Ugendrin Gounden
Cyber Risk Consulting Leader, Africa
-
South Africa
With the ever-increasing complexity in the Operational Technology (OT) / Industrial Automation and Control Systems (IACS) landscape, cybersecurity risks associated with OT/IACS are increasingly becoming significant, especially for sectors such as Energy and Power, which rely heavily on OT/IACS for their core business operations. The objective of this article is to examine the most prevalent challenges organisations face with regards to their OT/IACS environments, to analyse the potential impact of successful cyber-attacks on these systems, and to explore solutions to reduce these risks to an acceptable level while enhancing the overall cybersecurity posture of the OT/IACS environment.
The primary function of OT/IACS is to control physical processes – many of these processes cannot be interrupted and they often rely on legacy technology with limited security features. This creates several inherent challenges in implementing robust cybersecurity measures in the OT/IACS environment. The most common cybersecurity challenge pertaining to OT/IACS globally, is the presence of out-of-support or end of life systems in the OT/IACS environment, where even patching known vulnerabilities can be challenging.
In addition to the above, through numerous OT/IACS cybersecurity assessments conducted across different organisations within the middle east as well as in other countries globally, we have come across multiple commonly seen critical challenges pertaining to OT/IACS cybersecurity which organisations often face:
Fragmented ownership:
Significant reliance on third parties (maintenance/service providers and product suppliers):
Lack of visibility over OT/IACS assets and the associated cyber-attack surface:
Insufficient segmentation and isolation:
Insecure remote access:
In addition to the above, there are several contributing factors towards OT/IACS cybersecurity risks and challenges:
The above examples are just a sample of some cyber-attacks which have happened in the past, however there are many more scenarios possible. Marsh Risk Engineering can provide clients with extensive support defining credible scenarios and consequences for a cyber-attack on an operating facility via the Marsh Cy-PHA (Cyber Process Hazard Analysis) Technical Method. The outcome of this process is to define an Estimated Maximum Loss (EML) and a Probable Maximum Loss (PML) event with a 1 in 10,000 and 1 in 100 year frequency respectively. Naturally these scenarios will vary greatly between specific energy and power technologies.
In the event of a cyber-attack, it is possible that all DCS based parameters could be manipulated whilst returning normal values to the operations team. However, it is not deemed possible to defeat physical safeguards (for example, safety valves or manually operated valves). It is likely that a cyber-attack would target a system which is simple to manipulate in a short time frame, to avoid detection and preventative action.
Depending on the technology, EML scenarios may be substantial, both in terms of Property Damage, but also with significant Business Interruption potential, due to either loss of access to control systems or equipment repair/re-build times. Potential scenarios could cover some of the following areas:
These example events would all have potentially significant process and personal safety impact, as well as a likely large financial exposure through both Property Damage and Business Interruption. It is important to note that cyber attackers always try to find new ways to exploit vulnerabilities or to find weaknesses within an organisations’ OT/IACS environment – this makes it imperative for organisations to “think like an attacker” and establish a proactive and robust approach to counter such attacks.
While each organisation’s unique operating environment and circumstances drive their efforts towards cybersecurity, a timely, planned, risk-based approach can help avert major cyber-triggered catastrophes. A question often asked is, “Where to begin?”. Considering the OT/IACS cybersecurity challenges which organisations commonly face, below is a summary of the key steps that should be considered to strengthen the cybersecurity posture of the OT/IACS environment:
In conclusion, it is important to note that strengthening the OT/IACS cybersecurity posture of an organisation is a journey, and not a quick fix. While it has similarities with IT cybersecurity, however, the approach can be much more time-consuming considering the complexities and constraints of the OT/IACS environment. It is critical to embark on this journey with appropriate planning, a robust strategy, and a clear roadmap.
Cyber Risk Consulting Leader, Africa
South Africa
Consulting Director, Head of Strategic Risk Consulting, Marsh Africa
South Africa
Senior Manager, Cyber Risk Consulting
South Africa