Cybersecurity in Key Sectors

Oil and Gas

In the oil and gas industry, operational technology (OT) systems are responsible for controlling complex integrated processes. These processes include power generation, water treatment, building management, wastewater management, wellhead control, drilling (mostly standalone control systems), production, refining, and distribution. It’s important to note that these systems are often located in remote areas and are intended to be standalone. As a result, they require robust, resilient, and secure communication systems due to their isolation and the complex integration between plant-level and site business IT networks, as well as communication with corporate IT. Cybersecurity measures in this sector must take into account these unique operational conditions to effectively protect against potential threats.

Petrochemicals and Chemicals

OT systems in petrochemical and chemical plants manage operations from chemical reactions to product formulation and packaging. Cybersecurity strategies here focus on preventing disruptions that could lead to significant safety incidents or environmental damages. This involves implementing stringent access controls, real-time monitoring, and comprehensive incident response strategies.

Power and Utilities

In this sector, OT systems control critical infrastructures such as power plants, substations, and grid operations. Cybersecurity efforts aim to ensure the reliability and resilience of the grid to prevent disruptions that could compromise safety or cause widespread outages. This sector also emphasizes regulatory compliance and security standards, directly impacting people’s day-to-day work.

Building Automation and Utilities

Building automation systems (BAS) integrate various building services like HVAC, lighting, and security, often within urban environments and integrated with smart technologies and IoT devices. Cybersecurity for BAS focuses on protecting against unauthorized access, ensuring data integrity, and maintaining the operation of critical building functions in large buildings you may find a DCS as a controller

Manufacturing

In manufacturing, OT systems automate production lines and manage logistics. The rise of smart manufacturing and Industry 4.0 introduces new cybersecurity challenges, necessitating enhanced measures to secure the supply chain, implement strict access controls, and maintain the integrity of production processes.

"While the core components of OT cybersecurity are similar across industries, specific challenges vary greatly. Factors such as the operational environment, geographic location, regulatory requirements, and the level of integration with IT systems significantly influence the cybersecurity strategies that must be implemented."

Tailoring OT Cybersecurity Strategies

Effectively securing OT environments requires strategies that consider the unique needs and challenges of each industry. This involves conducting comprehensive risk assessments, adhering to industry-specific standards, developing customized incident response plans, and fostering collaboration among IT and OT teams, industry peers, and regulatory bodies.

At the End

OT cybersecurity is a dynamic field that requires a deep understanding of the unique challenges and requirements of different verticals.

By recognizing the distinct characteristics of OT environments in different sectors, organizations can develop cybersecurity strategies that are effective and specific, ensuring robust protection against the evolving landscape of cyber threats. This tailored approach underscores the importance of customization in OT cybersecurity, ensuring that each sector’s specific needs are met to safeguard against ever-evolving cyber threats.

This series will continue exploring the unique aspects of OT and OT cybersecurity program components to develop the right Cybersecurity strategy.

The Evolution of Industrial Automation

The technological evolution has significantly enhanced control and monitoring capabilities through devices like PLCs, DCSs, and SCADA systems. These systems manage everything from assembly line automation to complex operations across large industrial plants, with PLCs handling discrete event processes and DCSs managing continuous processes like those in chemical plants and power generation. SCADA systems provide high-level supervisory management and real-time data collection across distributed systems like water supply networks and power grids.

As OT becomes more complex in its journey towards autonomous operation beyond manufacturing, the interconnectivity and collaboration required between PLCs, SCADA systems, DCSs, and various sensors pose new challenges and introduce new security risks.

The security needs of various environments necessitate tailored OT cybersecurity approaches and strategies.

Looking Forward This series will continue to explore the unique aspects of OT and why traditional comparisons with IT no longer apply. Our goal is to deepen the understanding of OT’s critical role and its specific security challenges, paving the way for more effective and nuanced cybersecurity strategies in industrial environments.

About me

Mohammed Saad is an experienced OT cybersecurity leader and innovator with over 19 years of expertise in driving business growth and technological advancements across three continents. Based in Georgia, USA, he excels in developing strategic cybersecurity programs, guiding startups, and shaping the future of industrial automation.

Most Recent Posts

© 2024 Mohammed Saad | Transforming Challenges, Driving Innovation

Blog

Get the latest update for my blog and thoughts

You have been successfully Subscribed! Ops! Something went wrong, please try again.
© 2023 Created with Royal Elementor Addons