For some time infosec pros have said best cyber security practice is to have security embedded deep in an organizationโs culture โ meaning in every business process and every product it makes or handles.
Another example of why that standard is important comes from Indegy, a security provider for industrial control systems. In a blog Tuesday the company said it has discovered a vulnerability in Schneider Electricโs Unity Pro software, used for managing the manufacturerโs industrial controllers.
Disclosed to Schnider months ago, the manufacturer has since issued a new release of the software.
But Indegy CTO Mille Gandelsman says its another example of how different the vulnerabilities are in industrial control and enterprise networks.
Getting onto an enterprise network doesnโt necessarily get an attacker into every device attached, he said in an interview. On the other hand because many industrial controllers โ particularly older ones โ lack authentication and their protocols arenโt encrypted if an attacker gains access to the network thereโs access to everything. As a result itโs easy for to issue commands to stop a process, change a process or change a controller configuration.
Industrial controllers, which include programmable logical controllers (PLCs) and remote terminal units (RTUs) are found in a wide range of systems from traffic lights to car assembly lines to hospital equipment to nuclear power stations. As such they qualify as part of the so-called Internet of Things.
Gandelsman admits for an attacker the challenge is getting onto an industrial control network. But the Unity Pro vulnerability shows, a vulnerability can be as near as a workstation.
Attackers canโt gain sensitive or financial information from breaching an operational network. Instead they can shut a system down โ or cause mayhem โ for political or publicity reasons.
However, there are ways of breaching both an enterprise and operational networks if they are linked โ and increasingly they are. Last December an electrical utility Ukraine was hit by a series of power failures blamed on the BlackEnergy trojan. which typically infects an enterprise through a phishing attack that carries a document with an infected Microsoft Word macro. From there malware would try to be used to find a way onto the utilityโs SCADA (supervisory control and data acquisition) network.
Suspicion has fallen on Russia as the source of the attack because it has been locked in a battle with Ukraine over territory.
Gandelsman agrees that all companies need to embrace end to end security. But, he says the DNA of many industrial control manufacturers hasnโt been like that.
Indegy talked about the vulnerability at the ISA Water Symposium. David Zahn, general manager at PAS, Inc., a provider of ICS cybersecurity, was at the session and said in an email that it is good that cybersecurity companies are disclosing these vulnerabilities and following good ethical disclosure practices. But, he added, no one should be surprised that such vulnerabilities exist. ย โThis is tip of the iceberg stuff as most control systems in the field today were designed without cybersecurity as even a consideration.ย It is common to see control systems that are 15, 20, and 25 years old in a production environment.ย They rely on air gapping, complexity, and other factors to protect them, but nothing specific to cybersecurity was inherently built within them.โ
Within industrial facilities, there is also an โif it ainโt broke, donโt fix itโ approach to control systems, he added.ย
Organizations have to start protection by having an inventory of ICS devices, he said. Then perform a risk analysis of each. If a system has sufficient security controls in front of it and is critical to continuous plant operations, one answer might be โdo nothing.โย If the vulnerability is deemed critical enough, then patching the system โ possibly in the next turnaround โ has to be done.
But there also has to be a determination if and whenย an unauthorized change occurred. โIndustry best practices and ICS cybersecurity standards prescribe an automated, auditable approach to change detection, investigation, and response,โ he said. ย โCompanies must have the ability to gather detailed configuration data on industrial control systems and drive investigatory action when necessary.ย Since patches are not applied to industrial control systems with the same frequency or immediacy as IT systems, having an automated change management process โ one where even control logic is monitored โ is critical to knowing whether an attacker has exploited a vulnerability.
โThe trick is to do this across both the traditional IT systems as well as the myriad of proprietary systems found in industrial facilities today.โ