Operational Technology Cybersecurity for Energy Systems

ON THIS PAGE

According to the National Institute of Standards and Technology (NIST), operational technology (OT) refers to:

"programmable systems or devices that interact with the physical environment (or manage devices that interact with the physical environment). Examples include industrial control systems, building management systems, fire control systems, and physical access control mechanisms."

It is important to distinguish the difference between OT and information technology (IT). NIST defines IT as "any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency."

Wind turbines, solar arrays, building control systems, and supervisory control and data acquisition (SCADA) systems are all examples of OT systems and are relevant to how our nation produces, stores, and manages energy. Many of these OT systems have IT components or connections. However, they each present significantly different vulnerabilities, risks, and consequences as it relates to securing them.

Need to assess your cybersecurity posture? Use the DERCF to evaluate the health of your distributed energy resource system.

 

Why Operational Technology Cybersecurity Is Important

OT is becoming increasingly digital and internet-connected. This introduces security concerns for OT commonly used in federal facilities, where typically security had not been an issue before. Previously, most OT was non-connected and had minimal cybersecurity vulnerabilities—but as new efficiencies and functionalities for enhanced flexibility and resilience are added, cybersecurity vulnerabilities need to be continually monitored and addressed. As more connected technologies, control systems, and distributed energy resources are added to federal facilities, installations, and campuses, it is more important than ever to consider cybersecurity. Poor cybersecurity posture can result in vulnerabilities that leave a facility open to an attack that can result in data corruption, financial harm, physical equipment damage, disruption of services, and even loss of life.

Due to the complexity and cost of acquiring new equipment, technology, and operational systems, OT is frequently not replaced at the same rate as consumer or informational technologies. Thus, federal facility managers and operators face additional challenges in protecting legacy systems from cybersecurity threats, especially given that these systems are not likely to have the same cybersecurity protective capabilities as modern technology and may risk disruption if traditional IT cybersecurity protection and detection capabilities and solutions are applied.

Legislative Background

Several OT cybersecurity assessment and management legislative and policies and requirements have been put in place to improve safety and security.

Executive Orders

Photo of the national capitol.

Executive Order (E.O.) 13636: Improving Critical Infrastructure Cybersecurity was released on February 12, 2013. To further prioritize cybersecurity for critical infrastructure, E.O. 13800: Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure was issued on May 11, 2017.

E.O. 13800 states that each agency head "shall use the Framework for Improving Critical Infrastructure Cybersecurity, which was developed by the National Institute of Standards and Technology, or any successor document, to manage the agency's cybersecurity risk." This framework is commonly known as the "cybersecurity framework."

National Infrastructure Protection Plan

Additionally, the National Infrastructure Protection Plan (NIPP), developed by the U.S. Department of Homeland Security, names 16 crucial infrastructure sectors:

  1. Chemical
  2. Commercial facilities
  3. Communications
  4. Critical manufacturing
  5. Dams
  6. Defense industrial base
  7. Emergency services
  8. Energy
  9. Financial services
  10. Food and agriculture
  11. Government facilities
  12. Healthcare and public health
  13. IT
  14. Nuclear reactors, materials, and waste
  15. Transportation systems
  16. Water and wastewater systems.

The NIPP provides unique language about the partnering of government and private sectors to manage risk and strengthen cybersecurity. Read more about NIPP and the resources it offers.

Risk Management Framework and Federal Information Security Management Act

Although the Federal Information Security Management Act (FISMA) is primarily geared toward IT, FISMA requires agencies to reference and follow the Risk Management Framework (RMF), a NIST document that includes OT devices and components in comprehensive cybersecurity assessments.

Federal energy managers are required manage OT cybersecurity to meet federal legislative, administrative, and agency requirements. Using various available frameworks, critical infrastructure owners and operators are guided to improve cybersecurity information sharing and collaboratively develop and implement risk-based approaches to cybersecurity. The table below lists FEMP tools to that can help federal energy managers manage OT cybersecurity challenges.

FEMP OT Cybersecurity Tools for Federal Energy Managers
FrameworkOriginRequired byUserAvailable FEMP Tools
NIST Cybersecurity FrameworkNIST 800-53E.O. 13636, E.O. 13800IT, OT, facilities in government and industryFacility Cybersecurity Framework, Distributed Energy Resource Cybersecurity Framework (DERCF)
Cybersecurity Capability Maturity ModelU.S. Department of EnergyAdministration RequestIT, OT, cyber expertsFacility Cybersecurity Capability Maturity Model, DERCF
Risk Management FrameworkNIST 800-37FISMATeam of cyber, facilities, ITFCF-Risk Management Framework Hybrid Tool
Cybersecurity Maturity Model CertificationU.S. Department of Defense (DOD)DODTeam of cyber, facilities, IT, procurementN/A

Confidentiality Integrity Availability Triad

Triangle with integrity, availability, and confidentiality aligned with each side.
The CIA triad is a model used to represent three core principles: confidentiality, integrity, and availability.

The frameworks in the table above contain a collection of controls that are designed to lower the risk of cybersecurity attacks by providing context for technical implementation and cybersecurity governance. To understand the basis for cybersecurity risks within the scope of OT, it is important to first understand the Confidentiality Integrity Availability (CIA) triad reference developed by FISMA.

The CIA triad is a model used to represent three core principles: confidentiality, integrity, and availability. The challenge to create and maintain all three principles simultaneously in informational and operational technology spaces is known as cybersecurity.

Triad Principles

While the principles of the CIA triad are geared toward the IT space, it is important to note that security for OT systems is typically weighted differently than for IT. For example, availability is absolutely critical to the cyber-physical world whereas confidentiality and integrity, which are critical in IT, may be differently prioritized for OT systems.

Disrupting the availability of an energy system immediately and directly affects consumers and their access to electricity. These principles are further integrated into the Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) by defining three levels of potential impact for each CIA triad principle.

Risks and Potential Consequences

It is important to understand what cybersecurity risks exist, how these risks are unique in the context of OT, and the potential challenges they bring in terms of mitigation. According to NIST, risk is defined by "the level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals," which result from the standard operation of a system due to the potential adverse effects of a cybersecurity threat.

Since there is no such thing as a perfectly secure system, there will always be some type of risk that needs to be addressed. Utilizing the NIST Risk Management Framework is an essential step to understanding and prioritizing cybersecurity risks.

Types of Cybersecurity Attacks

Cybersecurity attacks come in a variety of flavors, though each type targets one or more of the three CIA triad principles. Types of cybersecurity attacks include the following.

Understanding Your Cybersecurity Posture

The Federal Energy Management Program (FEMP) assists organizations with determining their cybersecurity posture and current vulnerabilities and identifying acceptable and unacceptable levels of risk. Being aware and informed is the first step to addressing cybersecurity issues. While cybersecurity risks cannot be entirely eliminated, there are a number of measures that can be taken once threats and vulnerabilities are identified.

Glossary

The table below provides terminology and definitions for concepts related to OT and cybersecurity. Definitions denoted with an asterisk are credited to NIST.

World view with red lines.
FEMP's Cybersecurity Considerations for Performance Contracts

Consider suggestions for integrating cybersecurity planning into each phase of a performance contract.