managing risk in the electric power sector · managing risk in the electric power sector 8...

23
Managing Risk in the Electric Power Sector April 2019

Upload: others

Post on 18-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorApril 2019

Page 2: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 2

Introduction and objectives

Andrea LeStargeSenior Manager

Risk & Financial AdvisoryDeloitte

[email protected]

Objectives

• Baseline on the definition of “risk”

• Introduce methodologies that can help personnel manage cyber risk within the electric power sector

• Engage in a moderated discussion pertaining to the five core functions of the Cybersecurity Framework (CSF) from the National Institute of Standards and Technology (NIST) to share risk-managing activities in the power and utility field

Page 3: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 3

Agenda

Baselining terminology to understand the cyber risk landscape

Development of NIST CSF

CSF Components and the parallels with the NERC CIP Compliance framework

How to use the NIST CSF repeatable assessment framework

Lessons learned

Questions and answers

Page 4: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 4

Threat

ConsequenceVulnerability

Baselining terminologyFor today’s discussion, we will refer to the below diagram that visualizes risk as a function of threat, vulnerability and consequence.

Likelihood of the

Adversary’s capability

Likelihood of impact

Likelihood of the

Adversary’s intent

Page 5: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 5

Cyber risk landscape Looking through the lens of “risk as a function of threat, vulnerability and consequence,” we can better understand the cyber risk landscape.

Social engineering

Phishing

Botnets

Exploits

Ransomware

TECHNICAL COMPLEXITY

Organized crime

Actors

Techniques

Vectors

Suppliers & partners

Employees & contractors

Mobile devices

Network Access

Physical Access

Nation-state actors

Impacts

Individuals

Ideological groups

DDoSWebsite compromise

Password theft

Evasion tactics

PEOPLE, TALENT AND CULTURE PROCESS /GOVERNANCE

Data loss IP theftThreat to

life or safety

Operational disruption

Reputation damage

Fraud or revenue

loss

MalwareTargeted

Zero-DaysAuthorized

AccessCounter-feit

Devices

Page 6: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 6

The landscape: Attacks since 2009

Common attack entry points from the supply chain include:

Watering holes

Malware

Viruses

Ransomware

However, threat actors can introduce compromised components into a system, unintentionally or by design, at any point of a system’s life cycle.

• 2009 | ShodanSearch engine to find Internet-connected devices (including control system devices)

• July 2010 | StuxnetAttack on SCADA control systems irreparably damaged centrifuge equipment at Iranian nuclear facilities

• October 2010 | MetasploitThe security tools was developed to explore system vulnerabilities; hackers began using it to target ICS devices

• August 2012 | ShamoonVirus destroys data as means to disrupt operations. Hit 15 state and private entities in Saudi Arabia

• December 2015 | Ukraine Power Grid 1 (BlackEnergy)Attackers deployed SCADA-related plugins to control ICS and turn off power to 230,000 residents of western Ukraine

• 2016 | Ukraine Power Grid 2 (CrashOverride)Designed to attack electric grids, it took down a Ukrainian transmission-level substation and caused an outage by leveraging legitimate grid operations against the grid itself

• January 2017 | Shamoon 2This second round of the virus hit a number of state agencies and private sector companies in Saudi Arabia

• August 2017 | Trisis/TritonPenetrated the safety systems of a petrochemical plant in Saudi Arabia. Designed not just to destroy data or shut down the plant but to sabotage operations and trigger an explosion1

• Winter 2018 | Critical Infrastructure VendorsUS-CERT alerts state-sponsored attacks on critical infrastructure vendors 2

Sources: 1 Managing cyber risk in the electric power sector, Deloitte Insights, Jan 2019.2 US-CERT Alert (TA18-074A), National Cybersecurity and Communications

Integration Center, Mar 16, 2018.

Page 7: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 7

Cybersecurity Framework DevelopmentThe Framework development process initiated with Executive Order 13636, which was released on February 12, 2013. The Executive Order introduced efforts on the sharing of cybersecurity threat information, and on building a set of current and successful approaches, a framework, for reducing risks to critical infrastructure.

Through this Executive Order, NIST was tasked with the development of a "Cybersecurity Framework"

1 Critical infrastructure is defined in the U.S. Patriot Act of 2001 as, “Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”

National Institute of Standards & Technology (NIST) was selected for the task of developing the Framework because they are a non-regulatory Federal agency that acts as an unbiased source of scientific data and practices, including cybersecurity practices.

NIST published the Cybersecurity Framework (CSF) version 1.0 on February 12, 2014 after a year-long collaborative effort with stakeholders in the critical infrastructure1 sector. The latest version (version 1.1) was released on April 16, 2018.

CSF leverages elements of existing well-known risk management frameworks, processes, and guidelines (i.e., COBIT, ISA, ISO 27001 and NIST SP800/53).

Page 8: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 8

Cybersecurity Framework ComponentsThe framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts as shown below. The components reinforce the connection between business/mission drivers and cybersecurity activities.

Implementation Tiers

Core 

Profile

• Describes the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework (e.g., risk and threat aware, repeatable, and adaptive)

• Cybersecurity activities and informative references, organized around particular outcomes

• Enables communication of cybersecurity risks across an organization

• Aligns industry standards and best practices to the Framework Core in a particular implementation scenario

• Supports prioritization and measurement while factoring in business needs

Page 9: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 9

Framework CoreThe core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. It comprises four elements: Functions, Categories, Subcategories, and Informative References.

Aids an organizationin expressing itsmanagement of

cybersecurity risk byorganizinginformation

Subdivisions of a function into groups

of cybersecurity outcomes closely tied

to programs and particular activities

Divides a categoryinto specific

outcomes of technicaland/or management

activities

Specific sections of standards, guidelines,

and practices common among

critical infrastructure sectors

Page 10: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 10

Parallels with the NERC CIP Compliance frameworkThe following NERC CIP Compliance framework defines the program elements necessary to implement and maintain an effective program:

Governance Culture of

Compliance Risk

Assessment

Compliance Organization

Policies & Procedures

Communications & Training

Supervision & Performance Management

Controls & Monitoring Reporting

Sub Components:• Cyber Asset Management• Physical Security• Information Protection• Systems Management• Production Change

Management

• Personnel Risk Assessment• Identity and Access Management• Incident Response• Security Information & Event

Management• Vulnerability Management

Page 11: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 11

Moderated discussion How would you answer each of the five questions below?

12345

What processes and assets need protection?

What safeguards or countermeasures are available?

What techniques can identify security incidents?

What activities can help contain the impacts of incidents?

What activities are required to restore capabilities?

Page 12: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 12

Framework Core (cont’d)

Function Category The Challenge Physical Controls

Cyber Controls

Identify

Asset Management

What processes and assets need protection?

Business EnvironmentGovernanceRisk AssessmentRisk Management StrategySupply Chain Management

Protect

Access Control

What safeguards or countermeasures are

available?

Awareness and TrainingData SecurityInfo Protection Process & ProcedureMaintenanceProtective Technology

DetectAnomalies and Events What techniques can

identify cybersecurity incidents?

Security Continuous MonitoringDetection Processes

Respond

Response Planning

What activities can help contain the impacts of

incidents?

CommunicationsAnalysisMitigationImprovements

RecoverRecovery Planning What activities are

required to restore capabilities?

ImprovementsCommunications

Functions are to be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk.

Page 13: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 13

Framework Core (cont’d)

Function Category The Challenge Physical Controls

Cyber Controls

Identify

Asset Management

What processes and assets need

protection?

Business Environment

Governance

Risk Assessment

Risk Management Strategy

Supply Chain Management

Functions are to be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk.

Page 14: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 14

Framework Core (cont’d)

Function Category The Challenge Physical Controls

Cyber Controls

Protect

Access Control

What safeguardsor

countermeasuresare available?

Awareness and Training

Data Security

Info Protection Process & Procedure

Maintenance

Protective Technology

Functions are to be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk.

Page 15: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 15

Framework Core (cont’d)

Function Category The Challenge Physical Controls

Cyber Controls

Detect

Anomalies and Events

What techniques can identify

cybersecurity incidents?

Security Continuous Monitoring

Detection Processes

Functions are to be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk.

Page 16: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 16

Framework Core (cont’d)

Function Category The Challenge Physical Controls

Cyber Controls

Respond

Response Planning

What activities can help contain the impacts of

incidents?

Communications

Analysis

Mitigation

Improvements

Functions are to be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk.

Page 17: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 17

Framework Core (cont’d)

Function Category The Challenge Physical Controls

Cyber Controls

Recover

Recovery Planning

What activities are required to

restore capabilities?

Improvements

Communications

Functions are to be performed concurrently and continuously to form an operational culture that addresses the dynamic cybersecurity risk.

Page 18: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 18

Framework Implementation TiersImplementation Tiers provide context on how an organization views cybersecurity risk and the processes in place to manage that risk. An organization’s current risk management practices, threat environment, legal and regulatory requirements, information sharing practices, business/mission objectives, and supply chain cybersecurity requirements are considered while determining the tiers.

Tier 1: Partial

Tier 2: Risk Informed

Tier 3: Repeatable

Tier 4: Adaptable

Risk Management ProcessThe degree to which risk management processes are applied in alignment with organizational risk objectives, changes in business/mission requirements and a changing threat and technology landscape.

• Not formalized • Ad hoc• Prioritization is 

not informed

• Formalized, but no organizational‐wide policy

• Directly informed 

• Formal • Regularly 

updated 

• Incorporates:o Predictive 

indicatorso Lessons Learned

Integrated Risk Management ProgramDefinition and implementation of risk-informed policies, processes, and procedures to enable personnel to possess the knowledge and skill to perform their appointed cybersecurity roles and responsibilities.

• Irregular, case‐by‐case basis

• Regular, but no organizational‐wide approach

• Consistent, organization‐wide approach

• Cybersecurity risk management is part of the organization’s culture

External ParticipationUnderstanding of an organization’s role, dependencies, and dependents in the larger ecosystem by collaborating with and receiving information from other entities regularly that complements internally generated information, and sharing information with other entities

• Lack of:o Ecosystem 

understanding o Collaboration 

• Dependencies or dependents known, but not both

• Internal informal sharing

• Both dependencies and dependents are known

• Internal and external information sharing

• Generates prioritized information

• Communicates proactively

Page 19: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 19

Framework ProfileThe Framework Profile is the alignment of the Functions, Categories, and Subcategories with the business requirements, risk tolerance, and resources of the organization. They can be used to describe the current state or the desired target state of specific cybersecurity activities.

Current Profileindicates the cybersecurity outcomes from the framework categories and sub-categories that are currently being achieved.

1Target Profileindicates the outcomes needed to achieve the desired cybersecurity risk management goals.

2

Gaps are identified by comparing Profiles (e.g., the Current Profile and Target Profile)

3A roadmap is established for reducing cybersecurity risk aligned with organizational and sector goals, legal/regulatory requirements and industry best practices, and reflects risk management priorities

4

Page 20: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 20

It depends on a complex network of third-party relationships. Your organization depends on a complex network of third-party relationships.

Lessons learned: The extended enterprise does not operate in isolation

Facilities

Joint ventures

Technology

Insurance Marketing

R&D

Logistics

Legal & Compliance

SourcingCustomer support

Core Service Providers

Operationalsupport

Human Resources

CustomersShipping

Inventory planning

Suppliers

Brokers/ Agents

Contract manufacturing

Fourth parties

Hardware lease

Licensed vendor

solutions

Disaster Recovery

Hosted vendor solutions

Infrastructure and application support

Media and sales

Advertising agency

Recruiting

Benefits providers

Payroll processing

Contractors

Office products

Waste disposal

Cleaning

Call center

Prime Brokers/Custodians

Transfer Agents

Data Providers

Labs

LicensingCertification bodies

Outsourced Support

Your Organization

Page 21: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Managing Risk in the Electric Power SectorCopyright © 2019 Deloitte Development LLC. All rights reserved. 21

Key themes from all cyber attacks arise, but range from cyber program management and governance to technical architecture considerations. Below are 10 of the most common lessons.

Lessons learned: Known cyber events in utilities and other critical infrastructure

3

4

5

2

1

8

9

10

7

6

• No organization or industry is immune to the threat of a cyber attack

• Apply network segmentation and multi-factor authentication on all systems containing sensitive data

• Conduct periodic audit on critical infrastructure and always be on the lookout for opportunities to improve security

• Minimize potential disruptions in advance of the next cyber attack, companies should review their cyber risk management strategies periodically

• Implement continuous monitoring on critical devices (e.g. ICS/SCADA) to detect anomalous activities

• Even relatively unsophisticated attacks can cause significant damage or operational disruption under the right conditions

• Control applications to reduce the risk of malware-based attacks

• Educate employees and contractors on a regular basis to be always vigilant and increase awareness on potential cyber threats

• Conduct frequent simulated cyber attacks (e.g. phishing awareness exercise, tabletop exercises) at every level of the organization

• Back up data vigilantly to minimize work disruption

Source:#WannaCry: Lessons Learned and Implications, 2017, Mash; Lessons Learned from a Ransomware Attack, 2016, Interset; Lessons from Frontlines of Power Utility Attacks, 2016, Tripwire; 5 Key lessons Learned from Critical Infrastructure Cyber Attacks, RedTeam Security Consulting

Page 22: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

Questions & Answers

Page 23: Managing Risk in the Electric Power Sector · Managing Risk in the Electric Power Sector 8 Cybersecurity Framework Components The framework is a risk-based approach to managing cybersecurity

This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.

About DeloitteDeloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the “Deloitte” name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.

Copyright © 2019 Deloitte Development LLC. All rights reserved.