In April 2021, a ransomware attack shut down the largest pipeline network in the United States. Colonial Pipeline, which supplies almost 50% of the Northeast’s energy needs, lost nearly 100 gigabytes of proprietary data. In light of the multi-day shutdown of a major fuel distribution network, the NIST Cybersecurity Framework (NIST CSF) is generating renewed interest among energy stakeholders.
To date, ransomware attacks on the energy industry continue to multiply, targeting vulnerable IT systems to incapacitate critical energy infrastructure. Disturbingly, 50% of attacks on global energy infrastructure occur in the United States.
Most organizations (47.8%) in critical infrastructure sectors map their control systems to the NIST CSF. Other popular frameworks include the IEC 62443 (32%), NIST 800-53 (31.5%), NIST 800-82 (29.6%), and ISO 27000 Series (29.1%). However, in the last two years, the MITRE ATT&CK® ICS framework has emerged as a force multiplier in responding to cybersecurity threats, particularly in the oil & energy sector.
Before we explore the MITRE ATT&CK framework, we’ll look at new updates and overview the wide range of industrial compliances, including cybersecurity standards and frameworks that safeguard the critical infrastructure sector.
On June 17, 2021, NIST released a preliminary draft of its new Cyber Security Framework Profile for Ransomware Management (NISTIR 8374). In September, it produced a revised draft — public comments on this new draft were closed on October 8, 2021.
The NISTIR 8374 provides an actionable roadmap to help organizations respond to and reduce their susceptibility to ransomware attacks. It outlines basic cybersecurity controls and defensive measures mapped to the five elements of the NIST Cyber Security Framework: identify, protect, detect, respond, and recover.
The Ransomware Profile is specifically suited for organizations that have already adopted the NIST Cybersecurity Framework and NERC-CIP (Critical Infrastructure Protection) standards.
Meanwhile, to underline the energy sector’s commitment to securing the nation’s critical infrastructure assets, the API published its 3rd Edition of Standard (Std) 1164 on August 18, 2021. According to API Senior Vice President of API Global Industry Services (GIS) Debra Phillips, “The new edition API Std 1164 builds on our industry’s long history of... collaborating with the federal government to protect the nation’s vast network of pipelines and other critical energy infrastructure from cyber-attacks.”
This third edition also aligns with the objectives of the Justice Department’s newly created Ransomware and Digital Extortion Task Force.
Together, the new NISTIR and API STD 1164 updates serve as a powerful means of securing the nation’s critical infrastructure.
An effective governance blueprint can strengthen an organization’s response to IT/OT cyber-related risks.
This is where the ATT&CK® ICS framework comes in. This new framework provides the basis for creating a successful defense strategy against the tactics and techniques threat actors use. According to the SANS 2021 OT/ICS Cybersecurity survey, 47% of respondents leverage MITRE ATT&CK® ICS to mitigate IT/OT cybersecurity incidents.
Although the NIST Cybersecurity Framework provides a comprehensive governance structure for identifying and responding to threats, it doesn’t offer a template for anticipating ransomware behaviors, detecting stealth reconnaissance activities, isolating attacks, or conducting a post-mortem analysis of cybersecurity incidents. However, the ATT&CK® ICS framework does.
Together, the NIST Cybersecurity and ATT&CK® ICS frameworks serve as a critical basis for mitigating the risks of IT/OT convergence in the energy sector.
NIST Cyber Security Framework (CSF): This is a five-function approach to mitigating an organization’s cyber security risks. It’s usually combined with the following standards:
Other frameworks include:
To satisfactorily comply with these important OT compliances, energy-related organizations must deploy the right asset management, threat detection, and response tools.
Today, gaining full asset visibility for discovery and management begins with 100% packet visibility, afforded by network TAPs (test access points). Relying on switch SPAN or mirror ports is not going to cut it in today’s environment, as they were not designed for continuous monitoring.
Complete visibility is the foundation of an effective cybersecurity threat detection and response solution. Threat detection and response are more critical than ever due to IT/OT convergence in the energy sector. For example, the IoT sensors that allow oil & gas firms to remotely monitor worker safety on offshore rigs rely on internet connectivity, which offers multiple security loopholes that endanger OT infrastructure.
Industrial teams turn to Network TAPs to provide packet visibility, not only because of the clear advantages over SPAN but because they are easy to deploy, rugged plug-and-play devices that are passive or failsafe and do not affect current configurations. Network TAPs are added to provide full-duplex copies of network traffic 24/7/365 that are secure and can provide unidirectional as well as media conversion and traffic aggregation options. All designed to make asset inventory and threat detection tool deployments seamless, ensuring compliance and security standards are met.
Looking to add network TAP visibility to meet compliance, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.