Verve Value Prop
Read about the origin and philosophy of Verve and examine how our OT/ICS cyber security solution works and differentiates from others in the market.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Given the focus on external threats to organizations by way of malware, ransomware, and the evil advanced persistent threats (APT), we cannot forget about insider threats. In 2017, CSO Online made it known that the highest repercussions come from insider threats, as opposed to external cyber security attacks (20% of cyber crime events, and 30% of respondents stated impacts).
In the SANS’ 2019 yearly review for Industrial Control System (ICS) security, the authors noted a surprising number of attacks or risks relating to configurations and insiders. Even though ransomware prevention is an important topic, let’s not forget about cyber security basics.
To kick off that idea, I’ll refer you to the sixth edition of the Common Sense Guide to Mitigating Insider Threats by Carnegie Mellon Universities’ CERT. It is traditional Informational Technology (IT) based, but as with any cyber security framework, it should be adapted for your environment and be situationally appropriate.
In operational technology, we must be vigilant of the environment, especially those pesky heirloom devices or “break-glass” conditions in the control room. Use caution, but as OT becomes increasingly converged into enterprise or IT, examine this before an incident occurs is certainly invaluable.
Given that cyber security is not a world of concrete absolutes, security to an industrial organization is focused on reducing the risk of a cyber event occurring, exposure, and overall impact. Whether a risk is sourced from an internal or external actor, it truly doesn’t matter. What does matter is a lingering risk caused by an individual with substantial information about your organization, or the ability to indirectly cause an incident by mistake, human attention deficits, or incompetency.
For the most part, humans believe attacks don’t originate from themselves or their tribe. With growing complexities of operating systems, social media, and increased connectivity comes increased negative cyber activity. And as such, reducing threats with relatively high risks of occurrence, and with higher impacts than typically noted from external actors, this would be considered a win to upper management and site operators.
To reduce insider threats, best practice is to implement strategies within their overall cyber security and risk management programs that provide value when dealing with malicious and unintentional insiders.
Before locking down every system and implementing biometrics or gross collections of data on your employees and users, use caution with respect to principles such as privacy rights and related sensitive personal information. Insider threat is much more than theft, or fraud, but in an OT environment, it could prove disastrous for the insiders themselves, on-site individuals, the business, the environment, the organization, and even local communities and economies.
Using the above seven areas as a high-level overview, the Common Sense guide expands on them as defined twenty-one areas seen below. They work reasonably well as guidelines to drive your organization’s insider risk practice forward, but in OT, they need some adjustment by Best Practice area ( – denotes OK as is).
Given that OT environments are less concerned about personally identifiable information or data such as financials, the site is largely physical. In the OT world, most sites and processes should be engineered for safety, reliability and productivity, and also understand the above noted items are key elements to be incorporated into any sufficiently engineered site (e.g., see ISA SIL standards or IEC-62443-x).
With considerations to incidents such as what occurred in 2006 at Maroochy Shire, where a disgruntled contractor attacked water treatment systems and caused massive environmental damage, most OT site owners would likely agree that in OT, an insider could cause massive damage or disruptions.
OT insider threats should be a huge concern for safety and risk management teams because it is those same individuals who run your plant who also have access to sensitive information of your operations. Great care should be taken to prevent, and manage issues, but also to double and triple check the work performed and response to potentially disastrous situation.
Insider threat accounts for a larger number of incidents compared to those from the dreaded APTs of the world. In many situations, reduction of insider threat is relatively easy. A hypothetical reduction of 10% of an organization’s overall incidents is feasible because they occur in a number of environments. Concrete value is easily found and communicated across the organization.
Read about the origin and philosophy of Verve and examine how our OT/ICS cyber security solution works and differentiates from others in the market.
Learn MoreThese are the top three challenges companies face when implementing a cyber security program for their industrial control systems environment.
Learn MoreOT security governance is the set of policies, procedures, and practices that govern the management and security of OT systems.
Learn More