Oil & Gas IQ Infographic interpretation continued 1 If you have segregated your network, what was the main reason for doing this? Fox Interpretation: Proper and well implemented network segregation is the foundation of a resilient infrastructure. In reality, Fox-IT often encounters infrastructures designed with poor or non-existent segregation strategies that are usually a contributing factor to the severity of an incident, once it occurs. Segregation activities are complex, long term and fairly costly projects, which is why they often fail to end up high on the priority list. Still, companies that acknowledge the importance and are willing to invest in proper segregation strategies will, in the long run, enjoy the benefits of an infrastructure that is cleaner, easier to maintain, and better to defend. 2 From within your IT network, what kind of data, if any, do you need to push to your OT network? Fox Interpretation: A dilemma that needs to be addressed: from our experience we know that a majority of the traffic between an IT/OT environment consists of the OT sending historian data to the IT department. Allowing them to do invoicing, analysis etc. At the same time we acknowledge the need for IT to send data over to the OT environment. 65% or the survey respondents indicate sending software updates to OT. In order to ensure that this process can continue in a more secure environment, Our advice is that together we need to carefully ascertain (per situation) where the right place within the network would be to implement a one-way network solution such as a Data Diode, as there are unique requirements and specifications imaginable for each OT/IT setup. Fox-IT has products that can be used in different scenarios and if needed we can provide a very secure 2 way solution using protocol breaking combined with filtering and sanitizing. 3 If you gave one or more reasons in the previous question: what controls do you have in place to prevent malicious commands or data being sent to OT from your IT network? Fox Interpretation: A dedicated selection of workstation allocation is not a very secure way of isolation if not combined with network isolation, as otherwise this security policy is easily compromised. However having only a select amount of personnel being able to access OT infrastructure is actually a must have! Even when using the one-way solution. A one-way solution can only be effective if this security measure is combined with other measures such as restricted access, physical security zones etc. 4 How visible is what is going on your network to your organization? Fox Interpretation: Insight into what actually happens on your infrastructure depends on proper use of tools, procedures and expertise. Tools are important, but practically useless without skilled people to man them. In addition, each incident will provide your organization with valuable lessons that you could use to improve prevention as well as detection strategies. Procedures to capture these lessons and learn from them will help your organization mature. 5 If you are watching your network, what do you watch? (tick all that apply) Fox Interpretation: The response indicates that the majority does indeed monitor their network. What remains to be seen is if they are able to interpret and take action if and when an anomaly or intrusion occurs. It can be reassuring to know that up-to date knowledge and capacity of on the spot action can be activated immediately with the proven ProtACT Managed Security Monitoring solution. 6 How is the current balance between the employees you need to perform (Cyber) security tasks and your actual need? Fox Interpretation: The survey indicates that the majority is short on (experienced) staff. We can all relate to the enormous performance pressure that IT-departments are under to optimize productivity at minimum increase in headcount. At the same time – experience tells us – that there is also a growing lack of (up-to-date) IT-Security (threat) knowledge in the field. This is where Fox-IT Academy can play an important role. Fox-IT has > 5 years’ experience in delivering a wide variety of turn-key IT-Security training programs for IT-(security) employees, ranging from novice to expert experience levels. Fox-IT Academy offers classroom style training and customized-training on location anywhere in the world. 7 Does your organization have a CERT (Computer Emergency Response Team) team or CERT provider? Fox Interpretation: Every organization needs a response capability, regardless of whether this is formally classified as a CERT. This becomes more important as your detection capability matures and produces more potential incidents to investigate. The size of an incident response capability will depend on the size and type of your organization. For smaller organizations, a (virtual) team of 4 to 6 people may suffice, while larger organizations will require more resources to handle (and at a minimum: triage) all potential incidents. In addition, every organization is almost certain to face situations of emergency at some point that require instantaneous additional response resources. For these situations, an external CERT provider is a necessity. 8 If you have a CERT team/provider, is your CERT team/provider able to handle (tick all that apply): Fox Interpretation: In our view, a CERT provider should not be viewed as a technical resource alone, but should be viewed as a partner providing ad hoc, instantaneous response resources, including technical expertise as well as crisis management, communication and risk management skills and most of all: experience. Cyber-emergencies or crises are exceptional situations that most organizations (luckily) don’t experience often: which is why you’ll need to bring in the experience immediately when you need it. Ddos attacks are very visible, require 2 extensive cooperation with multiple stakeholders but usually needs focus primarily on technical resources and external communication. Real compromises by serious actors (such as criminal gangs or state actors) usually require more prolonged effort, occasionally over the course of multiple months, involving many additional stakeholders. These attacks are usually, in addition to potential technical sophistication, complex situations to deal with. Your CERT provider’s experience in handling these sensitive projects will make the difference. 9 Is your organization using a Managed Security Service Provider (MSSP) to monitor your network? Fox Interpretation: The Majority have indicated that monitoring the network falls under their own IT departments’ responsibility. It would be an interesting exercise to find out how much time and effort is spent monitoring the IT/OT networks by the security team. Experience tells us that it is more time and cost effective to involve cyber and security threat experts. 10 Are you confident that your employees and or MSSP (if applicable) are up-to-date on the latest Cyber threats and methods? Fox Interpretation: It is clear that realization is growing that cyber treats and terrorism are increasing in numbers and intelligence, and that arming against such forces requires constant vigilance. Increase the knowledge and security of your organization and make sure to tap into the expert resources at your disposal. They will take responsibility and keep you up to date, warn and react 24x7. We are a member of your team. 3