!poster - ICS Vs IT Security - 2022
!poster - ICS Vs IT Security - 2022
reduce travel costs and remotely access environments. Today, most MAIN DIFFERENCES BETWEEN ICS/OT AND IT SECURITY with limited or no access to the Internet. As well, IT and ICS have
This SANS industrial control system (ICS) control systems use modern TCP/IP network stacks, modern network
The main differences between
different attack surfaces, and risk profiles.
technologies, and a blend of traditional IT and industrial protocols.
poster offers guidance on defining the However, in many cases legacy systems still exist as part of critical
IT and OT/ICS systems drive External site-to-site encrypted channels are needed for geographically
differing requirements Security dispersed facilities. However, secure authentication of ICS commands
differences between cybersecurity defense subsystems within control systems. In addition, despite its benefits,
across six areas: Incident Safety inside control networks could be put in place after ICS-specific or
automation can bring new types of risks. Response
methodologies, security controls, safety, adapted defenses are established, starting with network architecture,
Cyber passive defenses, and a solid deployment of ICS network security
impacts, skillsets, and the security missions SAFETY CULTURE AND TRAINING Security Skillsets monitoring conducted daily by trained ICS security defenders using ICS
Controls
for ICS/OT (operations technology) Safety training, drills, meetings, and stop-work safety protocols are
protocol aware tools. Enabling encryption inside an ICS network(s)
requires a risk benefit analysis and heavy consideration for cyber
compared to traditional information commonplace in control system environments. Impacts such as Support
System
Designs defense capabilities and impacts to the real-time communication
malfunctioning equipment or a cyber-attack on the control system
technology (IT) security. network can have safety ramifications for facility workers and the
requirements and legacy devices.
ICS AND IT SYSTEM LIFECYCLE DIFFERENCES IT/OT CONVERGENCE SYSTEMS, PROTOCOLS AND ICS NETWORK MAP
Information Technology Industrial Control Systems IT/OT convergence can be broken down into two threads of thought: technology, and resources/teams. External Network Hosts Common Protocols
(Business or Plant Network)
Operating Environment
COVERGENCE OF TECHNOLOGY COVERGENCE OF SECURITY ICS/OT SPECIFIC CYBERSECURITY
Indoor office settings, air-controlled data centers Outdoor Extreme weather conditions, industrial facilities, complex
remote sites Many operations technology
RESOURCES DEFENSE REQUIREMENTS Traditional
Technology & Support environments have been leveraging In recent years, leaders have been Whether in a converged or specific ICS Technology DMZ Applications Common Protocols
traditional operating systems and bringing IT security and ICS security security team, it is imperative that OT/ICS • Common operating systems
Commercial off-the-shelf software Specialized Specialized engineering software
engineering software networking infrastructure to automate teams with their unique security skillsets defenders be trained with ICS-specific
• Common protocols
and improve control system processes together or separating them out. security knowledge, technologies, tools,
Commercial off-the-shelf hardware Specialized Specialized engineering hardware
engineering hardware for decades. These traditional Specifically, they are bringing in IT and procedures. This means training them Supervisory Control Elements Common &
Industrial Protocols
operating systems running OT and security team members to manage to understand the nuances between (Network, Applications, Servers)
Traditional IT protocols IT protocols + Industrial and proprietary protocols
engineering software remain part of ICS traditional security for the business traditional IT and ICS security, the ICS
Lifecycle supporting the control system mission, networks, and ICS security team mission, safety, the engineering process, Engineering Alarm HMI Application
Regular frequent patching
2–3 year upgrade cycles
Less frequent patching, fewer maintenance windows
5–10+ year upgrade cycles
and thus should be properly managed
and protected as ICS/OT assets.
members to protect the control system
networks at all levels of the control
and ICS protocols and active defense
strategies that excel inside control ICS/OT
system for all OT/ICS assets, including environments, which are different from • Adapted operating systems
Dynamic environments Static environments Control Elements Industrial Protocols
nontraditional systems, protocols, and traditional IT security. • Embedded operating systems (PLCs, RTUs, SIS)
Design and Architecture
engineering systems in ICS environments. • Industrial protocols
Abundance of users, in/outbound internet connectivity, Very few operators, little/no Internet connectivity, very restrictive,
focus on user experience focus on process rather than user experience to prioritize safety • Engineering hardware assets
Local HMI
Network segmentation – users, servers Network segmentation adhering to Purdue Levels 0–5, THE ICS SECURITY FUTURE • Specific security controls
or ICS410 Network Architecture Reference Model • Specific incident response Sensors & Actuators IO Fieldbus using
This poster has shown that there are different approaches to IT and ICS security – and that’s okay! While some parts Industrial
Common and well-known systems, more modern technology Systems more unique and legacy components are common • Safety Protocols
of traditional IT security can help guide the community, a direct “copy-paste” of such security is not recommended for
Many users with individual and unpredictive network patterns More static network, system-to-system more predictable network
ICS and will likely cause disruptions and or safety concerns in control system environments. The OT/ICS community
communications
can adapt IT security for OT/ICS where it makes sense, all the while adjusting and prioritizing safety, human life, the OT/ICS ENVIRONMENT
Priority and Mission
reliability of operations, and the protection of physical assets. Remember, “ICS Defense Is Doable!”
Data confidentiality, integrity, availability Safety of people, protection from physical equipment damage,
Latest ICS Security News and Updates Join the Conversation
industrial command integrity, process control system availability of SANS ICS CURRICULUM ics.sans.org @SANSICS
engineering processes
ICS410: ICS/SCADA Security Essentials ICS515: ICS Active Defense & Incident Response Join the SANS ICS Community Forum Thought Leadership
Cyber Attacks Global Industrial Cyber Security Professional (GICSP) GIAC Response and Industrial Defense (GRID) ics-community.sans.org/signup SANS ICS
Smaller adversary groups targeting ICS ICS418: ICS Security Essentials for Managers ICS612: ICS Cyber Security In-Depth Free and Open-source Tools for ICS Insights and Demos
(currently, but increasing to target ICS)
ControlThings.io SANS ICS Security
ICS456: Essentials for NERC Critical Infrastructure Protection
Adversary attack research and exploits kits well known and
publicly available and scalable to general IT networks
Adversaries generally need more time and skill to have
GIAC Critical Infrastructure Protection (GCIP)
ics.sans.org
significate impact ICSPS_ICS-IT_v1.1_12-21
This poster was created by Dean C. Parsons. ©2021 Dean C. Parsons. All Rights Reserved.