Can a solution provider handle cybersecurity? Eight questions to ask

Colterlec Pty Ltd

By Felipe Sabino Costa, ISA cybersecurity instructor and Moxa LATAM Industrial Cybersecurity (IACS) Expert
Wednesday, 11 August, 2021


Can a solution provider handle cybersecurity? Eight questions to ask

The past few years have seen an increased demand for cybersecurity in industrial applications. As a result of this, many decision-makers involved with industrial applications are interacting with cybersecurity for the first time. While many companies hope to invest more in ramping up network security, it is essential they make informed decisions when selecting a suitable supplier or solution provider. Industrial cybersecurity is a complex topic that must include considerations about industrial operations. It is highly recommended that decision-makers do not just look at the specifications shown on fact sheets or datasheets, but also consider key questions that can help ensure they choose a qualified solution provider.

1. What are the indicators that I am selecting a company that has a mature industrial cybersecurity solution?

There are many important factors to consider depending on the industry and application. As the literature usually does not distinguish suppliers from users, the factors mentioned below can be used as a reference for both.

As a starting point, cybersecurity is not only a feature or product. In fact, it is a complex process that involves many different factors during different phases. It is fundamental to establish the pillars ‘People’, ‘Processes’ and ‘Technologies’ on both sides — supplier and end user — as they pass through the lifecycle of integration and maintenance of the cybersecurity solution.

While measuring the cybersecurity maturity of a company can be difficult, it is possible to identify some indicators that can be used to determine how mature the company is. These indicators are explored in more details in later questions and include topics such as threat intelligence processes, how quickly the company responds to incidents, whether its solutions are based on solid and internationally recognised frameworks, whether the company receives vulnerability notifications from external parties and its experience working on industrial applications, as well as services and support before and after purchase.

2. How do I measure the maturity of a cybersecurity solution provider?

It is quite difficult to define a maturity baseline for different companies that may have different frameworks and measurements. However, if we consider the ARC Cybersecurity Maturity Model, a mature company should have established a threat intelligence management process, including a full-time cybersecurity team to respond to any cyber threats. In addition, it should be able to detect anomalies and breaches. Finally, the company should also be able to anticipate potential threats instead of only responding to them, which is the most difficult to achieve. This maturity model considers some key aspects, which can be good indicators of the maturity of a cybersecurity solution provider.

In addition to the factors mentioned above, a company has a higher cybersecurity maturity level when it has implemented a solid threat intelligence process and the team effectively responds to any threats found and maps the vulnerabilities. Companies that are able to anticipate threats are able to offer better solutions.

There are also some additional methodologies, such as the ‘Detection Maturity Level Model — DML’ and ‘The Cyber Threat Intelligence Model — CTI’, which measure the maturity of a company based on how they handle threats (although they fall outside the scope of this article). In order for a company to be considered mature with regards to its approach to cybersecurity, it should have established threat intelligence processes and have a dedicated team to quickly respond to any potential threats detected internally or externally.

3. Are there any independent methods to compare solutions?

Inside specific industries there are some recognised frameworks such as NIST and IEC 62443, which give practical and impartial suggestions for product characteristics and general recommendations that businesses operating inside these industries should consider.

It is also important to consider the adoption of both vertical and horizontal standards. Horizontal standards tend to embrace a broader range of industrial applications such as ISA/IEC 62443, while vertical standards often represent a smaller sector, such as NERC CIP for the power sector. Depending on the requirements of each individual sector, there may be additional vertical industry standards that can be used for reference and guidance.

Last, another important indicator to determine the maturity of a provider’s offering is whether it follows proven frameworks. The usage of recognised frameworks provides an independent method to compare solutions.

4. How can I calculate the ROI for a cybersecurity investment?

There is still an ongoing debate about how to measure a cybersecurity investment, usually termed return on investment (ROI) or return on security investment (ROSI). Although there is not a single agreed formula that can be easily shared, it is plausible to consider the correlation between cybersecurity investments and the benefits of enhanced safety, increased production stability and others.

As cybersecurity, in a simple manner, is a combination of availability, confidentiality and integrity (CIA triangle), it is possible to infer that investments in cybersecurity directly minimise potential threats to industrial control systems and, as a consequence, increase levels of production and enhance safety. In other words, cybersecurity is the balance between the financial cost you can afford and the risk you can accept.

5. Does the solution provider receive information regarding vulnerabilities from external parties?

Another important factor to consider when evaluating a potential offering is to verify if the solution provider has an open channel to receive information about potential vulnerabilities from external parties. Being receptive to this information is fundamental to developing a more mature solution as well as increasing the reliability of the solution being offered.

For industrial control systems, this capability is still relatively new, but this openness and willingness to improve is vital to ensure a supplier is able to provide reliable solutions. Those who have already embraced this approach are demonstrating that they are well on their way to offering a mature cybersecurity solution.

6. Does the solution provider have success stories for industrial applications that are similar to my own requirements?

The majority of the time, any given industrial application will have unique aspects. Therefore, it is important to understand if the supplier has already developed solutions for a relatively similar application. This minimises, or at least anticipates, potential operational problems because industrial solutions differ from enterprise solutions in many respects.

Whenever possible, decision-makers should request a proof of concept (PoC) in order to make sure that what is being requested can be delivered. It never hurts to emphasise, as recommended by important industrial frameworks such as NIST and ISA/IEC 62443, that any test should not be performed on a live system, but on an isolated external system first, in order to avoid disrupting live operations.

7. Does the solution provider have experience deploying solutions inside OT environments?

It is very important to determine whether the solution provider has enough knowledge of industrial environments so that it is able to support you. While it is true that enterprise and industrial cybersecurity solutions have a lot in common, it should not be forgotten that they are not 100% equal. In order to obtain a tailored industrial solution, different specific requirements have to be considered for each industrial application.

For industrial environments, data must be passed from one device to another very quickly. For the majority of industrial applications, latency is detrimental to the system and is therefore not acceptable. In contrast to this, some latency is acceptable for the majority of enterprise applications.

The environment also plays an important role. For products being developed for industrial environments, the hardware should be built to withstand wide temperature ranges, vibration, dust and other environmental factors. In contrast to this, an enterprise product is not normally required to go through such a rigorous testing process.

Another important capability is if the software has the ability to detect and filter industrial protocols such as Profinet, EtherNet/IP or Modbus/TCP among others, which are widely used in industrial applications.

From all of the points that have been considered, it is apparent how complex it is to implement an industrial cybersecurity solution. Thus, it is essential that the companies that are providing the cybersecurity solutions really understand this demanding sector.

8. Will the solution provider be committed to my business?

When selecting a solution provider, it is important to not just consider the equipment datasheets. It is important to understand whether the security solutions are connected to an overall cybersecurity strategy and how much the solution provider understands your needs.

During the past few years, there has been an increased demand and appreciation for pre- and post-sales services for the majority of cybersecurity customers.

Before you purchase the solution, ensure that your solution provider is aware of your framework and that they have a good understanding of where the proposed solution fits in. The company offering the solution should act like a consultant, and be able to give you good advice for your solution. A vendor that is serious about cybersecurity needs to understand each application and suggest a specific solution for each case. The ‘one solution fits all’ model is definitely not recommended for industrial cybersecurity.

If your company does not have its own framework, a possible starting point is the Cybersecurity and Infrastructure Security Agency (CISA), which is based in the United States. It utilises solid industrial frameworks within its Cyber Security Evaluation Tool (CSET) and uses this as a foundation to evaluate industrial control systems, including frameworks such as NIST and ISA/IEC 62443 among others. As each country may have its own regulatory agency, we suggest checking your country’s agency framework recommendations if you live outside the United States.

Finally, you should list which services are available after you have purchased the solution such as warranty, troubleshooting, SLA and others. From here, you can decide which services are more important and consider the TCO based on the needs of your company.

Conclusion

In conclusion, it is worth remembering the following two points. The first is that there is an optimal point between the financial cost and level of protection required. Second, IT cybersecurity may not be suitable for an OT environment, so selecting an experienced solution provider should be a requirement.

For more information: https://colterlec.com.au/build-secure-network-infrastructure/.

Further reading
  1. Kapellmann D and Washburn R 2019, “Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About vulnerabilities in Industrial Control Systems and Critical Infrastructure”, 11th International Conference on Cyber Conflict (CyCon), IEEE.
  2. ARC Advisory Group, 2019, Cybersecurity Maturity Model, <<https://www.arcweb.com/industry-concepts/cybersecurity-maturity-model>>
  3. Tounsi W and Rais H 2018, “A survey on technical threat intelligence in the age of sophisticated cyber attacks”, Computers & Security, vol. 27 pp. 212-233.
  4. Mavroeidis V and Bromander S 2017, “Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence”, 2017 European Intelligence and Security Informatics Conference (EISIC), IEEE.
  5. NIST 2015, NIST Special Publication 800-82 Revision 2: Guide to Industrial Control Systems (ICS) Security.
  6. International Electrotechnical Commission 2019, IEC 62443-4-2:2019 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components.
  7. Batard J and Ldovic L et. al. 2019, “Cybersecurity In Distribution Automation: Approach For Common Referential Leveraging Standardization”, 25th International Conference on Electricity Distribution, CIRED.
  8. Onwubiko C and Onwubiko A 2019, “Cyber KPI for Return on Security Investment”, 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), IEEE.
  9. Von Solms R and Van Niekirk J 2013, “From information security to cyber security”, Computers & Security, vol. 38 pp. 97-102.
  10. International Society of Automation 2018, ANSI/ISA‑62443‑2‑4 (99.02.04), Security for industrial automation and control systems: Part 2-4, Installation and maintenance requirements for IACS components.
  11. Sommestad T, Ericsson G and Nordlander E 2010, “SCADA system cyber security – A comparison of standards”, IEEE General Meeting Power& Energy Society, IEEE.
  12. Cheraghi SH, Dadashzadeh M and Subramanian M. 2011, “Critical success factors for supplier selection: an update”, Journal of Applied Business Research.
  13. Cybersecurity and Infrastructure Security Agency (CISA) 2019, CSET 9.2.0 Release Notes.

Image: ©stock.adobe.com/au/sasun Bughdaryan

Related Articles

MOM: A high-value starting point for digital transformation

The desire for digital transformation in industry players is at an all-time high, but at the same...

What do you need to know about digital twins?

When a new term shows up on the market, we have to ask ourselves is this term just a buzzword or...

Industry 4.0 technology enablers in the fluid power industry

The most important way that Industry 4.0 technologies will impact the fluid power industry is in...


  • All content Copyright © 2021 Westwick-Farrow Pty Ltd