National Academies Press: OpenBook
« Previous: MONITORING RAW SENSOR DATA AND CONDITION: A PARADIGM CHANGE
Suggested Citation:"REFERENCES." National Research Council. 2023. Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices. Washington, DC: The National Academies Press.
×
Page 14
Suggested Citation:"REFERENCES." National Research Council. 2023. Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices. Washington, DC: The National Academies Press.
×
Page 15
Suggested Citation:"REFERENCES." National Research Council. 2023. Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices. Washington, DC: The National Academies Press.
×
Page 16

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

lead to physical and computer inspections to determine why there was a change in the electrical signals when the system appeared stable. The entire sequence could have been avoided. A paradigm change to monitoring sensor signals and conditions would have many advantages. The raw signals from process sensors would provide the ground truth about the physical operation of the process in question. A system to monitor these raw signals would detect anomalies regardless of the source rather than first “seeing” the sensor inputs once they have entered the OT network. As a result, it would not be susceptible to either unintentional or intentional IT or OT network compromises, including ransomware attacks and vulnerabilities from patches in the manner of the SolarWinds hack. This would provide a level of sensor signal authentication that otherwise would not exist. Because such a system would also provide sensor health monitoring capability, maintenance intervals could be lengthened rather than relying on scheduled maintenance. Such sensor monitoring systems would also provide risk reduction and reduce the impacts of cyber incidents. EFFORTS TO ADDRESS CONTROL SYSTEM CYBERSECURITY The National Institute of Standards and Technology (NIST) has issued a Cybersecurity Framework (NIST undated). It is based on what NIST calls five core functions—Identify, Protect, Detect, Respond, and Recover. The lack of security in control systems and component devices makes achieving all phases of the NIST Cybersecurity Framework challenging, especially when attempting to conduct forensics acquisitions activities post-incident. NIST also issued Security and Privacy Controls for Information Systems and Organizations (SP 800-53 Rev. 5; NIST 2020) and is updating its draft Guide to Operational Technology (OT) Security (SP 800-82 Rev. 3; NIST 2022a) in April 2022. The Department of Energy Federal Energy Management Program has developed cybersecurity requirements for procurement, including planning factors and contract language (DOE undated). It remains to be seen to what extent these efforts apply to the IP networks and to what extent that address the security of control systems and Level 0 and 1 devices. CLOSING The critical flaw in facilities cybersecurity is the lack of cybersecurity, authentication, and cyber logging in process instrumentation. If users cannot trust incoming measurements, they have no cybersecurity, safety, or resilience. This gap and the related organizational culture differences between IT personnel and facility engineers needs to be addressed in order to improve the confidence in and safety, performance, and resilience of facility control systems. REFERENCES Association of State Dam Safety Officials. Undated. “Case Study: Taum Sauk Dam (Missouri, 2005): Description & Background.” Lessons Learned from Dam Incidents and Failures. https://damfailures.org/case-study/taum-sauk-dam-missouri-2005/. Accessed November 23, 2022. BACnet International. Undated. “BACnet Secure Connect Interoperability Acceleration Program.” https://www.bacnetinternational.org/page/secureconnect. Accessed March 3, 2022. Bae, Y., S. Bhattacharya, B. Cui, S. Lee, Y. Li, L. Zhang, P. Im, V. Adetola, D. Vrabie, M. Leach, and T. Kuruganti. 2021. “Sensor Impacts on Building and HVAC Controls: A Critical Review for Building Energy Performance.” Advances in Applied Energy 4. https://doi.org/10.1016/j.adapen.2021.100068. Federal Facilities Council Control System Security White Paper 14

CISA (Cybersecurity and Infrastructure Security Agency). 2016. “Cyber-Attack Against Ukrainian Critical Infrastructure.” ICS Alert (IR-ALERT-H-16-056-01). Last modified June 20, 2021. https://www.cisa.gov/uscert/ics/alerts/IR-ALERT-H-16-056-01. DHS (Department of Homeland Security) and DOS (Department of State). 2019. “A Guide to Critical Infrastructure Security and Resilience. Cybersecurity and Infrastructure Security Agency.” https://www.cisa.gov/sites/default/files/publications/Guide-Critical-InfrastructureSecurity- Resilience-110819-508v2.pdf. DOE (Department of Energy). Undated. "Cybersecurity Considerations for Procurement." Federal Management Program. https://www.energy/gov/eere/femp/cybersecurity-considerations- procurement. Accessed October 27, 2022. Eddy, R.P., and R.A. Clarke. 2017. Warnings: Finding Cassandras to Stop Catastrophes. New York: Harper Collins. FBI (Federal Bureau of Investigation). Undated. “Morris Worm.” https://www.fbi.gov/history/famous- cases/morris-worm. Accessed February 25, 2022. ISA (International Society of Automation). 2022a. “Building Automation.” https://www.isa.org/technical- topics/building-automation. Accessed March 4, 2022. ISA. 2022b. “ISA111, Unified Automation for Buildings.” https://www.isa.org/standards- andpublications/isa-standards/isa-standards-committees/isa111. Accessed March 3, 2022. ISASecure. Undated. “IEC 62443 Conformance Certification.” https://isasecure.org/en-US/. Accessed March 3, 2022. Jibilian, I., and K. Canales. 2021. “The US Is Readying Sanctions Against Russia over the SolarWinds Cyber Attack. Here’s a Simple Explanation of How the Massive Hack Happened and Why It’s Such a Big Deal.” Business Insider. https://www.businessinsider.com. Knapp, E., and J.T. Langill. 2015. Industrial Network Security. Second Edition. Elsevier. https://doi.org/10.1016/C2013-0-06836-3. Meserve, J. 2007. “Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid.” CNN. http://www.cnn.com/2007/US/09/26/power.at.risk/. Niemeyer, L. 2021. “Ask Me Anything with Lucian Niemeyer.” IIoT World’s ICS Cybersecurity Day. IIoT World. https://cybersecurity2021.iiotday.com. NIST (National Institute of Standards and Technology). 2020. “Security and Privacy Controls for Information Systems and Organizations.” NIST Special Publication 800-53, Revision 5. Joint Task Force. December. https://doi.org/10.6028/NIST.SP.800-53r5. NIST. 2022a. “Guide to Operational Technology (OT) Security.” NIST Special Publication 800-82r3 ipd. https://doi.org/10.6028/NIST.SP.800-82r3.ipd. NIST. 2022b. “Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing.” NIST Special Publication 1800-10. March. https://doi.org/10.6028/NIST.SP.1800-10. NIST. Undated. “Cyber Security Framework.” https://www.nist.gov/cyberframework. Accessed October 26, 2022. Oladimeji, S., and S. Kerner. 2022. “SolarWinds Hack Explained: Everything You Need to Know.” https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to- know. Tucker, E. 2021. “Microsoft Exchange Hack Caused by China, US and Allies Say.” Associated Press News. https://apnews.com/article/microsoft-exchange-hackbiden-china- d533f5361cbc3374fdea58d3fb059f35. Weiss, J. 2010. “The Need for Interdisciplinary Programs for Cyber Security of Industrial Control Systems.” WorldComp 2010 Conference. Weiss, J. 2018. “Data Centers Have Been Damaged and They Are Not Being Adequately Cyber Secured.” Unfettered Blog, CONTROL. September 17. https://www.controlglobal.com/home/blog/11305965/information-technology. Federal Facilities Council Control System Security White Paper 15

Weiss, J. 2020. “Attention Policymakers: Cybersecurity Is More than an IT Issue.” PE: The Magazine for Professional Engineers. Weiss, J. 2021a. “Are Your Buildings and Cloud Cyber Secure?” Unfettered Blog, CONTROL. April 28. https://www.controlglobal.com/home/blog/11292403/information-technology. Weiss, J. 2021b. “Do the Chinese ‘Own’ Our Electric Grids and Other Infrastructures?” Unfettered Blog, CONTROL. August 27. https://www.controlglobal.com/home/blog/11290637/information- technology. Weiss, J. 2021c. “Engineering, Operations, and Maintenance Often Do Not View Cyber Security as Their Problem.” Unfettered Blog, CONTROL. March 28. https://www.controlglobal.com/home/blog/11292721/information-technology. Weiss, J. 2021d. “Network Security Often Does Not View Control System Devices and the Process as Their Problem.” Unfettered Blog, CONTROL. April 5. https://www.controlglobal.com/home/blog/11292655/information-technology. Weiss, J. 2022a. “Lack of Applicability of NIST Special Publication 1800-32 to Process Sensors.” Unfettered Blog, CONTROL. February 9. https://www.controlglobal.com/home/blog/11288439/information-technology. Weiss, J. 2022b. “A Vulnerability Worse than Log4j (And It Can Blow Up Facilities and Shut Down the Grid).” Unfettered Blog, CONTROL. January 2. https://www.controlglobal.com/home/blog/11289053/information-technology. Weiss, J., and A. Samoiloff. 2019. “Changing the Paradigm of Control System Cyber Security— Monitoring Process Sensor Health.” 74th Annual Instrumentation and Automation Symposium for the Process Industries. https://sigasec.com/wp-content/uploads/2019/07/Changing-the- Paradigm-of-ControlSystem-Cyber-Security.pdf. Weiss, J., and B. Hunter. 2021. “The SolarWinds Hack Can Directly Affect Control Systems.” Cybersecurity and Deterrence (blog). The Lawfare Institute. January 22. https://www.lawfareblog.com/solarwinds-hack-can-directly-affect-control-systems. Wolf, M. 2014. High-Performance Embedded Computing. Second Edition. Elsevier. https://doi.org/10.1016/C2012-0-07058-5. Federal Facilities Council Control System Security White Paper 16

Next: Appendix A: Glossary »
Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices Get This Book
×
 Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Cybersecurity for Level 0 and Level 1 devices - which include sensors, the Industrial Internet of Things, and operate on a time scales ranging from milliseconds to seconds - is underdeveloped. This Federal Facilities Council white paper addresses changes to improve cybersecurity, productivity, process safety, predictive maintenance, and resilience, while also breaking down cultural and organizational barriers.

This is not a publication of the National Academies of Sciences, Engineering, and Medicine. The views expressed in this publication are solely those of the author and do not necessarily reflect the views of the National Academies of Sciences, Engineering, and Medicine.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!