Following CISAs Guidance to Improve ICS Security
Learn how organizations successfully build consistent cyber practices that address existing and emerging threats.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Over the past several weeks, CISA and other organizations have released multiple notices about the importance of prioritizing vulnerabilities based on the true risk that they pose. Today (as we write this, November 10, 2022) CISA’s Executive Assistant Director for Cybersecurity posted a blog entitled: Transforming the Vulnerability Management Landscape. In his blog, Eric Goldstein highlights the challenges that operators face in dealing with the huge number of vulnerabilities that are unaddressed as well as the volume of new vulnerabilities released each week.
CISA is taking positive steps toward helping organizations with this challenge. CISA now publishes a list of known exploited vulnerabilities (KEV) with known exploits which begins to narrow down the prioritization process. Further, CISA has supported the development of a range of new capabilities such as the Common Security Advisory Framework (CSAF) to enable automated distribution of vulnerabilities for easier import into current organization databases and tools, the Vulnerability Exploitability Exchange (VEX) where software vendors can assert whether or not a particular vulnerability impacts a particular product. This integrates with CSAF to allow vendors to distribute these in machine-readable formats. Finally, CISA has supported the Stakeholder-Specific Vulnerability Categorization (SSVC) to create a decision tree to prioritize what actions to take for a given vulnerability. This is the basis for the KEV mentioned above. The SSVC also offers a range of decision tree options depending on the organization’s mission.
All of these are great steps for organizations to prioritize the vulnerabilities in their environments. We applaud CISA for continuing to provide recommendations and solutions that simplify the complexity of cyber security, rather than add further complexity. As we wrote in prior posts about responding to growing OT vulnerabilities and spoke about in webinars about following CISA’s guidance to improve ICS security, CISA has remained consistent and highly practical in its recommendations for securing our critical infrastructure.
Even with all of these tools and frameworks, we find that organizations still struggle with how to put this into practice. Resources, challenging OT/ICS network and device environments, huge volumes of vulnerabilities, and lack of detailed understanding of asset impact on operations make applying the recommendations and frameworks challenging in real-world scenarios. If an organization has a dozen or three dozen production facilities, perhaps a range of warehouses, etc. all running complex, legacy OT and IT systems, they often have a number of challenges in applying the prioritization:
So, how can an industrial organization apply the great recommendations and work of CISA?
For the past fifteen years, Verve has helped critical infrastructure providers (manufacturers, power companies, oil and gas providers, transportation, etc.) identify risks AND remediate those risks in their environments. To do so, it is critical to prioritize which risks are most critical to address. Verve has developed what we call 360-degree risk prioritization. It includes several key elements:
We applaud CISA for its recent efforts at helping organizations to prioritize vulnerabilities. We encourage all organizations to adopt these practices. We also strongly believe that toolsets like Verve make these recommendations practical for organizations by automating the prioritization, remediation, and monitoring of risk. Cybersecurity in critical infrastructure is a challenging task – with too few resources to defend. Automating comprehensive risk prioritization is the only way we can all stay ahead.
Learn how organizations successfully build consistent cyber practices that address existing and emerging threats.
Learn MoreWhile there has been a string of alerts and buzz around naming the various threats, the recommendations remain the same: Manage your OT systems through core security fundamentals.
Learn MoreOT/ICS security teams hear different perspectives from different groups and are often left confused as to the best place to begin.
Learn More