National Academies Press: OpenBook
« Previous: Front Matter and CONTENTS
Suggested Citation:"INTRODUCTION." National Research Council. 2023. Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices. Washington, DC: The National Academies Press.
×
Page 2

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

SUMMARY There are critical flaws in current cybersecurity approaches for all physical infrastructures including facilities. The physical infrastructure, including facilities, are monitored and controlled using process instrumentation and control systems. Unfortunately, most cybersecurity efforts are focused on information technology groups and Internet Protocol (IP) networks. In general, control systems have no cybersecurity, and some are intentionally built to be open for ease of remote access. In effect, control systems can be an open door into otherwise well-protected IP networks. They can also be hacked and their data signals compromised. This situation can leave entire facilities vulnerable to devastating attacks even if they have rigorous cybersecurity in place, as is illustrated by multiple recent cyber incidents that have left various corporations completely incapacitated. Cybersecurity for Level 0 and Level 1 devices— which include sensors, the Industrial Internet of Things (IIoT), and operate on a time scales ranging from milliseconds to seconds—is particularly underdeveloped. Addressing this gap requires fundamental changes in cybersecurity education, funding and implementation, and integration between departments that are currently operating separately, as well as a significant paradigm shift to monitoring process sensors in real time. Movement in these areas would result in improved cybersecurity, productivity, process safety, predictive maintenance, and resilience, while also breaking down cultural and organizational barriers. INTRODUCTION Control systems are designed, developed, operated, and maintained by control system and facility engineers. Control systems use engineering devices, information technology (IT) networks, and network devices that are generally maintained by an organization’s IT department. While the IT community has considered cybersecurity to be important since the Morris Worm in 1988 (FBI undated) the control system community has been late to address cybersecurity of control systems. Control system devices typically have no built-in cybersecurity, authentication, or cyber logging capabilities, and may be open and vulnerable by design to allow for easy remote access. The IT and control system communities have different backgrounds and goals that occasionally conflict. For instance, the IT community is concerned first and foremost with protecting Internet Protocol networks and is evaluated based on its success in doing so. Despite the IT community’s focus on cybersecurity, cyber threats are still a concern even with the newest IT cybersecurity technologies, as seen in the SolarWinds cyberattack, where a reputable and competent cybersecurity company was hacked (Jibilian and Canales 2021). Whereas IT personnel are primarily focused on concerns such as data confidentiality and integrity, as well as data and application availability, the control systems community is concerned with keeping facilities operating as they are supposed to, while providing for safe and reliable operations that do not impact productivity or operational objectives. These two foci are, at times, at odds. There have been incidents where an IT mindset, combined with lack of coordination with OT asset operators, has “bricked” 1 control systems. Examples of this include applying patches to IT systems that are 0F part of the control system, applying patches to OT systems that alter the functionality of the system unintentionally, and active network scanning within an OT network. Overall, there are significant culture gaps between the IT and control systems communities, despite many efforts to bring them together. This paper presents a paradigm change for control system cybersecurity to move from a primarily network-based approach to an engineering issue that will result in improved process reliability, process safety, predictive maintenance, improved productivity and product quality, resilience, and cybersecurity (NIST 2022b). Appendixes include the slides from presentations at an August 2021 workshop on this topic, a list of possible first steps to address control system security in an organization, and a glossary of terms. 1 “Bricking” refers to rendering a device inoperative—that is, turning it into a “brick.” Federal Facilities Council Control System Security White Paper 2

Next: CONTROL SYSTEMS DEFINED »
Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices Get This Book
×
 Challenges in Federal Facility Control System Cyber Security, Including Level 0 and 1 Devices
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Cybersecurity for Level 0 and Level 1 devices - which include sensors, the Industrial Internet of Things, and operate on a time scales ranging from milliseconds to seconds - is underdeveloped. This Federal Facilities Council white paper addresses changes to improve cybersecurity, productivity, process safety, predictive maintenance, and resilience, while also breaking down cultural and organizational barriers.

This is not a publication of the National Academies of Sciences, Engineering, and Medicine. The views expressed in this publication are solely those of the author and do not necessarily reflect the views of the National Academies of Sciences, Engineering, and Medicine.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!