understanding cyber of uscg nvic 01-20

25
Understanding Cyber Security Through the Lens of USCG NVIC 01-20 Dennis Hackney – Head of Cyber Solutions, ABSG Marcia Lee – Manager, Business Development, ABSG © 2020 ABS Group of Companies, Inc. All rights reserved.

Upload: others

Post on 23-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Understanding Cyber of USCG NVIC 01-20

Understanding Cyber

Security Through the Lens

of USCG NVIC 01-20

Dennis Hackney – Head of Cyber Solutions, ABSG

Marcia Lee – Manager, Business Development, ABSG

© 2020 ABS Group of Companies, Inc. All rights reserved.

Page 2: Understanding Cyber of USCG NVIC 01-20

• Enter your question(s) in the Teams Chat section at this time.

• Today’s webinar is being recorded and will become available at:

www.abs-group.com/webinars

• Please allow 1-2 business days for the webinar recording to be

posted.

Questions

Reminder: Do not discuss Sensitive Security Information (SSI)

specific to your facility in the questions.

Ref: 49 CFR 1520

Page 3: Understanding Cyber of USCG NVIC 01-20

Agenda

• Safety Moment

• Real World Incidents

• Facility Cyber Security Challenges

• NVIC 01-20 Overview

• Correlating NVIC 01-20 to 33 CFR 105 and 106

• MSIB and CISA Alert Recommendations

• Cyber TSI

• NVIC 01-20 Guidelines

• FSO’s Cyber Role

• Incident Command System and Facility Cyber

3

Page 4: Understanding Cyber of USCG NVIC 01-20

Safety Moment – COVID-19

• Work from home requirements

• Remote access

• Is your facility ensuring your access into

facility’s systems is remotely secured?

• Stay vigilant with passwords

Page 5: Understanding Cyber of USCG NVIC 01-20

Safety Moment – COVID-19

• Malicious actors are now looking to steal critical data

from your work

• Phishing increasingly utilized:

• Phone scams

• E-mails claiming to be government announcements

• Online meeting hijacking

• Financial theft

• How much identifying information do you have published

on your company’s website?

5

Source: Forbes.com

Page 6: Understanding Cyber of USCG NVIC 01-20

Real World Incidents

Attackers are rapidly evolving their tactics as they learn

more about the environment

Disrupting, delaying or destroying critical

infrastructure and assets is a major incentive

There are a variety of attackers

• Examples: Nation states, organized crime, terrorist,

hacktivists

Attacks have grown in frequency and intensity

• Examples: Ransomware, insider threat, phishing attacks,

malware, zero day

6

O S

R

reats of cyber

attac s to ad ance

eo political

a endas

CO

lind eye to cyber

attac s

State actors

Cyber criminals

ROO

alware ttac

ran State ctors

R O R

RO R

alware ttac

Russian State ctors

R

R

re treatment

c emicals altered

alware ttac

n nown attribution

COSCO

alware ttac

n nown attribution

RS S

etya alware attac

Russian state actors

C R SO S

S CO

Ransomware ttac

n nown attribution

OR OF

RC O S

etya alware attac

ranian State actors

OR OF S

O attac s

etya alware attac

ranian State actors

Page 7: Understanding Cyber of USCG NVIC 01-20

ITIT

OTOT

OT Security: The problem is getting easier to see

Information Technology (IT)

• Lifecycle management

▪ Component lifetime: 2-5 years

▪ Upgrades are straightforward and changes are automated

• User expectations

▪ High throughput demanded

▪ High delay is accepted

▪ Data security is essential

• Cyber Security

▪ Primary concern: Loss of data

▪ Mature practices and high awareness

Operational Technology (OT)

• Lifecycle management

▪ Component lifetime: 10-20 years

▪ Changes require specialized personnel and careful planning

• User Expectations

▪ Moderate throughput acceptable

▪ High delay is a serious impact

▪ Fault tolerance and redundancy essential

• Cyber Security

▪ Loss of life, environmental damage, equipment damage

▪ Ad hoc or no processes and lack of awareness

HMIs

SYSTEMS +

ACTUATORS

PLCs

SYSTEMS TO MONITOR

& CONTROL

SAFETY

SYSTEMS

EXTREMELY SENSITIVE

NETWORKS

AIS

PHYSICAL

MACHINERY

ENGINE

CONTROL

PROPULSION

7

INDUSTRY

COMMUNICATION

TECHNOLOGY

EMAIL

SERVER

CLOUD

INFRASTRUCTURE

PRIORITY =

CONFIDENTIALITY

ROBUST

NETWORKS

WEB-BASED

COMMON

PROTOCOLS

STORE, PROCESS,

DELIVER INFORMATION

PAYROLL SYSTEM

CONNECTIVITY

Page 8: Understanding Cyber of USCG NVIC 01-20

International HQ

Marine Terminal

Landside

Facility

IT Systems

OT Systems

Page 9: Understanding Cyber of USCG NVIC 01-20

ere’s t e roblem…

Industrial Control Systems are Vulnerable

• Easy Access to Unprotected ICS

Source: Shodan.com, April 9, 2020

Page 10: Understanding Cyber of USCG NVIC 01-20

USCG Cyber Guidance: USCG NVIC 01-20 NIST CSF

• NIST SP 800-53, Rev 4 – Security and Privacy Controls

for Federal Information Systems and Organizations

• NIST SP 800-82, Rev 2 – Guide to Industrial Control

Systems (ICS) Security

NIST Cyber Security Framework

U.S Coast Guard

Navigation and

Vessel Inspection

Circular 01-20

(USCG NVIC 01-20)

Page 11: Understanding Cyber of USCG NVIC 01-20

Connecting the Dots

LAW / REGULATION

33 CFR 105/106

FACILITY SECURTY POLICY

NVIC 03-03

FACILITY CYBER POLICY

NVIC 01-20• NIST CSF

Page 12: Understanding Cyber of USCG NVIC 01-20

USCG NVIC 01-20 Standards

12

1 Facility Security Assessments

6Response to Change in MARSEC Level

5 Records and Documentation

4 Drills and Exercises

3 Personnel Training

2Security Administration and Organization

7 Communications

12Security Measures for Handling Cargo

11Security Measures for Restricted Areas

10Security Systems and Equipment Maintenance

9Security Measures for Access Control

8Procedures for Interfacing with Vessels

13Security Measures for Delivery of Stores

16Audits and Security Plan Amendments

15Facility Security Plan – Cyber Annex

14 Security Measures for Monitoring

Page 13: Understanding Cyber of USCG NVIC 01-20

MSIB 18 – 20 and CISA Alert

NSA and CISA Recommend Immediate Actions to Reduce Exposure Across

Operational Technologies and Control Systems

Recommended Mitigations from CISA include:

1. Have a Resilience Plan for OT

2. Exercise your Incident Response Plan

3. Harden Your Network

4. Create an ccurate “ s-operated” O etwor ap

Immediately

5. Understand and Evaluate Cyber-ris on “ s-

operated” O ssets

6. Implement a Continuous and Vigilant System

Monitoring Program

MSIB 18-20

CISA Alert (AA20-205A)

CISA Cybersecurity Practices for Industrial Control Systems

Page 14: Understanding Cyber of USCG NVIC 01-20

Transportation Security Incident and Cyber Security

Transportation Security Incident (TSI) means:

A security incident resulting in:

• a significant loss of life,

• environmental damage,

• transportation system disruption,

• or economic disruption in a particular area

Captain of the Port (COTP) has discretion

Government

Policy and

Frameworks

on Security

Physical

Security

Network

Security

Application

Security

Security

policies,

guidelines,

regulations

Fences, walls,

gates, guards,

restricted

access

LANs, routers,

firewalls,

switches,

network OS

User

authentication,

passwords

SCADA,

database, web

Encryption,

backups,

replication

Ad

min

istr

ati

ve

Ph

ysic

al

Tech

nic

al

Vessel Traffic

or Terminal

Operating

System

Data Security

System

Security

Page 15: Understanding Cyber of USCG NVIC 01-20

Automated 3-way Valve

Transfer Pump

HMI

Facility Person In Charge

5%

80%

HMI

HMI

90% 60%

HMI

Vessel Person In Charge

Gas Detector

Pressure Safety ValveLevel Gauge

Vapor Line

FACILITY ICS ARCHITECTURE

x x x x x x x x x x

x x x x x x x x x x

Level

Gauge

Programmable Logic

Controller

Automated 3-way ValveTransfer Pump

HMIAlarms on high

tank level

Shuts

down

pump

Closes valve

Operator

actions

Shuts down pump

on high-high tank

level

LG

Gas

Detector

TANK #2

TANK #1

Standard Cyber-Enabled LPG Cargo Transfer Illustration

Page 16: Understanding Cyber of USCG NVIC 01-20

FACILITY ICS ARCHITECTURE

x x x x x x x x x x

x x x x x x x x x x

Level

Gauge

Programmable Logic

Controller

Automated 3-way ValveTransfer Pump

HMIAlarms on high

tank level

Shuts down

pump Closes valve

Operator

actions

Shuts down pump on

high-high tank level

LG

Gas

Detector

HMI

Facility Person In Charge

25%

80%

HMI

HMI

90% 60%

HMI

Vessel Person In Charge

Adversary

misdirects flow to

full tank

Page 17: Understanding Cyber of USCG NVIC 01-20

Pump liquid

CDC through

pressure

relief system

Formation of pool & flammable /toxic vapor cloud

WIND

Page 18: Understanding Cyber of USCG NVIC 01-20

Facility Security Officer Cyber Square

Training

Exercises

Drills

• Area Maritime Security

Committee (AMSC)

• INFRAGARD

• Other Government

Agencies

FSO

OperationsSecurity

Personnel

Partnerships

Management

• HSSE

• Cyber Staff

Page 19: Understanding Cyber of USCG NVIC 01-20

Facility Security Assessments – Cyber

• Cyber assessment should be treated the same as

physical security assessments

• Important for the assessor to combine physical aspects

• Recommended stakeholder participation

• FSO

• AFSO

• IT

• OT

• Operations Staff

• Management

• HSSE/SHE Manager

Page 20: Understanding Cyber of USCG NVIC 01-20

Facility Security Plan – Cyber Annex

• Highly discourage writing cyber security measures

DIRECTLY into FSP

• FSP holds you accountable if something goes

wrong

• Create a separate cyber security plan or annex

• Address each cyber vulnerability identified in the

FSA

• Incident response

• Incorporate ICS

Page 21: Understanding Cyber of USCG NVIC 01-20

Drills / Exercises

• Enhances response capabilities

• Bridge the gap between FSOs and Cyber staff

• Raise awareness/builds culture

• Combine physical-cyber scenarios

• Recommend Incident Command System (ICS)

Page 22: Understanding Cyber of USCG NVIC 01-20

Incident Command System – Cyber

• Facility personnel should be using the Incident

Command System (ICS) for cyber response

• Include as part of drills and exercises

• Combine with existing physical and weather threats

• Team with other facilities, AMSC members, or other

government agencies

• Tie cyber into your facility Emergency Response Plan

(ERP)

Tactics

Meeting

Planning

Meeting

Operations

Briefing

Execute Plan &

Assess Progress

IC/UC

Development/

Update Objectives

Meeting

Command &

General Staff

Meeting

IAP Prep &

Approval

Preparing for the

Tactics Meeting

Preparing for the

Planning Meeting

New Ops

Period Begins

Incident Briefing

using ICS 201

Initial IC/UC

Meeting*

Initial Response and

Assessment

Notifications

Incident/Event

INIT

IAL

RE

SP

ON

SE

Page 23: Understanding Cyber of USCG NVIC 01-20

eyond t e Requirement…

• reser e your facilities’ reputation

• Foster safety into your cyber program

• Although implementation is not required until Sep. 30,

2021, early adopters will benefit from it

• Short term – reduces the likelihood of a cyber incident

• Long term – prepares you to exceed the expected standards

outlined in USCG NVIC 01-20

• In NVIC 01-20, the Coast Guard makes very clear that

performing cyber security assessments and addressing

cyber security in FSP is a requirement.

• Implementing Cyber Risk Management will put

you in a better position to be more

competitive.

Page 24: Understanding Cyber of USCG NVIC 01-20

Dennis Hackney, PhD, CISSPHead of Cybersecurity Solutions Development

[email protected]

© 2020 ABS Group of Companies, Inc. All rights reserved.

linkedin.com/company/absgroup @_absgroup

Marcia LeeManager, Business Development

[email protected]

Page 25: Understanding Cyber of USCG NVIC 01-20

25