Antonio Jose Segovia
September 25, 2017
The European Council Directive 2008/114/EC of December 8, 2008, is a European Directive for the identification and designation of critical European infrastructures and the assessment of the need to improve their protection. It states:
Critical infrastructure means an asset, system or part thereof … which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact in a Member State as a result of the failure to maintain those functions.
Obviously, this definition would also be applicable to any country in the world. Let’s see how to approach it.
According to the European Network and Information Security Agency (ENISA), typical sectors where we can find critical infrastructures are the following:
These sectors are considered critical, and most countries have regulations for their protection. In Europe there is a global European Directive (which is mentioned above), but each Member State defines its own regulation. In the United States, the global leader in the protection of critical infrastructure, there is the Presidential Policy Directive on Critical Infrastructure Security and Resilience (PDD 63) and the U.S. Policy on Counterterrorism (PDD 39). Most recently, the U.S. National Institute of Standards and Technology (NIST) developed the Framework for Improving Critical Infrastructure Cybersecurity.
By the way, Industrial Control Systems (ICS) are a fundamental part of the critical infrastructure, and include the following types:
These basically are control systems that are used to control the infrastructure.
Critical infrastructures are composed of two different worlds – IT and OT – which, of late, appear to be merging. In the world of IT (Information Technology) we have computers, software, network devices, etc. In the world of OT (Operational Technology) we have physical systems, sensors, machines, etc. How are they integrated? Let me explain this using an easy example: The entity that manages the water (distribution, water purification, etc.) in a country can be considered part of the critical infrastructure, because water is an essential resource for the life of all citizens. This entity has a SCADA composed of systems to open/close water gates, sensors to monitor water levels, machines for the purification of water, etc. All of these elements are related to the OT, because we need to control physical devices, processes, and events in the organization.
If we connect the systems related to OT (sensors, physical devices, etc.) to an information system, we can manage information received by sensors, visualize it in a graphical user interface, and maybe even connect remotely to a physical device to manage it.
Figure: Scope of OT and IT
The convergence of OT and IT is very positive for the industrial sector, but there is also a dark side – you likely have heard about the malware Stuxnet, which caused significant problems for the nuclear power plant in Iran. This malware was developed specifically to attack SCADA systems, and the systems affected by this malware globally number at 90,000.
The difference with respect to typical malware (like a virus that infects your computer), is that this specific malware related to critical infrastructures can affect people’s lives. How long could you live without water, electricity, hospitals, public transport, communications (telephone, internet), etc.?
So, as you can see, the world of IT can add threats to the world of OT. And they could be serious. So, what can we do?
Today, everything is connected – take, for example, the IoT (Internet of Things). But, in the industrial world (where critical infrastructure belongs), we are facing new threats that are typically found in the world of IT. The good news is that we have tools to manage threats related to IT, such as ISO 27001 (an international standard for information security).
But, how can we identify such threats? Well, the main point of ISO 27001 is risk management. If you would like to learn more about risk management according to ISO 27001, the articles ISO 27001 risk assessment & treatment ‑ 6 basic steps and How to write ISO 27001 risk assessment methodology can help you. Identifying the threats will help you define controls to implement in order to manage related risks.
As for threats that are not related to IT (security), but affect critical infrastructure, there is another international standard that helps: ISO 22301. This standard was developed for the management of business continuity, including identifying critical processes, establishing their impact, managing risks, and developing formal procedures for business recovery in a disaster. Critical infrastructures are very complex, and composed of industrial activities, industrial processes, people, etc. ISO 22301 could help their recovery in a disaster scenario. The articles How to implement business impact analysis (BIA) according to ISO 22301 and Business continuity plan: How to structure it according to ISO 22301 can help to start an ISO 22301 implementation.
Critical infrastructures suffer problems that typically are found in the IT world, but this could be avoided using the risk management of ISO 27001. Critical infrastructures are also subject to problems in a disaster scenario, so ISO 22301 could be used for their recovery. Implementation of these standards provides an organization with many benefits, which could also be applied to critical infrastructure.
Both ISO 27001 and ISO 22301 have many benefits, and have many common points, so it is recommended that they be implemented together in critical infrastructure composed of IT and OT. Additionally, by implementing ISO 27001, you get much closer to meeting the EU GDPR (EU General Data Protection Regulation) requirements – see the article Does ISO 27001 implementation satisfy EU GDPR requirements?
For the integration of both standards, this free webinar may also be interesting for you ISO 27001 & ISO 22301: Why is it better to implement them together?
So, what if you implement both standards together? Taking advantage of their common points, obtaining benefits from two international standards – without a doubt, it is the best choice to manage and improve critical infrastructures.
See this free white paper on How to implement NIST cybersecurity framework using ISO 27001 to learn how to integrate ISO standards with US regulations.