You are on page 1of 8

WHITE PAPER

INDUSTRIAL CYBERSECURITY RISKS -


OIL AND GAS OPERATIONS
“Challenges and roadmap for a secure
ecosystem”

Abstract
From military aggression to cyber threats, the oil & gas sector has always been a
high-profile target for adversaries. Originally, the probability of a major failure due
to a cyberattack was highly minimal as organizations usually adopted a production-
oriented approach wherein operational systems were isolated and never integrated
into enterprise systems. In the current scenario though, the emergence of the
Internet of Things (IoT) has nullified the most basic assumptions about operational
technology. All sorts of industrial facilities, like oil fields, pipelines and refineries,
are vulnerable to cyber-attacks. The major security-related concerns in the oil
and gas industry range from lack of asset visibility in a distributed environment;
to setting operational, technological, and environmental specific policies and
procedures, defining roles, responsibilities and accountability and implementing
technical controls for assessing real-time security incidents for a dynamic production
environment. In this paper, inherent limitations & security challenges the oil & gas
organizations face have been discussed in detail along with the approaches that
define the way forward for addressing these concerns. Key factors that need to
be considered for defining and designing right security roadmaps for sustainable
cybersecurity programs have been discussed in detail.
Overview – The oil & gas industry
The oil & gas industry happens to be Downstream. The processes in the oil & are used to manage the industrial
a complex industry having multiple, gas sector include exploration, gathering, operations and enable monitoring &
cumbersome and complicated processes production, processing, refining, storage, controlling of these operations across the
involved. At a high level, all the processes and transportation of petroleum liquids value chain.
in this industry can be sub-divided into and natural gas. ICS (Industrial Control
three i.e., Upstream, Midstream, and System) and OT (Operational Technology)

OIL AND GAS PRODUCTION AND SUPPLY CHAIN

UP-STREAM MID-STREAM DOWN-STREAM

Exploration & Production Transportation Refining & Marketing

• Drilling operations • Storage and Distribution • Processing of Crude oil


• Separation of oil/gas • Processing and gathering • Delivery to retailers
• Evaluation & Design • Transportation(Pipelines etc) • Product blending

# Use Case 1 # Use Case 2 # Use Case 3


Risk: Unauthorised access to Risk: Unauthorised data Risk: Process modification
sensitive drilling or operations modification of pipelines and tempering with
related data systems operational controls

Impact: Financial loss and Impact: Explosion, spillage Impact: Supply disruption,
damaged competitive advantage and product loss reputation loss

Figure 1: Oil and Gas production and supply chain risk

External Document © 2020 Infosys Limited


Automation and digitization of the oil and • Inadequate security testing of the various cyber threats and high impact
gas lifecycle process have led to growth operational assets allow systems in consequences like:
driven performance such as increased production to be deployed unpatched;
• Plant shutdown or an explosion
production rates, downtime and cost this creates security loophole for hackers
reduction. However, these processes are to exploit • Leakage of commercially sensitive
also posing the following obstacles in this information
• Isolated assets are deployed on
sector:
a network without adequate • Modification of pipeline parameters
• The insecure communication between communication. Improper visibility and
• Utilities interruptions & supply
OT and corporate network that supports control on the assets can expose an
disruptions
critical decision making can be misused operational network for exploitation
to gain access and execute production • Tempering with operation controls
The transformation of many oil & gas
loss • Production circle shutdown
companies from the state of isolated
• Unsecured remote access can allow a operational systems & environments to • Health and safety hazards
malicious user to take control of the fully integrated businesses has resulted in
process systems and adversely affect the many challenges. For instance, the current Operational assets and systems are
production IT security measures and existing products usually not designed with security as the
are not apt to prevent cyber-attacks in backdrop and therefore are vulnerable to
• Poor security governance allowing manipulation and disruptions
an operational production environment.
vendors to introduce new security
This renders the domain vulnerable to
threats via unmanaged devices

THREAT MANAGEMENT FRAMEWORK

Poten�al Threat Likelihood Management Impact Management Poten�al Impact

Opera�onal
Hackers
Disrup�ons
• Policy & Standard
• Secure Network Reputa�onal
Hac�vist • Threat Intelligence
Architecture Damage
• Regular risk Assessment
• Training and Awareness • Con�nuous
Employee • Third Party Management Monitoring of event Financial Loss
• Iden�ty and Access and Incident
Management
• Inventory Management • Incident Regulatory Fines
Third Party • Network Segmenta�on
Management and Penalty
• Threat and Vulnerability
Management
State Sponsored • Back-up Management • Emergency Response Loss of Cri�cal
• Physical Security Informa�on
• Security Use cases • 100% Visibility
Terrorist Injury & Fatality

Figure 2: Threat Management framework for oil and gas industry

A comprehensive approach that can consequences should be considered while It’s critical to build a sustainable, robust
bring IT and OT security together is a creating an end-to-end management and integrated cybersecurity framework to
must for addressing the new age security framework that can assess and reduce the avoid serious cyber threats and achieve a
challenges. likelihood of an impact, thus significantly risk free, incident free organization.
minimizing the overall risk posture of an
Identifying potential threats and their
organisation.

External Document © 2020 Infosys Limited


Building blocks for addressing OT security
Traditionally, safety had been a top priority cybersecurity approach to be more attacks, damage, disruption, unauthorized
when it came to designing, defining standardized and integrated with the access or misuse.
and deploying processes and systems in corporate and operational environment.
Defining and implementing a program
an operational environment. Although
Therefore, organizations need to adopt to achieve security maturity at each
even today, it’s a major driving force,
new and advanced technologies involving stage needs to be aligned with goals of
the indulgence of digital connectivity in
in depth defense strategies. These should improving the cybersecurity posture and
the cyber domain has brought about an
be a combination of practices, processes creating an operational evironment that
enhanced threat landscape for the sector.
and technologies designed to defend can identify, protect, detect, respond and
As the industry currently faces these process control networks, systems, recover.
new challenges, it has to revamp its computers, programs and data from

IDENTIFY PROTECT DETECT RESPOND RECOVER

• Asset Management • Awareness Control


• Anomalies and • Response Planning • Recovery Planning
• Awareness and Events
• Business Training
• Communication • Improvement
Environment • Data Security • Continuous
• Information Security • Analysis • Communication
• Governance Protection & Monitoring
Procedure
• Mitigation
• Risk Assessment • Maintenance • Detection Process
• Proactive • Improvements
• Risk Management Technology
Strategy

Figure 3: Reference - Cyber Security Framework NIST

Identify: Understanding the organizational malicious activities. Based on the initial Respond: This is a key step in which
goal and business requirements. Gathering understanding of the requirements, processes and activities are clearly
the current landscape information to security controls are identified to protect identified, planned and communicated
manage cybersecurity risk to systems, the systems. Controls have to be derived within the team and organization. These
assets, data, and capabilities. The activities from people, processes, technology or processes and procedures are created
in the identify function are vital for combined. and implemented to respond to all cyber
planning a secured environment. They incidents. This enables an organization
Detect: There are chances that intrusions
help an organization to identify its current to restrict the impact of a cyber-security
still happen even after implementing
security posture and steps needed to incident to a minimum level.
multiple controls and technology
improve as per the security requirements.
solutions. A system with no openings to Recover: This step involves creating and
They provide visibility of the current threat
intrusions is almost impossible to achieve. implementing processes and procedures
landscape, next steps & actions needed to
Organizations should have a system that for recovering from the cyber incident.
improve the security posture.
can detect and deter any intrusions. Early This enables organizations to recover fast
Protect: Developing and implementing detection of intrusion helps to reduce from the impact and come to normalcy in
security controls to ensure continuity the spread of the attack and thereby the minimum time. Creating and maintaining
and availability of critical infrastructure impact to the organization. business continuity procedures is a must
services. Protect activities help an for any organisation.
organization to deter cyber intrusion and

External Document © 2020 Infosys Limited


Stated below is the Infosys cyber control capabilities with regards to all three security measures in each area based on
framework for addressing the above aspects -governance, technology and the current maturity level and recommends
security concerns and implementing the operations. Infosys helps in defining, a roadmap to the organisation.
controls in order to build cybersecurity implementing and integrating required

Control Framework Governance Technology Operations

Technical Control Adherence to policy and


Risk Management Maturity Evaluation
Effectiveness procedures

Asset, Change, and Configuration Management Asset management policy Visibility Tool Continuous Monitoring

Privilege Access
Identity and Access Management IAM Policy & Procedure Segregation of duty
Management

Threat and Vulnerability Management Threat Evaluation Process VM/System Hardening Advisory & Mitigation

Standard Operating
Situational Awareness Security use cases Logging & Monitoring
Procedures

Information Sharing and Communications Threat Intel and feeds Signature updates Threat Hunting

Incident Management Logs collection and


Event and Incident Response, Continuity of Operations Central CDC Monitoring
process correlation

Vendor/Third Party
Supply Chain and External Dependencies Management Security Updates Real -time support
Management

Training & Awareness


Workforce Management Simulation Kit Roles & Responsibilities
Program

Cybersecurity Program Management Policy and Procedure Review Product Evaluation Likelihood & Impact

Figure 4: Infosys Cybersecurity control framework for oil and gas industry

Governance: This is a key area in which and malicious activities more effectively security incident to a minimum level.
processes and activities are clearly and in real-time. Based on the initial Organisations must have continuous
identified, planned and communicated understanding of the requirements, monitoring capabilities to ensure real-
within the team and organization. technology-based security controls are time detections. They can then trigger
Processes and procedures are created and identified to protect the systems. However, immediate application of correction
implemented for the effective handling there are chances that intrusions still measures in case of a breach. Centralized
of security-related issues across the happen even though multiple controls systems must be in place to run integrated
organisation. Governance is to secure and technology solutions have been security operations for both corporate
the environment and help organizations implemented. Technology based controls and operational environments with clearly
to assess their current security state and help in effectively dealing with the spread defined roles and responsibilities for each
the steps needed to improve it as per the of sophisticated attacks and impacts on an and every stakeholder involved. Apart from
requirements. It provides an overview of organization. this, creating and maintaining business
the current threat landscape, corrective continuity and timely recovery procedures
Operations: The most important function
steps & actions needed to improve the is again a must for the organisations and
of operations is to have the right processes
security posture. undoubtedly for the oil & gas production
and procedures for responding against
value chain.
Technology: Technology helps cyber incidents. This enables organization
organizations to deter cyber intrusion to restrict the impact from a cyber-

External Document © 2020 Infosys Limited


Assessing and improving security posture using the security
maturity model for the oil & gas industry
The first step of the OT security opportunities to strengthen and determine organizational cybersecurity capabilities
improvement program is to conduct risk their current security posture and measure consistently, and communicate critical
and maturity assessment to identify the target desired state in operational cybersecurity investment requirements
risks & its impact on the organization and environments continuously. to the leadership. The ONG-C2M2 model
understand the maturity of its security enables organizations to effectively
Cybersecurity maturity model for the
controls in the ICS environment. With the evaluate and benchmark security
oil & gas (ONG-C2M2) subsector helps
continuous changing face of the threat requirements and capabilities.
to evaluate, prioritize and improve
landscape, organizations need to identify

Perform Analyze Prioritize and Implement


Evaluation identified Gaps Plan Plans

ONG-C2M2 Self
ONG-C2M2 Self- Evaluation Report List of Gaps & Prioritized
Evaluation Template Potential Implementation Plan
Inputs Policies & Procedures
Organizational Consequences
Objectives Owners and Actions
Organizational are defined
Understanding of Impact to Critical Constraints
Cybersecurity Infrastructure
Program
Identify Actions to
Analyze Gaps in the Address Gaps Track Progress to
Conduct ONG-C2M2 Organization's context Plan
Activities Self- Evaluation
Evaluate Potential
Cost Benefit Analysis
on Actions Re-Evaluate
Workshop with Consequences from Gaps Periodically or in
Appropriate Prioritize Actions & Response to Major
Attendees Determine which Gaps Plan to Implement Change
Needs Attention Prioritize Actions

List of Gaps & Prioritized


Outputs ONG-C2M2 Self- Potential Implementation
Project Tracking
Data
Evaluation Report Consequences Plan

Figure 5: ONG-C2M2 process


Reference : Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model

External Document © 2020 Infosys Limited


The Infosys maturity roadmap stated to an integrated enterprise ecosystem existing governance for IT/OT alignment
below, helps oil & gas organizations in their with shared utilization of resources at and identifying how the digital journey
maturity improvement journey by enabling Level 5. It defines the actions that are will impact the organization from a
them to identify their current maturity needed for their IT OT convergence cybersecurity perspective. It is important
levels across their OT environment. It helps program. The initial key activities include that the organization identify its desired
them identify the maturity target and assessment of the maturity level & risk maturity level based on the business value
activities needed for achieving the desired from the OT systems to their business, and then set the target maturity level goal
target. The maturity level moves from preparing propositions in terms of business along with planned activities and timelines
an isolated & insecure OT environment outcomes, reviewing the effectiveness of for achieving it.

Optimize and
Standardize Processes
Integrate IT and OT Remediation advisory
Systems Mature cyber risk
Implement OT Security IT/OT integration strategy management processes
cybersecurity M aturity

Implement OT Security and planning


Risk Management Design Rationalize IT/OT
Operating Model Standardize IT/OT security team,
Extend applicable IT Implement network and Security Integration processes and platforms
Initial risk awareness Security controls to OT endpoint hardening OT data management
Current State Review Establish Security controls Sustainable support
policies, procedures and
and assessment baselines model for sustenance
Implement OT Security standards
Consortium approach Define Hardening controls and incident monitoring IT/OT Cyber Governance, Enterprise wide IT/OT
with OT stakeholders, Device classification and Improved correlation for Policies and Procedures security controls in
partners, OEMs, tool network segmentation early anomaly detection place
Integrated IT OT SOC
vendors, etc.
Patch and Vulnerability Configure Baseline Rules
Understand constraints management & Policies
and challenges
Define security roadmap , Playbooks for alerts and
Review locations, ICS Implementation plan and incident handling
systems, dependency, RACI
protocols and layout
Assets inventory
Critical systems outage
impact

Level 1: Initial Level 2: Developing Level 3: Defined Level 4: Managed Level 5: Optimizing
Figure 6: Cybersecurity maturity roadmap

Although the risk level and current maturity asset inventory detailing the total assets, secure baselines should be implemented
may vary for different organisations attributes, types and locations. Performing as per the best practices. We help
there are few controls for industrial periodical reconciliation and reviews. organizations to design and implement
security transformation which every Providing complete visibility of OT assets security architecture using zones and
oil and gas organisation should have including the SCADA systems and field conduits incorporating DMZ’s as per IEC
in place. Deploying these controls can devices and network visibility using 62443. The conduits have appropriate
be an effective initiation point for a passive monitoring of the OT network. security controls and technologies
comprehensive integrated cybersecurity This monitoring has Zero impact on like firewalls and VPN. Blocking all
program aimed at achieving the identify, existing systems and processes. It provides communication from IT to OT or else having
protect, detect, respond and recover automated asset discovery, classification a minimal connection (single if possible)
capabilities. and management along with real-time through a Firewall and DMZ. Reviewing
monitoring of asset configuration and the firewall rules regularly to make sure
Security policy & guidelines: Defining and
changes in the network. It gathers adequate protection is provided in light of
establishing security policies, procedures
extended information and details of all PLC/ the ever- changing security threats.
and guidelines for the ICS environment.
RTU/DCS/SCADA devices including OS &
It should cover the control areas such Continuous monitoring: Implementing
firmware versions, associated vulnerabilities
as asset inventory, access control, patch passive security platforms for ensuring
with mitigation recommendations.
management, network security, workforce 24/7 centralized monitoring for all the
development, portable media usage, Network security: Communication and incidents and events performed in an
security incident management, backup and access to the ICS environment must be operational environment. Conducting real
restore, etc. defined & aligned with the business needs. time monitoring of OT security activities.
Network segmentation, segregation and Integrating the alerts from OT security
Assets visibility: Maintaining complete

External Document © 2020 Infosys Limited


platform and leveraging the existing IT CDC an OT environment. Its access should be world scenario should be implemented.
infrastructure and team for monitoring restricted.
Incident management: Incident
the security events and carrying out the
Access control: Assets within the ICS management and response processes
handling of incidents from OT environment.
environment be it physical or logical should be developed and tested
Security governance: Ownership, roles should be accessed only with proper periodically. Integrating security platforms
and responsibilities must be developed, authentication and authorization. to existing centralised SIEM solutions for
defined and implemented. The secure Implementation of digital identity, developing test cases and event correlation
governance framework is the foundation privileged access mechanism, secure of security incident and alerting must be
for building a resilient security framework. remote access and centralised password carried out.
It is highly recommended to focus on management tools can be leveraged to
Patch & vulnerability management:
identifying the gaps and mitigating the address major security concerns in the area
Defining and implementing a systematic,
governance in areas of access management, of access management.
accountable, and documented patch and
roles and responsibilities, third-party
Training and Awareness: Regular training vulnerability management process for
management, incident management, patch
and awareness programs must be in place managing exposure to vulnerabilities.
and vulnerability management, policy and
for professionals at each level to ensure Defining governance framework for
configuration management and back-up
that systems and environments are being identifying and evaluating the severity
policy
used in a secure and responsible manner. of new or existing vulnerabilities and
Removable media: The use of removal Continuous interactive evaluation and mitigating them in a timely and effective
media must be restricted and should be improvement programs based on the best manner. Periodical review of patches
scanned for malware and virus. A dedicated security practices and simulation-based and vulnerabilities must be performed
and approved set of portable media training demonstrating the potential to keep track of the security status in the
should be maintained that can be used in impact of security breaches in the real- environment.

Brief Summary
In this new age of connectivity, the sophisticated cyber-attacks scenario, cyber maturity assessment, analysing
past practices of isolation between the the need for closing the security gaps in the current state of the environment and
corporate and operations environment an operational environment cannot be preparing a roadmap for addressing the
for oil and gas sectors have pretty much ignored. Any further delay could lead to a security challenges by defining the short
disappeared. As digitization continues potentially disastrous impact on the sector. term, medium term and long term goals.
to grow in the operational environment A secured IT OT integration helps oil & gas
Never in the past, the need for
and the risk of sophisticated cyber-attacks companies to transform from disconnected
strengthening the security and resilience
looms large, the preparedness of industries networks to integrated businesses thus
of operational infrastructures against
is still in the initial phase. fast-tracking their digitization journey.
cyber threats has risen to this scale. The
With this connected world and starting point for the industry is to initiate

Authors
Suhas Desai, Industry Principal, Infosys
Nilby Jose, Principal Consultant, Infosys
Saurabh Srivastava, Consultant, Infosys
Yogesh Shelke, Associate Consultant, Infosys
For more details, please contact: CyberSecurity@infosys.com

For more information, contact askus@infosys.com

© 2020 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.

Infosys.com | NYSE: INFY Stay Connected

You might also like