Observations from the 2020 RSA Conference – Control system cyber security is being discussed but still with misunderstandings

March 9, 2020
Control system cyber security is becoming more “mainstream” since I first started attending RSA in the early 2000’s, However, there is still little discussions of control system-unique engineering issues and engineering participation is still low. You cannot secure control systems without both the networks security and engineering organizations working together. Consequently, it was especially gratifying to me to see end-user companies like Johnson and Johnson who get it.

I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cyber Security Conference in San Francisco.

One of the sessions really struck me as getting it right. The session I found most compelling was with Roy Gundy from Johnson and Johnson and Dawn Cappelli from Rockwell Automation. Roy identified that his definition of OT included all engineering, safety, and operations personnel. Roy’s manager, the Vice President of Supply Chain Systems and Solutions, stated that digitalization and control system cyber security are important to the Board. This is because digitalization is necessary to get the needed productivity improvements. It was refreshing to see not only the need for control system cyber security but also the need for the engineering, supply chain, and networking organizations to work together.

There were many other sessions (including a keynote) that addressed Operational Technology (OT) networks. There were also a number of OT suppliers on the Conference floor. They discussed familiar but important issues. However, there was almost no discussion of the Level 0,1 devices, that is, process sensors, actuators, drives, power supplies, etc. The Level 0,1 issues make control systems different than just being a different type of IP network. They directly affect process safety and have no cyber security or cyber security forensics. Finally, they are the input to OT networks and are 100% trusted. Yet, in the 20 years I have been associated with control system cyber security, there has been almost no research or guidance from DHS or DOE in this area.

For critical infrastructure, the majority of the RSA attendees were from OT network security and were not domain engineers. There were very few senior managers from engineering or operations who attended the RSA Conference. There were more, but still very few, control system or manufacturing floor engineers that attended. There are several lines of thought as to why. As mentioned in my blog - https://www.controlglobal.com/blogs/unfettered/an-open-letter-to-cyber-security-policy-makers-control-system-cyber-security-is-different-than-it-and-requires-an-understanding-of-issues-unique-to-control-systems/, engineering and operations leadership generally are not part of the cyber security policy process. If they aren’t involved, how can you expect them to think cyber security is important for their engineers?  The security attendees thought the engineers weren’t there because they couldn’t get funding approval. I believe many engineers didn’t apply for funding as they did not see it as being relevant to their jobs, especially when their most critical devices are ignored. Moreover, control system cyber security issues are international in scope. The Kuwait Oil Company RSA presentation did not address the level 0,1 issues. February 24, the Netherlands held an invited IOT Conference. The same control system-unique issues, particularly Level 0,1, ignored by RSA were also unaddressed at the Netherlands conference.

I attended the Solarium Commission and CyberMoonshot sessions. I do not believe either has addressed some of the more critical unique issues of control systems such as Level 0,1 process sensors and actuators. The primary engineering and operations considerations are reliability, safety, and productivity. However, these are not the primary considerations for the CISOs and network security organizations. As an example, CyberMoonshot was focusing on the next generation Internet and cyber privacy, neither of which are critical for control systems.

With one exception, the ICS Village demonstrations addressed only OT networks. The one exception, Cybati, demonstrated a phenomena that affects the sensors similar to those identified in https://www.controlglobal.com/blogs/unfettered/analog-sensors-can-be-hacked-and-ot-network-monitoring-cant-detect-it-a-hole-in-ics-cyber-security/. There was an ICS Village session led by DHS’ Chris Krebs and Bryson Bort from Sythe. The presenters stated there were 4 pillars of critical infrastructure cyber security - standards, supply chain, work force, and detection and incident response. These 4 pillars are obviously needed. However, the issues that make control systems unique, such as the Level 0,1 devices, are not being adequately addressed. A continuing major gap is the lack of cyber security training for the control and safety system engineers, particularly based on actual control system cyber incidents. Detection and incident response cannot be adequately addressed if you can’t trust your process measurements. DHS mentioned they were attending the RSA, SANS, and S4 conferences to get their message out. However, these conferences, including DHS’s own ICSJWG conference, are network security conferences that generally do not generate much engineering or operations attendance. The conferences the control and safety engineers attend are conferences such as the Texas A&M Instrumentation and Automation Symposium and EnergyTech where there is minimal attendance from the network security community and DHS.

There was a “memorial” session for Mike Assante who made great contributions to the industry. I met Mike in 2000 when he was at the American Electric Power Company (AEP) and I was at the Electric Power Research Institute (EPRI). As one of presenters mentioned, Mike conceived and led the Aurora test demonstration at the Idaho National Laboratory in 2007. The test was successful, but industry and DOE’s response was much less so. Mike was also a proponent of addressing Level 0,1 devices. Just like Aurora, that has not been successful either. If the attendees want to honor Mike, they need to follow his lead to keep “lights on” and “water flowing”.

Control system cyber security is becoming more “mainstream” since I first started attending RSA in the early 2000’s, However, there is still little discussions of control system-unique engineering issues and engineering participation is still low. You cannot secure control systems without both the networks security and engineering organizations working together. Consequently, it was especially gratifying to me to see end-user companies like Johnson and Johnson who get it.

Joe Weiss

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.