4 Components to Rapidly Improve & Measure OT Security
The current approaches to OT cyber security lack the ability to demonstrate progress and improvement on key security metrics over time. Here’s how to change that.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
NIST released Version 2.0 of the NIST Cyber Security Framework (CSF) in 2024. The original NIST CSF gained significant traction since its release in early 2014, while Version 1.1 added important new elements to help companies continue to advance their cybersecurity practices.
Version 2.0 takes it a step further and focuses on measuring the effectiveness of cybersecurity activities. This version incorporates the following updates:
This guide will provide you with a roadmap to using NIST CSF to drive greater cybersecurity maturity in control systems.
The NIST CSF 2.0 update incorporates an additional measure that those within the operational risk management space must consider. Here are the latest NIST CSF functions.
The Govern function within the NIST CSF framework involves monitoring, communicating, and establishing the cybersecurity risk management strategy, expectations, and policies.
The Identify function highlights the current cybersecurity risks.
The Protect function uses safety measures to manage cybersecurity risks.
The Detect function finds and analyzes possible cybersecurity attacks.
The Respond function takes action against the detected cybersecurity incident.
The Recover function restores affected operations and assets.
NIST CSF 2.0 also integrates profiles and tiers for organizations to understand and improve their cybersecurity POV. Profiles document the organization’s desired cybersecurity state and highlight what the organization wants to achieve. These are classified into the seven functions: Govern, Identify, Protect, Detect, Respond, and Recover. It also incorporates the organization’s mission, risks, and stakeholder expectations.
Tiers describe the maturity of an organization’s cybersecurity risk management practices, note how the organization is doing, and identify opportunities for improvement. They range from Tier 1 (Partial) to Tier 4 (Adaptive). Tiers can inform profile development by
Integrating NIST CSF in your organization may come with several challenges during the implementation phase, including:
Read the five steps below to help your organization succeed and achieve NIST CSF maturity.
The first step in following the NIST CSF is to establish a robust—but rapid—assessment of your current status. “Assessment” is a vague term, however. Many customers get stuck before the journey begins under the weight of an assessment process that turns into a months-long exercise in surveys, network diagram reviews, penetration tests, etc.
The key to gaining momentum is to conduct a rapid assessment within 60–90 days across the organization. This rapid assessment process provides enough detail to build an initial maturity roadmap and to enable the company to begin to make progress. It is not intended to diagnose every threat pathway or end-point vulnerability.
The rapid assessment should provide input on the cybersecurity baseline on people, processes, policies, and technology. It typically encompasses the following:
The assessment provides the baseline starting point, but the critical step is to then lay out your company’s cybersecurity maturity aspiration based on your specific business needs, regulatory requirements, etc., and build a robust roadmap based on a portfolio of initiatives across process development, technology deployment, and training, and awareness.
To develop a successful roadmap, the following should be considered:
Taken another way, the need to build on the portfolio of initiatives is usually executed in a cyclical fashion over multiple discrete projects and budgets. The objective is to move from the basic level of protection through higher levels of sophistication and an eventual shift from reactive to proactive monitoring and detection, as depicted in the maturity cycle below.
It is important to note that the above cycle is just a general intended pattern toward a more robust security program. The specific tasks, the order they are executed and the time frame across which they are deployed have to be tied to the specific risks and objectives of the individual organization.
As highlighted above, every program should have a set of foundational initiatives necessary to enable the broader program. These initiatives should provide some rapid impact on security while also providing baseline capabilities.
This first “wave” of initiatives should be items that can be achieved within 90 days to demonstrate progress as well as allow for rapid movement to additional elements. These initiatives will include both “informational” or “baselining” initiatives as well as the first wave of “remediation” or “hardening” activities. The baselining-type of activities would include hardware and software inventory, configuration baselines, firewall rule maps, etc. The remediation-type activities would likely include software removal, hardening of baselines, or initial segmentation.
These initiatives normally have “corporate” and “site-level” components. In geographically dispersed organizations, they will focus on approximately 3-5 pilot sites representing a range of locations for the “site-level” components. The foundational initiatives will be rolled out at these sites and they will act as “lead dogs” to be ahead of the pack in implementing greater levels of maturity over time.
This first phase of execution will likely include several key elements:
Foundational initiatives can strengthen supply chain risk management efforts (SCRM) through:
With version 1.1, most organizations rolled out proven tool sets to additional sites, embarked on second or third-phases of security tool and procedure design, testing, and deployment to pursue a rich, multi-layered security program.
Organizations that implement NIST CSF 2.0 are more than likely in the refining, building depth, and maturing phases. Keep the following in mind as you continue to scale your security program with additional processes and technologies:
A robust monitoring and measurement program is critical to a successful NIST CSF 2.0 implementation. Like all things in management, inspection and tracking of progress is critical to improvement.
Companies often forget about these measurement and tracking components until they complete steps 1-4. The resources, tools, and budgets for ongoing monitoring and measurement should be considered upfront. The measurement provides a status report and enables course correction as the initiatives are executed. The roadmap will certainly evolve over time, and measuring progress and issues as it proceeds is critical to intelligent evolution.
Metrics and dashboards make it easy to provide a visual representation of a program’s status and how it performs against key objectives. Every metric should align with outcomes in the roadmap and be tied to each NIST CSF 2.0 function. Your dashboards should be digestible and high-level enough for key stakeholders.
Measurement efforts tie back into the Governance function because it’s all about aligning with your organization’s goals and embracing data-driven decision-making. Based on your measurements, you can celebrate progress, identify areas of improvement, and monitor prioritized risks.
Bottom line: Cybersecurity maturity is a journey, not a destination. The key to a successful program will be its ability to continually improve the maturity level over time as new risks are identified and new solutions are developed. The roadmap described above should be a living document. The foundational elements and “glue” that integrate the information and tools together should enable the maturity levels to grow over time.
The current approaches to OT cyber security lack the ability to demonstrate progress and improvement on key security metrics over time. Here’s how to change that.
Learn MoreOT (Operational Technology) security governance is the set of policies, processes, and practices that an organization puts in place to manage and protect its operational technology infrastructure and assets. Getting OT cybersecurity governance right is imperative to the success of an industrial company’s security program as new threats, regulations, and requirements emerge.
Learn MoreIn today’s complex industrial organizations, the right cyber security governance structure depends on the culture and existing models in place. Whether you’re just getting started or well on your cyber security journey, governance is foundational in securing critical infrastructure and industrial operations. Download our on-demand webinar to learn how to align IT and OT security initiatives to make progress against…
Learn More