SANS - 5 Critical Controls
SANS - 5 Critical Controls
Organizations have no obligation, however, to exceed the minimums Organizations must participate in their own defense to
of mandatory or expected good practices to further protect their protect community and national security against known
threats, but they must make decisions according to risk
business interests. Said simply, organizations must participate
tolerance and return on investment.
in their own defense to protect community and national security
against known threats, but they must make decisions according to risk tolerance and
return on investment.
1
F or the purposes of this paper, ICS and OT are used interchangeably. The authors note that OT is the broader classification of systems whereas ICS is
a more specific type of OT in industrial organizations. As an example, the building automation systems in a datacenter are OT systems but are not in
an industrial environment whereas the automation system in a chemical plant would be ICS. Across the community, there is no one lexicon used but
generally each means “not IT.”
2
Standards, NERC, www.nerc.com/pa/Stand/Pages/default.aspx
3
“ New ISA/IEC 62443 standard specifies security capabilities for control system components,” ISA,
www.isa.org/intech-home/2018/september-october/departments/new-standard-specifies-security-capabilities-for-c
4
C2M2 Version 2.1, C2M2, https://c2m2.doe.gov/
5
“Cybersecurity Maturity Model Certification,” Office of the Under Secretary of Defense, www.acq.osd.mil/cmmc/index.html
6
Cybersecurity Framework, NIST, www.nist.gov/cyberframework
As regulations emerged for some sectors, many organizations The five ICS Critical Controls highlight the strength of an
chased projects to implement security controls. Other organizations interdependent, balanced, preventative, detective, and
shaped existing security programs to support compliance responsive approach.
requirements.
• P
rioritized rapid response recommendations. During times of accelerated
geopolitical events, leaders want to know what to focus on across the sea of
regulations, frameworks, guidelines, and requirements. These five ICS Critical
Controls are an answer to the frustrated organization request, “Just tell us what to
do. We can’t do everything immediately, but where should we start?”
• G
etting more out of minimum requirements. When no regulation exists,
organizations invest in cybersecurity capabilities based on various risk management
strategies. This strategy results in wild variations of approaches across a sector,
with some organizations investing heavily in some technologies or capabilities, and
others doing the absolute minimum. This disparity creates a cyber-target bell curve
for adversaries to develop attack strategies with targets of opportunity on one end
of the curve and targets of selection on the other.
Regulatory requirements are established as the minimum set of requirements that need
to be achieved, but they suffer from regulatory process development and implementation
lag, which means that it can take years before organizations implement and benefit from
them. In some cases, requirement-based security programs create predictable common
defense approaches across a sector that can be anticipated and targeted by adversaries.
The authors recommend that organizations adopt the five Critical ICS Cybersecurity Controls
and then map their organization’s efforts into a common framework for communication
around the organization and to peer organizations. That common lexicon will facilitate clear
communication without introducing additional jargon. In fact, the first of the five controls
asks organizations to identify the scenarios they want to be prepared to defend against;
this is in keeping with guidance from various standards such as IEC-62443, which guides
participants to conduct a risk assessment first instead of an unfocused test of every control.7
those systems dictates what is required of them and what the risks
and threats are to those systems.
7
eams often argue not about the usefulness of a given security control but whether it effectively and efficiently addresses a specific risk. It is paramount
T
for organizations to align first on what the risk scenarios are. This approach will help eliminate dogmatic approaches to standards where a control, such
as software patching, is seen as a right or wrong action instead of a measure that may or may not make sense in the context of the operations.
8
he Industrial Control System Cyber Kill Chain,” by Michael Assante and Robert M. Lee. SANS Institute, October 5, 2015.
T
www.sans.org/white-papers/36297/ (Registration required to download.)
9
dversaries learning environments and making changes can have unintended effects, including loss of control and safety. For effects such as physical
A
damage to occur, however, the adversary not only needs confidence about what they want to achieve and how to achieve it, but also additional time to
understand the unique operating environment and to develop the misuse and manipulation attack. The increased complexity and uniqueness of the
target environment will also require additional resources with varied skillsets.
1 2 3
Determine which scenarios Consider consequence-based Perform a tabletop exercise
pose the most risk and need scenarios Overlay scenarios against the organization’s
to be defended against Chart out what the adversary would need to do environments and sites
Look to real-world examples in your industry to complete the attack
10
For information on scenario planning, please see www.weforum.org/agenda/2021/05/cybersecurity-safety-engineering/
11
“ Triton/Trisis Attack Was More Widespread Than Publicly Known,” Dark Reading, January 16, 2019.
www.darkreading.com/attacks-breaches/triton-trisis-attack-was-more-widespread-than-publicly-known
Tabletop It
Once the scenarios are chosen and agreed upon in the organization, the ICS-specific incident
response plan should include a tabletop exercise (TTX). The TTX should overlay the scenarios
against the organization’s environments and sites. Each part of the organization (such as
operations, regulatory, security, business, and legal) should determine what requirements
it would have for each incident. Determine what the organization will do in response to a
given incident and what information it will need to know to inform actions. Identify these
requirements up front and utilize the TTX to determine what will be needed from the
environment and in what timeframe (for example, the accessibility of certain key datasets
and their retention length articulated in a Collection Management Framework).12 The findings
from the TTX will help guide the organization about what sites are the most important to
focus on, what the crown jewels are at those sites, and how to focus the remaining four
critical controls.
Numerous sectors have strong events analysis programs and lessons-learned information-
sharing forums (NERC E-ISAC, FAA, NRC, chemical safety, and pipeline safety, to name a few)
that encourage and enable organizations to work through real-world scenarios and consider
unique impacts. Many countries and sectors are also working on large-scale, joint team-
training-focused exercises. These large-scale exercises go beyond individual organization
level tabletop exercises as described above and highlight additional interdependencies
across other sectors, supply chains, and governments.
• Key questions that will need answers in those scenarios for operations, security,
compliance, regulatory, fiduciary, communications, and other responsibilities
• C
ollection requirements and strategies to ensure proper root cause analysis and the
answering of the key questions
12
his is also an excellent place to start the requirements for what would be needed in the Collection Management Framework. See “Collection
T
Management Frameworks—Looking Beyond Asset Inventories in Preparation for and Response to Cyber Threats,”
www.dragos.com/wp-content/uploads/CMF_For_ICS.pdf
PREPARATION IDENTIFICATION
• Practice IR through exercises • Evidence acquisition and analysis
• Train the team • Information sharing internal and external
OPERATIONAL
LESSONS LEARNED RESPONSE CONTAINMENT
• What actions were taken to Operators are continuously trained to ensure process safety, • Determine where an adversary
prevent similar attack system reliability, and how to respond in emergencies to would need to be to achieve
recover from system events. Likewise, the cyber operators who the effect
• Was information shared effectively support the underlying technologies need to be trained
in this way as well and integrate operations into • Isolate the system or isolate control
all phases of the response plan.
RECOVERY
ERADICATION
• Regain integrity of control system
• Verify the root cause or initial infection point that
• Determine when to restore system impacted operations was identified
control capabilities
• System purpose
• User needs
• Vendor/manufacturer recommendations
• Regulations
• Asset identification and inventory for at least the crown jewels of the key sites
• Segmented environments where possible to reduce ingress and egress into as few
pathways as possible, ultimately creating “choke points” for enhanced security and
monitoring
• Determining when bi-directional access is needed, both now and in the future vs. truly
read-only applications
- For example, air gaps are not realistic in almost all environments outside of nuclear
power plants. Modernization efforts and data access requirements significantly
limit the ability of data diodes to be deployed across many sites. Data diodes can
be successful in specific use cases, however, such as remote diagnostics monitoring
of gas turbines where no other control or return access is required. In most
organizations, a switched network and proper application of firewalls are common.
• Log collection from systems of value such as host-based log collection on HMIs and
EWS, Sequence of Event logs from supervisory systems, and event and access logs
from industrial equipment that supports it such as Syslog from PLCs
ICS network visibility and monitoring is not just a technology problem. Among the five
ICS Critical Controls, ICS Critical Control No. 3 is most often approached by organizations
with the question, “what product do we buy to solve our problems?” There is no silver
bullet technology that addresses this security control. An organization needs to consider
the following factors to inform a technology selection:
• What data acquisition capabilities exist or are planned in connection with ICS
Critical Control No. 2? (Consider endpoint/host acquisition, limited network
collection, full network communications, multiple network visibility, ingest
capabilities from other tools, and enriched analytics from additional providers.)
13
SANS “Industrial Control Systems Security” offers free resources about defense use cases. See www.sans.org/industrial-control-systems-security/
• What processes exist or are anticipated in connection with ICS Critical Control No. 1
that will drive incident response actions?
INCIDENT INVESTIGATION
AND RESPONSE
Limited visibility,
existing resources
Existing
• Vulnerability identification
• Threat detection through key threat behaviors and tactics, techniques, and
procedures of adversaries aligned with the risk scenarios to drive efficient and
effective incident response
Although the benefits of remote access are vast, so are the risks. Many critical
infrastructure organizations moved to operating models in 2020 due to the global
pandemic and the need to manage the human health safety risks. Prior to that time, such
operating models would not have been allowed or accommodated at most organizations.
Seemingly overnight, however, remote access has become the new normal. As a result,
adversaries increasingly target the methods of remote access into industrial operations
directly. It is no longer necessary in most companies to target the IT networks to get to
the OT networks. Even when adversaries do target those networks, they may not be the
organization’s IT networks but instead the IT networks of their vendors, maintenance
personnel, integrators, and equipment manufacturers. The adversary uses them to pivot
directly into the OT networks. Establishing secure remote access is a must in modern-day
industrial operations.
Often the focus on vulnerabilities drives conflicts between IT and OT staff because finding
and patching every vulnerability in an operational environment across equipment with
deployments of upwards of 30-year life cycles can be overwhelming. This is especially
true when patch application can have unknown effects or require reboots or maintenance
periods that may not regularly happen at industrial assets. Focusing instead on the key
vulnerabilities with a focus on a risk-based approach with the application of ICS Critical
Control Nos. 2 and 3 allows for the tension, workload, and potential for disruption to be
significantly reduced.
Some regulatory approaches such as NERC CIP provide requirements around security
patch management and the corresponding change management criteria required
whenever security-related patches and security control changes could be affected. While
these requirements are absolutely necessary and provide a security benefit to entities
subject to the regulation, they come with a lot of pain with regard to the time frames
in which they need to be assessed, performed, and documented on an ongoing forever
basis. In addition, there is no real ability to assess the priority or risk of identified security
patches because all identified applicable security patches are treated equally and require
action, which may put the systems at risk to implement. The high frequency of occurrence
14
he Dragos Year in Review reports provide analysis on the threats and vulnerabilities in the community. Across each year, the
T
report finds that about 4% of the vulnerabilities add new functionality to the environment that an adversary can abuse or
has already exploited. A significant portion of vulnerabilities in ICS simply do not reduce the risk to patch or mitigate and
instead should generally just be monitored for exploitation. To read the 2021 report, visit
www.dragos.com/year-in-review/?utm_campaign=Q121%20-%202020%20Year%20In%20Review&utm_source=SANS%20ICS%20Summit%20Keynote
Vulnerability Footprint
• Impact Impact to
• Exposure Business and
• Deployment Operations
• Simplicity
Identify
Vulnerability and
Available Patch
Analyze Risk
YES YES
NO Routine
Scheduled Patch
Document Patch
- It is incredibly common in the ICS community for multiple vendors to have the
exact same vulnerability yet only one vendor issues an advisory and mitigation
is based on the reporting researcher contacting them. Such was the case in
the PIPEDREAM malware that took advantage of a specific version of Codesys
software embedded in hundreds of different programmable logic controllers
(PLCs), but only a few vendors disclosed the problem.
14
www.cisa.gov/uscert/sites/default/files/recommended_practices/RP_Patch_Management_S508C.pdf
Summary
The five ICS Cybersecurity Critical Controls discussed in this paper provide a path for
critical infrastructure organizations to pursue through new capital investment projects
and in programmatic operational and maintenance initiatives. They can be pursued in
order and in concert with one another to create a robust ICS cybersecurity program that
is tailored to the risks facing the organizations. These prioritized critical controls can help
guide organizations seeking recommendations and guidance on what to do next based on
threat-informed activities instead of over- or under-investing. Critical Controls supporting
elements need to include those in Figure 7.
While the five controls highlighted in this paper will act as a valuable resource to
practitioners and leaders alike, they are less effective and more difficult to implement
without the appropriate support and culture within an organization, including: