Available via license: CC BY 4.0
Content may be subject to copyright.
Page 1/23
A Cyber Resilience Analysis Case Study of an
Industrial Operational Technology Environment
Kirsty Perrett Researcher
University of South Wales
Ian David Wilson ( ian.wilson@southwales.ac.uk )
University of South Wales
Research Article
Keywords: Cyber Resilience, NIST, Case Study, Industrial Control Systems, Operational Technology, Critical
Infrastructure
Posted Date: November 2nd, 2022
DOI: https://doi.org/10.21203/rs.3.rs-2230111/v1
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Read Full License
Page 2/23
Abstract
Cyber resilience is an active research area offering a novel approach to Cyber Security. The term appeared
due to the concerning number of cyber-attacks on critical infrastructure. The National Institute of
Standards and Technology (NIST) developed a framework to assist organisations with techniques and
approaches to improving cyber resilience. However, there is a sparsity of case studies that speak to the
adoption or measurement of these novel approaches within a complex industrial control environment.
This paper presents a case study analysis of a manufacturing plant assessment drawing on key themes
from the NIST literature. The paper presents how well NIST constructs can be adopted to nd cyber
resilient enhancement opportunities and to decide if an evaluation of the results could supply a
quantitative baseline measure of an organisation’s overall resilience. Conclusions drawn show that
although the framework did partially aid with the analysis process, the frameworks ease of adoption
assumes an organisation has a conventional cyber security foundation; NIST should make this clear
within their guidance. Furthermore, the accompanying evaluation process was not sucient to
quantitatively measure the overall cyber resilience maturity for this case study.
Introduction
Digital innovation is shaping our world. As technology and big data processes are increasingly used to
deliver critical services, Operational Technology (OT) systems have evolved to collectively work with
enterprise IT networks to provide operational data to a centralised management platform. Whilst this
convergence brings many advantages to industry and society, OT systems, historically, have not been
planned or executed with cyber security as a priority.
The conventional risk assessment approach to cyber security has proven to be unmanageable in OT
environments (Linkov, et al., 2013), (Groenendal & Helsloot, 2021) and there is a rising threat to the cyber
security of traditional OT systems (Johnson, 2016). An example is the high-prole attack on the Colonial
Pipeline in May 2021 where hackers successfully shut down the largest petroleum pipeline in the United
States (Reeder & Hall, 2021). A wide variety of Cyber Resiliency frameworks exist that aid organisations
with techniques and approaches to improving cyber resilience.However, there is a sparsity of real-life
case studies that speak to the adoption and measurement of these novel approaches within an OT
environment.
The study presented in this paper assesses the contribution of the NIST Cyber Resilience (CR) framework
(National Institute of Standards and Technology, 2021) and offers ndings derived from a case study of
an industrial plant consultation undertaken with the Thales Group. The case study draws on key themes
that appeared from the literature to analyse CR gaps, to what degree constructs can be adopted to
improve CR and to determine if an evaluation of the results could provide a measure of an organisation’s
resilience. The presented case study and conclusions drawn afford a baseline for future research into
cyber resilient improvements.
Page 3/23
The paper is organised as follows. Section 2 provides background and section 3 reviews current literature
and primary research. Section 4 elaborates upon the problem and explains the underlying methodology.
Section 5 presents the case study, associated discussion and results. Section 6 offers concluding
remarks and speaks to future work.
Background
Critical infrastructure, industrial and manufacturing industries areprimarily enabled by Industrial Control
Systems (ICS) commonly referred to as Operational Technology,which enableus to go about our daily
lives. Here,OT is as any system outside of the enterprise network and include equipment such as
Programmable Logic Controllers (PLCs), embedded systems and Supervisory Control and Data
Acquisition (SCADA) systems. OT systems are different from typical IT systems. OT support complex
interconnectivity between physical and logical infrastructure often communicating through propriety
protocols that rely on computational equipment such as PLCs. PLCs typically don’t allow remote access
unless interconnected with another industrial asset known as a Human Machine Interface (HMI)
(Cherdantsevaa., et al., 2016). The implementation of IT security policies is problematic in OT safety-
critical systems. Whilst regulators and engineers understand the fundamental safety requirements of
such systems, cyber security requirements do not easily follow on and thisincreases the risk of
compromise(Maglaras, et al., 2018).
Cyber resilience refers to the ability of the system to prepare, absorb, recover and adapt to adverse
effects; especially those associated with cyber-attacks (Linkov & Kott, 2018) (National Institute of
Standards and Technology, 2021). Resilience Engineering has underpinned other domains for decades
and its proven approach has now made its way into the cyber domain (see (National Institute of
Standards and Technology, 2021) for a detailed account). The traditional concept of cyber security
focuses primarily on protecting systems from cyber-attacks known as “fail-safe”. Cyber resilience focuses
on the business mission as a whole and the events that follow in the aftermath of a cyber-attack known
as “safe-to-fail” (Björk, et al., 2015).
Literature Review
A plethora of standards, frameworks, and directives on the topics of cyber security and cyber resilience
have appeared over the last decade. The following introduces these topics with a particular emphasis on
cyber resilience.
The U.S. Department of Commerce published a framework (National Institute of Standards and
Technology, 2014) to promote the protection of critical infrastructure and to support operators to manage
cyber security related risks(National Institute of Standards and Technology, 2013), (COBIT 5), (ISA
62443) and ISO/IEC 2700. NIST subsequently released a framework for developing CR systems (National
Institute of Standards and Technology, 2021) updated in August 2021 to align to the MITRE Att&ck
Framework (MITRE, 2017). ISA-95 is the international standard for the integration of enterprise and
Page 4/23
control systems. ISA-95 consists of models and terminology (Williams, 1992). One example widely used
across OT environments is the Purdue Model which incorporates layers of technology and business
practice used by industrial corporations and incorporates them as levels for the standard(Simonovich,
2020). The US energy sector developed a ‘Cybersecurity Capability Maturity Model’ (C2M2) in 2012 to
help organisations running critical infrastructure. The model comprises 10 domains, objectives and
practices aligned to maturity indicator levels (Oce of Cybersecurity, Energy Security, and Emergency
Response, 2012). An updated version (released in July 2021) aligned with the main changes to NIST
cyber security framework (National Institute of Standards and Technology, 2018).
One of the major requirements of a cyber analysis is to supply a basis for relative comparison so that
decision makers can make well-informed actions based on in-depth knowledge of both the system and
business environment (Leversage & Byres, 2008). Tools such as capability maturity models form the
basis for cyber security metrics in literature. Capability maturity models (widely used in the cyber security
domain) typically depict existing practices within an organisation as a basis for comparison. However,
although there are attempts in literature to provide a method for measuring cyber resilience, few offer a
method to achieve a baseline maturity measure of an organisation's resilience during the context
establishment stage and, of the few that do, only qualitative metrics are offered.
Cyber Resiliency and its importance has been highlighted (Linkov, et al., 2013),(Linkov, et al.,
2014),(Linkov & Kott, 2018), (Kott & Linkov, 2019),(Kott & Linkov, 2021). The most recent work highlights
that there is insucient research on cyber resiliency measurements and only recently have researchers
begun to investigate quantitative measures (Kott & Linkov, 2021). We, therefore, rely on qualitative
approaches to measure cyber resilience (Groenendal & Helsloot, 2021). Another challenge is that
organisations may nd it dicult to translate CR frameworks and models into roadmaps since there is no
easy-to-follow process on how an industry can adopt and measure CR. This supports early ndings
(Haque, et al., 2018) which states that “although many of the frameworks provide some subjective
guidance of resilience study, they all lack clear explanation on the quantitative resilience metrics
formulation”. Recent research attempts to resolve such challenges (Carías, et al., 2021) produced a Cyber
Resilience Assessment tool to aid Small and Medium Enterprises (SMEs) in their CR operationalisation.
Three case studies formed the basis for this study with reported success. However, the study related to
SMEs with a limited level of cyber resilience. The need for this type of tool within OT environments would
be of benet. Subsequently, a study proposed a method of grading a system’s cyber resilience (Singh, et
al., 2021). The paper only considers the system technology rather than the whole organisation, which is
the underlying focus for a cyber resilience analysis. The metric criteria are not yet consistent or
repeatable. The authors recognise this and aim to improve this in their future work.
The ‘Cyber Resiliency Metrics, Measures of Effectiveness, and Scoring’ framework (Mitre Corp., 2012)
supplies ideas for cyber resilience metrics and considers the problem domain overlap. It discusses the
large overlap between each problem domain and state “As cyber resilience techniques mature and are
more widely adopted, the disciplines of cyber resilience, cyber security and conventional security will
merge”. Since many of the traditional cyber security analysis approaches and metrics can be repurposed
Page 5/23
in a cyber resilience analysis then, in principle, an industry should be able to reach some sort of baseline
metric through use of multiple frameworks and existing maturity models. Mitre updated this framework in
May 2015 to include challenges this case study acknowledges in Section 3 (Bodeau, et al., 2015).
The U.S. Department of Commerce approach to conducting CR analysis includes the Anticipate,
Withstand, Recover and Adapt goals, along with the x8 objectives and x14 techniques (National Institute
of Standards and Technology, 2021). Prerequisites of the framework suggest the architectural,
programmatic, operational and threat context must be identied. The Architectural context identies the
type of system being analysed including its patterns, how it interacts with other assets, asset locations
and layers in the architecture. The type of system is important as it determines which approach or
technique is most appropriate for the analysis. The Programmatic context identies how the system is
being acquired, developed and maintained. This also identies the stakeholders responsible for the
system. The Operational context identies how the system will be used and maintained and how it
interacts with other systems. The Threat context identies the threat events, sources and scenarios of
concern. However, the framework offers little guidance on how to obtain the prerequisite context and does
not make clear the analysis ease of adoption assumes that an organisation already has a mature cyber
security foundation; NIST should address this. Mitre updated their 2012 framework to address this.
A mature cyber security foundation for this case study did not exist and, for this reason, a mix of
frameworks and maturity models were used in conjunction with the NIST framework to evaluate the
organisation. The overhead for obtaining the prerequisite information needed to start a CR analysis was
signicant. This overhead could have been avoided if the organisation had an established level of cyber
security. The following section outlines the methodology and methods used to perform a cyber resilience
analysis for this case study.
Methodology
This case study provides a high-level analysis of anindustrial factory belonging to a globally established
company with presence in multiple countries. The business (anonymised to protect their identity)
manufactures products used in the Aerospace and Defence industries as well as many other industrial
marketplaces. The analysis is based on the (National Institute of Standards and Technology, 2021)
framework and tailored to the organisation through use of other frameworks and standards,such as the
Purdue Model and NIST CNI guidance, to evaluate the outcome.The study focuses on the business
mission, itsOT infrastructure, its current cyber risk posture and recommendations provided to the
customer.
Outline methodology
The applied methodology is set out in ve steps.
Page 6/23
Step 1: Context establishment
Identify key stakeholders, OT assets, system categorisation, Netow discovery and other capabilities from
functional areas such as cyber security, cyber defence and contingency planning.
Step 2: Establish a baseline, and identify gaps and critical business
resources
Using the data collected, identify critical resources and any gaps. Gaps can also be identied from
historical reviews such as penetration test reports, after action or risk management reports and
vulnerability assessments with respect threat/attack events.
Step 3: Analyse the system and attack surfaces
Graphically map logical and physical systems. In this step, the system is analysed from two perspectives
(architectural improvements can then be identied), specically:
Identify the critical business resources through a graphical analysis of network assets
communicating.
Identify high value targets of APT (Advanced Persistent Threat) actors and develop attack scenarios.
Step 4: Dene evaluation criteria and threat/vulnerability assessment
Cyber resiliency can be evaluated in multiple ways and should be distinguished before the assessment
can begin. See (National Institute of Standards and Technology, 2021) for further evaluation criteria. A
typical evaluation criterion could be a cyber risk assessment especially if the organisation already makes
use of a Risk Management Framework such as (National Institute of Standards and Technology).
Step 5: Develop recommendations (plan of action)
Make recommendations following the NIST framework guidelines.
Case study
The following describes the application of the steps described above within the context of the case
study.
Step 1 – Context establishment
Page 7/23
This stage is twofold and included:
a planning stage where the scope of this case study is assessed and key stakeholders are identied;
a data collection stage where personnel are interviewed, OT Network architectures/oor plans are
reviewed, the connection of passive monitoring equipment is established and other metrics found
during a physical walkthrough such as conguration assessment of factory end points is
documented (summarised in Table 1).
Table1Data types collected.
Architectural Analysis
System Field Parameters - Metadata: -Asset Reference (e.g., 001)
-Asset Type
-Criticality
-Location Reference
-Location Name
-IP Address
-MAC Address
-Role
-Manufacturer
-Model
-Host Name
-Firmware V
-OS Version
-Client Protocols
-Server Protocols
-Purdue Level
-Serial Number
-Description
-VLAN
-Network Location (If known)
-Protocol/Service, i.e., Modbus Eth/Ip
-Date/Time
Risk Value Parameters (Critical to business operations):
Vulnerability Assessment Parameters: -High
-Medium
-Low
Log data variables criteria: - Timestamp
- Asset ID
- Title / Event
- Impact level
- Sensor / Trigger
- User (optional)
- Unique Identifier
Step 2 - Data Examination and Gap Analysis
Analysing the data collected in Step 1 established a baseline and identied the gaps in cyber resiliency
that may directly cause harm to the organisation. An analysis of data sources contributed to
understanding how the customer’s OT communicated with their IT and external networks including third
party suppliers and maintenance contractors. An OT vulnerability assessment for each of the assets was
completed to determine how likely they could be targeted by Advanced Persistent Threat, followed by a
Page 8/23
risk assessment (National Institute of Standards and Technology, 2018) of critical assets to determine
their Purdue level and value to the business. Figure 1 shows the total number of OT and IT assets.
Table2Architecture System Type, mapped to a physical location
Purdue LevelRoom Location
Asset Location
Asset RoleABC DEFGHIJKLMNOPQRSTUVTotal
LEVEL 0 2 1 14 113 1 4321
Scale 2 1 12 12 3 12
Sensor 2 1 1 1 139
LEVEL 1 25 3 11 1 1 112422
PLC 25 3 11 1 1 112422
LEVEL 2 11 221 2 241 11 24226
HMI 11 221 2 241 11 24226
LEVEL 3 110 11
Application Server 1 1
EWS 2 2
Historian 2 2
Printer 1 1
Terminal_server 5 5
LEVEL 3.5 2 1 14
IP_Camera 11
Switch 2 1 3
LEVEL 4 1 1
Gateway 1 1
Each OT asset is mapped to its Purdue level (shown in bold) by system type (seeTable 2).
Step 3 - Mapping Logical and Physical Networks
A logical and physical topology arrangement of assets provided a graphical representation of critical
assets and data ows. The logical topology representation classies the network and illustrates the
subnets and trac ows. Each asset is identied (where possible) with their criticality to business, host
names, IP addresses and their roles with any notable trac communications highlighted in red (see
Figure 2). Note the topology drawing is for visual understanding only and is purposely obfuscated to
protect the identity of the organisation.
Using the data triaged in stages 1 and 2, the Logical Network Infrastructure is mapped to a physical
location for each asset (see Table 3). The physical topologies mapped each asset to the geographical
location using the business’s oorplans (not included to protect the identity of the customer).
Table3Physical Topology - Mapping assets to geographical location
Page 9/23
LocationAsset RefDescription
A 243 Engineer Workstation
B 001 Gateway
002 Switch
003 PLC
100 Application server
104 Terminal server
105 Historian
106 HMI
107 Sensor
199 EWS
200 Firewall
Step 4 - Dene evaluation criteria and threat/vulnerability assessment
Other elements of the Operational business processes were audited to complete the evaluation. The
results presented each of the ndings as prioritised risks. The associated mitigating recommendations
and a set of objectives needed to drive a cyber resiliency approach were assessed incorporating the data
identied from the gap analysis and discovered during the site walk-round which summarised:
operational issues (e.g., failed Modbus connections, device restarts);
security Threats (e.g., port scans, login attempts);
networking problems (e.g., unstable connections, unanswered requests);
connection attempts to public IP addresses;
contextual analysis of information;
deep dives into any areas of concern;
samples of single assets of high risk.
Step 5: Develop recommendations (plan of action)
The next section discusses the case study baseline results and recommendations.
Baseline Results
This section is an objective view of what security controls are in place at the factory using the (National
Institute of Standards and Technology, 2018) baseline set of activities framework.This framework
provided a baseline control set to perform a gap analysis. Due to the lack of any comprehensive Cyber
Security Risk Assessment analysis, this section does not make any determinations as to if such controls
are necessary, just if they appear to exist and how they are used.
Page 10/23
Cyber Risk Analysis – Baseline Control Set
Identify
Asset Management
A functioning system exists based on an excel inventory. Many of these required human interaction to
ensure data integrity is coordinated and is potentially prone to data inconsistencies. The list of recorded
assets does not include asset priority ratings based on criticality, business value, or supply chain
availability (given the number of legacy systems). No overarching strategy for managing and or
maintaining the conguration of assets was apparent. There did not appear to be a list of external
dependencies or critical business assets – this could mean that they either have none or that a
determination has not been conducted. There did not appear to be a formalised process for ensuring a
consistent supply of engineering spares, conversely the onsite teams appeared both knowledgeable and
capable of ensuring critical assets could be replaced and maintained. The process was expert driven
rather than documented and process driven. There was no clear RACI structure in place for cyber
resilience; primarily due to the fact it was not a signicant concern for the factory.
Business Environment
The staff and organisation were clear about their role in the successful operation of their business. The
mission for the factory and staff appeared to be well articulated, and of the people we talked to, they
agreed on similar missions and objectives (e.g. on time delivery in a safe and reliable manner).
Dependencies and critical functions were identied and managed from a physical and supply chain
perspective, but not clearly from an information or digital perspective. Resilience was not a key priority or
addressed maturely from a digital or cyber perspective. Physical resiliency within the factory was
possible through component/system & production line reuse. Although there is awareness about the
importance of an OT cyber resiliency approach, a consistent approach had not been adopted. There is no
standalone separate network environment for OT infrastructure.
Governance
It was acknowledged that no governance or risk management process for OT cyber security had been put
in place. Cyber was treated in a similar fashion to other large corporate risks and managed through the
same management process. The roles & responsibilities for cyber security seemed to align with those for
the IT operation of the factory (e.g. cyber wasn’t treated any differently to other engineering aspects). It
was clear who staff would communicate with should an issue arise with the factory (cyber or otherwise).
There was acknowledgement that specic cyber security legislative or regulatory requirements are not
tracked at the factory level, instead it was assumed that the corporate IT both on / off-site were likely to
provide that info to the factory.
Risk Assessment
Page 11/23
There is a process in place to identify, track or respond to asset vulnerabilities, providing the assets are
managed by the corporate AV. This does not cover unknown or unregistered devices onsite that client IT
are unaware of. There is no formal method of receiving cyber threat intelligence – the factory relies on
corporate IT to inform them of any issue. But there was no method of tracking response to that issue.
And it was acknowledged that IT does not provide threat or vulnerability intelligence for OT assets. No
business-aligned OT cyber continuity plan has been dened. There was no formal method of reviewing
threats and their potential business impacts (cyber or otherwise). Therefore, new risks are not
consistently identied, scored, or addressed. Cyber risks are only identied or prioritised when informed
by corporate IT.
Risk Management Strategy
There is no formal cyber security risk management process or strategy, beyond the corporate risk
management approach. The organisational risk tolerance is determined on an ad-hoc basis. The
approach to risk seems to be divorced from the wider business.
Protect
Identity Management and Access Control
Identity is not comprehensively managed within the factory infrastructure. The majority of access is
through shared role-based access, limited audit capability to identify critical actions carried out by an
individual. Access to critical resources is limited to IT staff. There is external remote access into the
facility. Enterprise remote access is limited to IP addresses through Firewall rules. There is limited
network segregation through a DMZ. The rewall is managed remotely by another site through an
external software dened rewall on the external to internal interface, and controlled through a
software/VM rewall on the internal to external interface. A zone & conduit approach to network integrity
is not in effect. Identities are handled through corporate access to assets and rst-hand knowledge of
those people. Access to engineering laptops is controlled through informal process. There didn’t appear to
be any central authentication OT management solution or multi-factor solution – especially when it came
to OT assets. Everyone has access to the factory assets, and any information critical assets reside on the
IT enterprise network.
Awareness and Training
There is no regular or formal training on cyber security from an OT or factory perspective, just in regard to
the corporate IT Roles & responsibilities are inherited from existing work structures rather than explicit
RACI charts. There is some engineering reliability on external 3rd. parties. Senior executives understand
their roles and make themselves available to the team. There are no dedicated cyber-security personnel
for OT.
Data Security
Page 12/23
There did not appear to be any whole disk encryption products in use. Therefore, within the factory there
was limited to no data-at-rest protection. There did not appear to be any data-in-transit protection in use –
except where the default protocols/congurations use it. There was limited to no ability or approach to
detecting or controlling for information leakage, disposition, or removal of information from the factory
domain. There was no formal method for checking the integrity of vendor supplied software/rmware.
Information Protection Process and Procedures
The concept of least functionality is not routinely or consistently deployed. There did, however, appear to
be a consistent or deliberate use of baseline congurations from the IT side. There is a formal approach
to conguration change management. This is routinely handled through IT coordination between
individuals and logged via their IT Helpdesk. There is no comprehensive or tested method for backups.
There appeared to be confusion between the IT teams about which critical assets were being backed up.
There did not appear to be a well-known and followed process for data destruction when not required.
Protection technologies and processes are not regularly checked or validated. Response plans and
recovery plans do not include cyber or cyber incidents directly.
Maintenance
Maintenance is performed by engineering experts as required. There is a ticketing system in place to log
and track issues. Remote access for maintenance is permitted as discussed.
Protective Technology
Audit logs are not reviewed according to business needs or risks. Removable media is not currently
restricted but plans for this are underway. Technology resilience is in place for some critical assets (e.g.
core switches, virtualised servers) – but the conditions and resiliency requirements driving them were not
clearly articulated.
Detect
Anomalies and Events
Security event logs are not collected on the OT equipment. There was an absence of an event monitoring
and reporting systems. Therefore, a baseline knowledge of expected data ows & volumes was not
known. There is no vulnerability management process or solution for OT. There was an expert led
approach to reviewing events and their impacts.
Security Continuous Monitoring
There is an absence of automated vulnerability assessment (VA). There did not appear to be a regular or
routine review of critical security functions such as credential reuse/compromise. There was no detection
or audit of security credentials to detect unauthorised creation or use. There was some use of anti-
Page 13/23
malware solutions in place to help detect the deployment of malicious code. There was no regular audit
for the use of unauthorised connections, devices, or software.
Detection Processes
Security IT related management procedures for rewalls, security appliances, network segmentation and
intrusion detection are managed by the IT Network to authorise access and control information ows
from and to networks, however no security in place on the OT LAN Network. Almost everything on the OT
infrastructure is done manually system by system. Detection processes do not appear to be regularly
tested, evaluated or continuously improved.
Respond
Response Planning
No network security policy in place for the OT Network No procedure or guidelines. There haven’t been
any signicant cyber issues – therefore response plans have not been tested in anger.
Communications
No adequate follow-up actions or playbooks are dened for indications of inappropriate or unusual
activities. Staff rely on IT and engineers to report anomalies in an ad-hoc manner. Information sharing
between stakeholders (internal & external) is done in an ad-hoc manner.
Analysis
Ad hoc risk analysis and use of measures by individualsNo incidents have occurred requiring forensics
or impact analysis
Mitigation
No incidents have occurred requiring containment or mitigation. New vulnerabilities are not mitigated but
may be documented as accepted risks.
Improvements
Response plans have not been required to be enacted for OT, therefore no lessons learned to be included.
The next section outlines examples of vulnerabilities and practices discovered during the analysis that
represent weaknesses in the organisations approach to cyber resilience.
Threat/Impact Analysis
Page 14/23
The described vulnerabilities (shown in Table 4) were assessed based on whether they could be exploited
by a reasonable attacker. They represent the most likely avenues for compromise or use as part of a
wider campaign. Each impact rating is scored based on an assessment of an attacker’s ability to turn that
nding into a severe, major or minor impact to factory operations. Each rating is based on expert opinion
and, although impartial, it should be validated by a wider risk and impact assessment that includes on-
site factory personnel.
Table4Vulnerability Assessment
Area Control CR Weakness Impact to Business Impact
Rating
Architectural
Analysis Flat layer 2
network
architecture
No network segmentation
or defences within the
Operational Technology
factory network. If one asset is compromised – every asset can be
compromised. It would be very easy to access an OT
system in the event of an untargeted or enterprise
compromise. Should any part of the interlinked assets fail
(such as loss of power) it could impact other parts of the
OT network. The introduction of malware into the factory
would not be inhibited from spreading throughout the
network to other HMIs/x86 devices and even to the IT
enterprise assets.
Severe
Programmatic
Analysis Inconsistent
use of
software
versions, or
hardware.
AV Malware
control
There are multiple OS
versions, types and
software builds in use
throughout the factory
including Windows XP.
There is good use of end-
point protection controls
in place such as AV
however not been
deployed to all assets.
Untargeted attacks such as crypto-malware leverage well-
known software vulnerabilities. The wide range of OS
versions and legacy software make the factory pre-
disposed to having significant compromise, should any be
introduced accidentally.
Coupled with the wide variety of legacy OS’s &
applications, the ability for malware (even widely known &
signature friendly instances) to spread is high once
compromise occurs. End-points without AV are extremely
vulnerable to well- known attacks.
Major
Windows XP
used as
HMI’s
Windows XP machines
were frequently found to
be operating as HMI’s to
the OT machines. BlueKeep is a recent but well publicised vulnerability in
Microsoft’s RDP service (CVE-2019-0708). Patches are
available for legacy OSs including XP. It is advised that
the systems are patched, as XP machines are critical
within the factory and wormable exploits are in the wild.
Major
Operational
Analysis Good use of
change
control
There does appear to be
a patching /
configuration change
management approach in
place. However, OT
assets appeared to be
running versions of
firmware that contain
known vulnerabilities.
The wide range of insecure OS systems such as XP makes
it very easy for unsophisticated attackers to use off-the-
shelf attack kits to compromise the factory.
Regular exploits for much of these systems exist in toolkits
such as Metasploit.
Major
No backup
plans There seemed to be some
confusion between what
the factory thought was
being backed up and
what was actually backed
up.
Backups of configuration
changes were
accomplished through
file-sharing over FTP.
Traffic identified to/from a server IP address appear to
allow a wide range of services traversing the network to
across all VLANs including test to communicate between
any device in the factory network.
Whilst this allows file- sharing to occur, it would also allow
any compromise of those assets to spread into the OT
factory.
This is a typical example of how a wormable exploit such
as Eternal Blue (e.g. WannaCry) could spread from the
enterprise IT network to the factory network.
Severe
Reliability
on
experienced
staff
The factory is
increasingly reliant on IT
staff. Critical information
is stored on the
enterprise ERP system.
If you cut off or impact enterprise connectivity then the
factory is quickly constrained by what it can do.
Just as with the NotPetya attacks it is clear how a severe
impact to enterprise systems would have knock on
consequences to the factory operations.
Major
Page 15/23
Recommendations
This section provides observations & recommendations (summarised in Table 5) based on what was
seen. Note: that no in-depth threat or risk assessment was performed, therefore recommendations are
given from an informed point of view, rather than an outcome from a formal risk management process.
Overall, it is fair to say that the organisation did have some basic protections in place. However, they had
no systemic ability to detect, respond or recover from a cyber-attack and no resiliency to an insider attack
or accidental compromise.
Table5Recommendations
Area Recommendation Priority
Strategy The business should have a defined cyber security strategy for factory OT infrastructures
separate to the IT strategy. High
Governance The business should ensure that a clear RACI structure is in place for governing cyber
resilience and cyber incident response. High
Risk
ManagementThe business should establish and use a common approach for performing risk
identification, assessment and management. This does not have to be in-depth, but it
should be consistent to allow for improvement. High
Security
Audit
The business should develop a sufficient security audit plan to measure compliance
against, and effectiveness of its security controls
The business should then start to perform regular security audits of its controls and
approaches. Medium
Identity &
Access
Management
The business should have a user-auditable method for accessing critical systems,
consider segregation of duties to reduce the likelihood of single individuals compromising
critical processes. Consider restricting the broad access into the factory network, to only
those necessary services. Regularly review and validate the rules and authorisations into
the factory domain through the firewall. High
Change
Management
The business should formalise an OT change management process to ensure the current
configurations and assets builds are known. This includes OT endpoints such as
engineering terminals and HMIs. Medium
Security
Architecture
The business should take a zone & conduit approach to network architecture within the
factory. Deploying industrial firewalls strategically would reduce the ability for a single
asset compromise to impact wider sections of the factory.
The business should institute a segregation between the factory and enterprise networks.
Boundary segregation devices should monitor and restrict services not just IPs through
application firewalls.
The business should review its network architecture from a OT/IT resiliency perspective
and determine if it is sufficient for the business expectations in the event of a cyber-
incident and ensure that there are no single points of failure.
High
External
Supplier
Management
The business should ensure remote visitors are strictly monitored for the entire session
or restricted entirely from accessing factory machines until more robust security controls
are implemented to reduce the potential impact from accidental/intentional infection or
data infiltration. Medium
Threat
Intelligence The business should require factories to include cyber in its high-level threat assessment.
Provide an appropriate feed of threat intelligence relevant to the factories and their
assets and establish a routine method of reviewing and evaluating that threat intelligence
as it pertains to their operations. Low
Incident
Management
Capabilities to react and recover from cyber security incidents should be routinely tested
and exercised. Accidental or insider compromises are assessed to be the most likely
cause of cyber incidents. Swift recovery will minimize impacts to operations. Medium
Business
Continuity
The business should require factories to include significant cyber incidents in its business
continuity plans, including recovery from APT or other destructive cyber consequence. Medium
Human
Resources The business should review the limited succession planning and staff backup for
key/critical individuals and/or departments. Medium
Page 16/23
Cyber Resiliency Evaluation
A number of techniques, recommended by (National Institute of Standards and Technology, 2021), that
enhance cyber resiliency are outlined in Table 6.
Table6Cyber Resilience Evaluation
Page 17/23
Techniques Approaches Examples
PRIVILEGE RESTRICTION
Definition:Restrict privileges
based on attributes of users and
system elements as well as on
environmental factors.
Discussion:Apply existing
capabilities more stringently to
deliver a trusted and complete
response.
TRUST-BASED PRIVILEGE MANAGEMENT
Definition:Define, assign, and maintain
privileges based on established trust criteria
consistent with the principles of least privilege.
Informal description:Trust no more than
necessary.
Discussion:Separate roles and responsibilities,
and use dual authorisation.
Implement least privilege.
Employ location-based
account restrictions.
Employ time-based
restrictions on automated
processes.
Require dual authorisation for
critical actions.
REALIGNMENT
Definition: Structure systems to
meet business missions and
reduce current anticipated risks.
Discussion: Look for
restructuring opportunities
related to new assets and any
upgrades to current assets.
PURPOSING
Definition: Ensure that cyber resources are used
consistently with business function purposes and
approved uses, thereby avoiding unnecessary
sharing and complexity.
Informal description: Ensure that resources are
used consistently with mission or business
function purposes and approved uses.
Ensure that no resource is
designated as trusted unless a
business reason justifies it
Ensure that privileged
accounts are not used for non-
privileged functions.
Use allow-listing to prevent
the installation of unapproved
applications.
Use allow-listing to restrict
communications to a specified
set of addresses.
REDUNDANCY
Definition: Provide multiple
protected instances of critical
resources.
Discussion: Redundancy is
integral to system resilience,
however manage carefully to
avoid vulnerabilities and
increasing the attack surface
PROTECTED BACKUP AND RESTORE
Definition: Back up information and software in
a way that protects its confidentiality, integrity,
and authenticity. Enable safe and secure
restoration in case of disruption or corruption.
Informal description: Back up resources
securely and defend the restore process from
adversary exploitation.
Maintain and protect system-
level backup information (e.g.,
operating system, application
software, system
configuration data).
Increase monitoring and
analysis during restore
operations.
SEGMENTATION
Definition: Define and separate
system elements based on
criticality and trustworthiness.
Discussion: Reduce the
adversary’s scope for lateral
movement or command and
control (C2).
PREDEFINED SEGMENTATION
Definition: Define enclaves, segments, micro-
segments, or other restricted types of resource
sets based on criticality and trustworthiness so
that they can be protected separately and, if
necessary, isolated.
Informal description: Separate OT and IT
Networks at the very least.
Use virtualization to maintain
separate processing domains
based on user privileges.
Use cryptographic separation
for maintenance.
Partition applications from
system functionality.
Isolate security functions from
non- security functions.
Use physical separation (air
gap) to isolate security tools
and capabilities.
Isolate components based on
organisational mission.
Conclusion
This paper introduced the reader to the subject by supplying some background context and a literature
review including primary research. This was followed by a problem statement, a methodology and a
discussion of the case study, and its results. Finally, a conclusion is offered.
Page 18/23
Thiscase study analysis applied key themes from the NIST literature to show CR gaps, highlight to what
degree the adoption of its constructs might improve CR and determined if an evaluation of the results
could supply a measure of an organisation’s CR. Conclusions drawn demonstrate that although the
framework did assist with some of the analysis process, the framework’s ease of adoption assumes an
organisation has a conventional cybersecurity foundation; NIST should make this clear within their
guidance. Furthermore, the accompanying evaluation process was not sucient to quantitatively
measure the overall CR maturity for this case study.For this reason, the assessor utilised elements of
different frameworks and maturity models alongside NIST to evaluate the organisation. Furthermore, the
authors agree that there is insucient research on cyber resiliency measurements (Kott & Linkov, 2021).
A digital twin of the organisation, simulated in a cyber range, would enhance the analysis and
assessment of its cyber resiliency. This might better facilitate the quantitative measurement of resilience
of an organisation under different attack strain thresholds and is the subject of the authors’ further
research.
Declarations
This work was supported by KESS in collaboration with Thales Ltd. (Grant number 21439). The authors
have no nancial or proprietary interests in any material discussed in this article.
References
Björk F, Henkel M, Stirna J, Zdravkovic J (2015) Cyber Resilience – Fundamentals for a Denition. In: A.
Rocha, A. Correia, S. Costanzo & L. Reis, eds.
New Contributions in Information Systems and
Technologies. Advances in Intelligent Systems and Computing.
Cham: Springer International Publishing,
pp. 3-4. https://doi.org/10.1007/978-3-319-16528-8
Bodeau D, Graubart R, Heinbockel W, Laderman E (2015)
Cyber Resiliency Engineering Aid – The Updated
Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency
Techniques,
Bedford, MA: Mitre Corporation.
Carías JF, Arrizabalaga S, Labaka L & Hernantes J (2021) Cyber Resilience Self-Assessment Tool (CR-
SAT) for SMEs.
IEEE Access,
9(1), pp. 80741-80762 https://doi.org/10.1109/ACCESS.2021.3085530
Cherdantsevaa Y, Burnap P, Blyth A, Eden P, Jones HS, Stoddart K (2016). A review of cyber security risk
assessment methods for SCADA systems.
Computers & Security,
56(1), pp. 1-27.
https://doi.org/10.1016/j.cose.2015.09.009
Groenendal J, Helsloot I (2021) Cyber Resilience during the COVID-19 Pandemic crisis: A case study.
Journal of Contingencies and Crisis Management,
29(4), pp. 439-444 https://doi.org/10.1111/1468-
5973.12360
Page 19/23
Haque MA, Teyou GKD, Shetty S, Krishnappa B (2018)
Cyber Resilience Framework for Industrial Control
Systems: Concepts, Metrics, and Insights.
Miami, IEEE, pp. 25-30
https://doi.org/10.1109/ISI.2018.8587398
Johnson C (2016)
Why We Cannot (Yet) Ensure the Cyber-Security of Safety-Critical Systems.
Brighton,
Safety-Critical Systems Club, pp. 171-182
Kott A, Linkov I (2019)
Cyber Resilience of Systems and Networks.
1st ed. Cham: Springer
https://doi.org/10.1007/978-3-319-77492-3
Kott A, Linkov I (2021) To Improve Cyber Resilience, Measure It.
Computer,
Feb, 54(2), pp. 80-85
https://doi.org/10.1109/MC.2020.3038411
Leversage DJ, Byres EJ (2008) Estimating a system's mean time-to-compromise.
IEEE Security and
Privacy
, 1 1, pp. 52-60 https://doi.org/10.1109/MSP.2008.9
Linkov I, Bridges T, Creutzig F, Decker J, Fox-Lent C, Kroger W, Lambert JH, Levermann A, Montreil B,
Nathwani J, Nyer R, Renn O, Scharte B, Scheer A, Schreurs M, Thiel-Clemen T (2014) Changing the
resilience paradigm.
Nature Climate Change,
4(1), pp. 407-409 https://doi.org/10.1038/nclimate2227
Linkov I, Eisenberg DA, Plourde K, Seagar TP, Allen J, Kott A (2013) Resilience metrics for cyber systems.
Environment Systems and Decisions,
Nov, 33(1), pp. 471-476 https://doi.org/10.1007/s10669-013-9485-y
Linkov I, Kott A (2018) Fundamental Concepts of Cyber Resilience: Introduction and Overview. In: I. Linkov
& A. Kott, eds.
Cyber Resilience of Systems and Networks.
Cham: Springer, pp. 1-25
https://doi.org/10.1007/978-3-319-77492-3_1
Maglaras LA, Kim K-H, Janicke H, Ferrag MA, Rallis S, Fragkou P, Maglaras A, Cruz TJ (2018) Cyber
security of critical infrastructures.
ICT Express,
4(1), pp. 42-45. https://doi.org/10.1016/j.icte.2018.02.001
Mitre Corp. (2012)
Cyber Resiliency Metrics, Measures of Effectiveness, and Scoring,
Bedford, MA: Mitre
Corporation, Department No. T8A2
Mitre Corp. (2017)
ATT&CK Matrix for Enterprise.
[Online]
Available at: https://attack.mitre.org
[Accessed 15th Jan 2021].
National Institute of Standards and Technology (2012)
Guide for Conducting Risk Assessments.
NIST SP
800-30 Rev 1 ed. Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2013)
Security and Privacy Controls for Federal
Information Systems and Organizations.
NIST SP 800-53 ed. Washington, D.C.: U.S. Department of
Commerce
Page 20/23
National Institute of Standards and Technology (2014)
Framework for Improving Critical Infrastructure
Cybersecurity (Version 1.0),
Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2018)
Framework for Improving Critical Infrastructure
Cybersecurity (Version 1.1),
Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2021)
Developing Cyber Resilient Systems: A Systems
Security Engineering Approach.
NIST SP 800-160 ed. Washington, D.C.: U.S. Department of Commerce
Oce of Cybersecurity, Energy Security, and Emergency Response (2012)
Cybersecurity Capability
Maturity Model (C2M2).
[Online]
Available at: https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2
[Accessed 1 June 2021]
Reeder JR, Hall T (2021) Cybersecurity’s Pearl Harbor Moment: Lessons Learned from the Colonial
Pipeline Ransomware Attack.
The Cyber Defence Review
, 1 August, pp. 15-39
Simonovich L (2020)
Thriving in a Digitized Environment
[Online]
Available at: https://www.securitymagazine.com/articles/93849-leo-simonovich-thriving-in-a-digitized-
environment
[Accessed 1 October 2021]
Singh R, Hutton ST, Donahoo MJ, Sicker D (2021)
Toward Grading Cybersecurity & Resilience Posture for
Cyber Physical Systems.
McKinney, TX, Elsevier http://dx.doi.org/10.2139/ssrn.3897119
Williams T (1992)
The Purdue Enterprise Reference Architecture, A Technical Guide for CIM Planning and
Implementation I.
First ed. Research Triangle: Instrument Society of America
Figures
Page 21/23
Figure 1
OT Assets to Purdue Level
Page 22/23
Figure 2
Logical Topology with notable trac concerns highlighted in Red
Page 23/23
Figure 3
Summary of Required vs Actual Maturity Level Indications per Area