Addressing New ICS/OT Cybersecurity Regulations
How to achieve a successful and efficient programmatic response to the current and future regulatory environment for ICS/OT cyber security.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
An increasingly digitized world with growing digital connectivity brings enormous opportunities and attack paths for cyber criminals to exploit. In parallel, the number, complexity, and scale of cybersecurity incidents and their economic and social impact are growing. Supply chains are more interconnected, and a security breach at an entity significantly impacts an entire region or industry. The EU is increasing the security risk management requirements for the region to protect the digital landscape.
At the end of 2022, the European Union published the final version of “Measures for a high common level of cybersecurity across the Union,” also called “NIS2”. This is the successor of the “Network and Information Security Directive” (NISD), which was released in 2016. The directive provides legal measures to improve overall cybersecurity across the EU. This includes obligations for businesses, government authorities, and cooperation between EU member states on security risks and incidents. The differences between the NIS2 draft version (released in 2020) and the final version are significant, and this paper refers to the final version.
This document’s purpose is to provide an overview of the final NIS2 directive. Our second whitepaper provides practical advice and security measures for incident detection/reporting and OT security based on an EU member state’s recently published methodology update.
The NIS2 directive will become effective across all EU Member states by 17. October 2024. All requirements apply for entities of specific sectors and business sizes that are active in one or more EU member states. For a business to be in scope, the entity has to engage in economic activities, irrespective of its legal form. Major suppliers for clients in the EU will also be in scope if their clients are in the EU and receive critical services.
Key aspects of NIS2:
The expected impact:
Suggested actions:
NIS2 is part of the EU’s cybersecurity strategy and complements other directives and laws. Especially relevant for operational environments are the Critical Entity Resilience (CER) directive, which is closely interrelated with NIS2, and the EU Cyber Resilience Act (ECRA). Both have significant consequences for vendors, operators, and service providers of operational equipment; ECRA becomes effective at the end of 2023.
Finalized and transposed in parallel to the NIS2 Directive, together they address digital cyberattacks (NIS) to physical attacks and natural disasters (CER). CER focuses on physical rather than digital resilience measures for critical entities. National authorities perform reviews and assess the effectiveness and accountability of the risk management process; they can also provide significant support to entities. Both directives become effective by October 2024.
EU Cyber Resilience Act (ECRA):
Becomes legally effective End of 2023 and is focused on regulating a broad range of digital devices, their hardware, and solutions with embedded software and applications. It imposes obligations on manufacturers, importers, and distributors of these products across their life cycles. It also defines essential requirements for the design, development, production, and operation of digital products and adds requirements for vulnerability and incident handling for manufacturers and obligations for operators.
To improve cybersecurity and create risk awareness, ENISA publishes an annual threat landscape report that includes NIS-based incident reporting information and globally gathered incident data. A recently released 2023 report for the transport sector shows a targeted system that includes OT for the first time (left image) and observed incidents across all sectors (right image) and concludes for 2022, once again, an increase of ransomware, impacting vulnerable and unpatched systems.
What does the coverage of OT mean for the organizations in scope?
We know there is already a skills shortage in cybersecurity and especially for OT, but there is a notorious lack of experts with a combined industrial operational risk understanding and security expertise. Entities and regulators must find ways to identify and evaluate the most efficient, automated, and integrated approaches for continuous and active management of risks, including OT. NIS2 will require organizations to understand their risks and actively manage their security measures. A one-time, project-based security investment into a single-dimensional technology without proper management integration will not be sufficient to cover the increasing requirements. Especially for operational environments, entities will either acquire new security solutions for each maturity increase step they take or invest in higher maturity solutions they can grow with and into. The last approach is more effective; the other is slower and pricier. As some entities are regularly audited, effective and valuable approaches to OT security will quickly become visible to authorities.
The last NIS2 update added a new level of flexibility to who is in scope. Added flexibility for regulators allows entities to move between weaker and tougher requirements sets; unfortunately, it also adds complexity for entities to determine if they are in scope.
Scoping elements:
NIS2 distinguishes between essential and important entities. Essential entities have increased security requirements and face stricter supervision and higher penalties. See the image below for major requirements; we will provide more details later on:
At some point, you will be able to reach out to ENISA for clarification; the EU agency will create and maintain a registry for essential and important entities for NIS2. Until then, you can perform a precheck to determine if you could be in scope. Because the methodology is rather complex (and flexible to be extended for the EU Commission), we provide a quick check-up chart:
To perform a pre-check if you are considered an essential or important entity, you need to know the following:
Sector | Subsector | Type |
---|---|---|
Energy | Electricity | Energy supply, selected Distribution System Operators, selected Transmission System Operators, selected Electricity Producers, nominated Electricity Market Operators and selected participants |
District heat/cooling | Operators for district heating or district cooling | |
Oil | Operators of transmission pipelines, Operators of oil production, refining and treatment facilities, storage, and transmission, selected Central oil stockholding entities | |
Gas | Selected Suppliers, selected Distribution system operators, selected Transmission system operators, selected Storage system operators, selected LNG system operators, selected Natural gas undertakings | |
Hydrogen | Operators of hydrogen production, storage, and transmission | |
Transport | Air | Selected Air carriers, selected Airport managing bodies, Air Traffic Control Services Providers (ATC) |
Rail | Selected infrastructure managers, selected Railway undertakings | |
Water | Selected inland, sea and coastal passenger and freight water transport companies, selected Managing bodies of ports, selected Operators of vessel traffic services | |
Road | Selected Road authorities, selected Delegated traffic management control regulations, selected Operators of Intelligent Transport Systems | |
Health | Pharma, Manufacturing, Laboratories, Services | Selected Entities manufacturing medical devices considered as critical during a public health emergency, selected Healthcare Providers, EU reference laboratories, selected Entities carrying out research and development activities of medicinal products, selected Entities manufacturing basic pharmaceutical products and pharmaceutical preparations |
Water | Drink | Selected suppliers and distributors of water intended for human consumption, excluding those with majority of other general activity |
Waste | Selected undertakings collecting, disposing, or treating urban, domestic, and industrial wastewater when essential part of the business. | |
Space | Infrastructure, Services | Selected Operators of ground-based infrastructure, owned, managed, and operated by Member States or by private parties, that support the provision of space-based services. |
B2B ICT Services | Managed Services Providers (MSP), Managed Security Services Providers (MSSP) | |
Digital Infrastructure | (eg. selected providers of public electronic communications networks and services, Data Center Service Providers), selected medicinal products, selected cosmetics, tobacco, narcotics, | |
Banking, Financial Markets, Public Administration | Not in the focus of this document |
Sector | Subsector | Type |
---|---|---|
Postal and courier services | Selected postal service providers | |
Waste management | Selected entities, carrying out waste management but excluding undertakings for whom waste management is not their principal economic activity | |
Food production, processing, distribution | Entities engaged in wholesale distribution, industrial production and processing of any food and drink. Not a food business (e.g. feed, live animals unless for human consumption, plants prior to harvesting) | |
Manufacturing | Chemicals | Selected undertakings carrying out the manufacture, production and distribution of substances and articles. |
Medical Devices | Entities manufacturing medical devices | |
Computer, electronic and optical products | Entities that manufacture computers, electronic and optical products, electronic components and boards, loaded electronic boards, computers and peripheral equipment, communication equipment, consumer electronics, instruments and appliances for measuring, testing and navigation; watches and clocks, irradiation, electromedical and electrotherapeutic equipment, optical instruments and photographic equipment, magnetic and optical media | |
Electrical equipment | Entities that manufacture electrical equipment, electric motors, generators, transformers and electricity distribution and control apparatus, batteries and accumulators, wiring and wiring devices, fiber optic cables, other electronic and electric wires and cables, wiring devices, electric lighting equipment, domestic appliances, non-electric domestic appliances, other electrical equipment | |
Manufacture of machinery and equipment n.e.c. | Entities that manufacture general-purpose machinery, engines and turbines (except aircraft), vehicle and cycle engines, fluid power equipment, other pumps and compressors, taps and valves, bearings, gears, gearing and driving elements, other general-purpose machinery, ovens, furnaces and furnace burners, lifting and handling equipment, office machinery and equipment (except computers and peripheral equipment), power-driven hand tools, non-domestic cooling and ventilation equipment, other general-purpose machinery n.e.c, agricultural and forestry machinery, metal forming machinery and machine tools, other special-purpose machinery, machinery for metallurgy, machinery for mining, quarrying and construction, machinery for food, beverage and tobacco processing, machinery for textile, apparel and leather production, machinery for paper and paperboard production, plastic and rubber machinery, other special-purpose machinery n.e.c. | |
Motor vehicles, trailers, and semi-trailers | Entities that manufacture motor vehicles, trailers and semi-trailers, bodies (coachwork) for motor vehicles, parts and accessories for motor vehicles, electrical and electronic equipment for motor vehicles, other parts and accessories for motor vehicles | |
Transport equipment | Entities that manufacture transport equipment, ships and boats, ships and floating structures, pleasure and sporting boats, railway locomotives and rolling stock, air and spacecraft and related machinery, military fighting vehicles, transport equipment n.e.c., motorcycles, bicycles and invalid carriages, other transport equipment n.e.c. |
If your sector or company size is not on either list, you may still be in scope if:
Member states can exclude areas of defense, national security, public security, or law enforcement from the requirements of the directive.
Duty to provide entity contact details:
All entities in scope must provide contact details:
Reporting obligations for a potential severe incident:
All entities in scope must report severe incidents. Local government, authorities, and CSIRT support and information sharing across entities are one of the main areas of regulation. The importance of the topic is reflected in tight deadlines and can become subject to sanctions. A notification does not make the notifying entity subject to increased liability.
A severe incident that must be reported to local authorities or the CSIRT is characterized as:
The EU is building tools to support the reporting process and allow quick escalation and support of the incident response. Entities can ask to be supported by authorities.
Report | What? | Deadline |
---|---|---|
Early warning | • Cross-border impact? • Unlawful or malicious act? | Within 24 hours after being aware |
Incident notification | • Update to early warning data? • Initial assessment? • Severity and impact? • Indicators of compromise? (if available) | Within 72 hours after being aware |
Intermediate report | • Relevant status updates? | Government requested (anytime) |
Final report (Progression report if attack is ongoing) | • Detailed description of the incident, including severity and impact • Type of threat or root cause • Applied and ongoing mitigation measures • Cross-border impact of the incident | One month after submission of initial notification |
Final report after ongoing attacks | (see above) | Within one month of handling the incident |
Who and when to notify?
A final incident report must be sent no later than one month after the submission of the incident notification. It must at least include:
In Chapter II, we will discuss how incident handling measures can be expected to look based on the recently released EU member state security methodology.
Like NISD, NIS2 only provides a minimum mandatory set of measures to cover. These are not necessarily interconnected or even directly related. In many cases, additional steps, processes, or security functions lay in between. Security measures are not specified in detail. This is normal for EU directives; they only describe a broad outcome and allow national legislations to choose the desired level of detail they regulate. Later, there will also come an implementing regulation for NIS2 with more detailed requirements, which are binding to the Member states. The following list contains minimum mandatory areas of coverage for all entities; exceptions are mentioned.
All entities must take effective, appropriate, and proportionate technical and organizational measures to manage the cybersecurity risks posed to the security of networks and systems. These measures shall ensure the level of security is related to the risk presented. All measures and respective non-compliance are accounted for by management.
The following measures represent the minimum requirements to be covered:
Quick checklist for the first steps:
An overview of a timeline with preventive and detective risk management measures (A3), a security incident, and the following reporting duties (A2) was provided in the presentation we gave on the final NIS2 directive.
As a general rule, essential entities are subject to a stronger supervisory regime, while important entities are subject to lighter supervisory: They have no initial obligation to systematically document compliance with cybersecurity risk management requirements up to the point of a major incident or threat happens. At that point, they will be supervised, face enforcement of violations, and can be subject to fines and penalties.
Supervision:
Essential and important entities face equal baseline measures. Additional requirements for essential entities will be covered in the next paragraph.
Supervision all entities in scope:
Additional supervision for essential entities covers:
Enforcement of violations:
Should the supervision identify compliance violations, enforcement will come into effect. Again we will separate baseline enforcement from enforcement for essential entities alone.
For all entities in scope, local authorities can
Additional enforcement for essential entities includes:
When issuing enforcement actions and penalties, both entity types authorities must consider
Penalties and fines:
The directive states multiple times that penalties defined by each member state must be effective, proportionate, and dissuasive.
For all entities in scope, local authorities can
Important entities face maximum penalties of at least 1,4% of global turnover, or €7M, whichever is higher.
Essential entities face maximum penalties of at least 2% of global turnover, or €10M, whichever is higher.
One of the major changes for entities in the scope of NIS2 is the requirement to actively manage risks and not only detect and document but also remediate them. The image below shows Verve’s unique capability to collect rich, asset-related security information, which helps to detect risks as well as incidents (left circle) and the capability to remediate incidents as the Verve platform enables organizations to actively take informed actions to remediate risks and incidents.
Taking action is provided in a sophisticated way that reflects the reality of most security departments in OT: Limited personnel and limited expertise. Risk data related to incident causes are collected through the OT environment (data arrow up). The data is then analyzed, and a strategic and methodical (global/regional or local) response is orchestrated by a small expert team. The suggested response action is prepared and suggested to the local operations team before it is executed (actions arrow down), and the local field level stays in control.
How to achieve a successful and efficient programmatic response to the current and future regulatory environment for ICS/OT cyber security.
Learn MoreAlign IT and OT security initiatives to make progress against a chosen standard for an efficient and effective cyber security program.
Learn MoreHere's how to prepare to act on the new NIS2 cybersecurity directives for basic security guidelines, operations and monitoring.
Learn More