In November 2011 the Government launched the UK Cyber Security Strategy: Protecting and promoting the UK in a digital world. The strategy acknowledges the importance of a safe cyber environment for business. Cyber-crime is today the world’s fastest-growing crime sector. Your cyber security is paramount if you are beginning to trade overseas or expanding your overseas business. The cyber risks include viruses, identity theft (spyware, wifi eavesdropping, hacking) and threats to wealth (fraud, identity theft, spam emails). Of special concern to businesses is cyber-crime connected to intellectual property theft. This report is the first publication of its kind from IET Standards. Its purpose is to inform professionals involved in the development and operation of intelligent or smart buildings about the resilience and cyber security issues that arise from a convergence of the technical infrastructure and computer-based systems. Resilience and Cyber Security of Technology in the Built Environment Resilience and Cyber Security of Technology in the Built Environment IET Standards IET Standards Technical Briefing IET Standards Technical Briefing Resilience and Cyber Security of Technology in the Built Environment www.theiet.org/standards IET Standards Michael Faraday House Six Hills Way Stevenage Hertfordshire SG1 2AY Cyber Security Cover.indd 1 17/06/2013 13:25:29 Resilience and Cyber Security of Technology in the Built Environment Author: Hugh Boyes CEng FIET CISSP The IET would like to acknowledge the help and support of CPNI in producing this document. Published by The Institution of Engineering and Technology, London, United Kingdom The Institution of Engineering and Technology is registered as a Charity in England & Wales (no. 211014) and Scotland (no. SC038698). © The Institution of Engineering and Technology 2013 First published 2013 This publication is copyright under the Berne Convention and the Universal Copyright Convention. All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may be reproduced, stored or transmitted, in any form or by any means, only with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publisher at this address: The Institution of Engineering and Technology Michael Faraday House Six Hills Way, Stevenage Herts, SG1 2AY, United Kingdom www.theiet.org While the publisher, author and contributors believe that the information and guidance given in this work is correct, all parties must rely upon their own skill and judgement when making use of it. Neither the publisher, nor the author, nor any contributors assume any liability to anyone for any loss or damage caused by any error or omission in the work, whether such error or omission is the result of negligence or any other cause. Any and all such liability is disclaimed. The moral rights of the author to be identified as author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. A list of organisations represented on this committee can be obtained on request to IET standards. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance with the contents of this document cannot confer immunity from legal obligations. It is the constant aim of the IET to improve the quality of our products and services. We should be grateful if anyone finding an inaccuracy or ambiguity while using this document would inform the IET standards development team at IETStandardsStaff@theiet.org or The IET, Six Hills Way, Stevenage SG1 2AY, UK. ISBN 978-1-84919-727-4 (paperback) ISBN 978-1-84919-728-1 (PDF) Contents Participants in the Technical Committee 4 1Introduction 5 2Background 7 3 Overview of resilience and cyber security 13 4 Understanding the threat landscape 18 5 Resilience and cyber security during specification phase 23 6 Resilience and cyber security during design phase 27 7 Resilience and cyber security during construction 31 8 Resilience and cyber security during operations 35 9 Managing change – impact on resilience and cyber security 41 10 Resilience and cyber security during decommissioning 43 11 Relevant standards 44 Appendix A – Intelligent building case studies 47 Appendix B – Twenty critical controls 52 Appendix C – Glossary 55 Participants in the Technical Committee The IET and author wish to acknowledge the support received from representatives of the following organisations in reviewing the drafts of this document. Arup Centre for the Protection of National Infrastructure (CPNI) Corporate IT Forum Defence Science and Technology Laboratory (dstl) ECA Group Ltd General Dynamics UK Ltd Incoming Thought Ltd Newrisk Ltd Symantec Transport for London CHAPTER 1 Introduction Creation of intelligent or smart buildings requires greater integration of systems, both the operational and business systems used by the buildings occupants and a wide range of infrastructure systems. This is typically being achieved through the convergence of the technical infrastructure and the widespread use of readily available commercial and open source technologies. Although the initial focus of the designers of intelligent or smart buildings has been on developing solutions to make them more energy-efficient, there is an increasing focus on the interaction of systems. The drivers for intelligent buildings and thus systems integration arise from the need for new energy-efficient interventions, real-time decision support systems, enhanced building and personnel security, and better management information dashboards that offer easy access to key performance indicators. The purpose of this technical briefing is to inform professionals involved in the development and operation of intelligent or smart buildings about the resilience and cyber security issues that arise from a convergence of the technical infrastructure and computer-based systems as those systems become interconnected with the global network that comprises cyberspace. This document is not intended to address the physical hardening of buildings to protect against specific physical threats such as earthquakes, weather or blast. The document examines different sources of threats across the building life cycle from initial concept through to decommissioning. It considers potential threat agents that could cause or contribute to a cyber security incident and identifies some of the measures that may be appropriate to reduce the risks. The key points that we highlight in this document are as follows: ●● ●● ●● ●● Economic and environmental factors place increasing pressure on building owners and operators to adopt a converged (i.e. common or shared) IT infrastructure and to achieve integration between multiple electronic systems supporting building management functions and business applications. Given that systems integration blurs the boundaries between traditional roles and responsibilities in any organisation, it is important to adapt the business practices and governance processes to work effectively across organisational boundaries. In view of the significant level of systems convergence in intelligent buildings and the consequent higher probability of systems failure, the design of the built environment should take resilience into account. Sharing of IT infrastructure and the integration of corporate IT and industrial control systems (ICS), including building systems, in an intelligent building poses a number of design and operational challenges if a safe, secure and resilient environment is to be achieved. Thus whenever upgrades or new investment are planned, a strategic review of new or upgraded threats should inform the requirements and design brief. © The Institution of Engineering and Technology 5 ●● ●● ●● ●● ●● ●● ●● ●● ●● 1 6 From a resilience perspective the greatest threat to the building is likely to come from single points of failure, which may be the building fabric or structure, utilities, infrastructure, systems or processes. When considering the potential threats to a building, the assessment should take into account non-malicious acts, malicious acts (from employees, contractors, visitors and, in open access buildings, from the public) and the potential effects of natural causes. A serious challenge with some incidents, particularly those that are cyber security-related, may be identifying the cause of an incident. The task is particularly difficult where there is a lack of logs or system logging and audit. During the requirements, concept and specification phase of a building project, the resilience and cyber security requirements need to be identified, taking into account the nature and purpose of the construction and the potential threats to the occupants and their business operations. These requirements should include appropriate protection for intellectual property, and commercial or sensitive information. During the design phase of a building project, appropriate solutions to the resilience and cyber security requirements should be developed. As part of a design assurance exercise, the proposed design should be assessed to ensure that it has not introduced any new or unforeseen risks. Assuring the continuity of intent through the construction phase may require investment in competent resources. During construction of the building, resilience and cyber security issues need to be addressed while managing the supply chain, monitoring design integrity, maintaining physical security and implementing systems security. Once the building is in operational use, its resilience should be proactively managed to prevent any unforeseen or emergent loss of resilience and to identify any additional requirements arising from changes in the building’s use. The building’s IT systems are at risk from the outset. Application of the 20 critical controls1 (see Appendix B) can provide protection by detecting reconnaissance, preventing unauthorised access or actions, detecting unauthorised access or actions and mitigating cyber security events. When changes to the building, its infrastructure, systems and use are being planned and implemented, the impact on resilience and cyber security should be assessed and appropriate steps taken to address any new or modified risks. This should include assessment of the impact of any decommissioning. Developed, coordinated and published by the SANS Institute: http://www.sans.org/criticalsecurity-controls [accessed 24 Apr 2013] © The Institution of Engineering and Technology CHAPTER 2 Background 2.1Technology developments in the built environment Economic and environmental pressures are increasingly affecting the design and operation of the built environment. In a competitive global economy, economic pressures relate to the total cost of ownership, both in terms of capital investment throughout the building’s life cycle and operating costs. These operating costs are not just the costs of facilities management and building maintenance, but also the users’ operational costs that are influenced by the built environment. A building that is operationally inefficient will inevitably have an economic impact on its occupants. Environmental pressures include the need to reduce energy consumption through increased energy efficiency and to reduce waste. To address these pressures a range of innovative IT-enabled solutions are being developed, as summarised in Figure 1. Figure 1 – Intelligent buildings are part of an increasingly integrated built environment Smart Cities Smart Grid Intelligent Buildings Smart Homes Intelligent Transport A key theme in these solutions is the increased IT-based interaction between physical assets with supporting communications, energy and transport infrastructures. Examples of this integration would include an intelligent building interacting with the smart grid to manage energy demand and ensure the most economic use of supply tariffs. In future it could include interaction with urban transport systems to inform building users of the current local transport situation. This integration affects both the operational and business systems used by the buildings’ occupants and a wide range of infrastructure systems that maintain a comfortable, safe and secure environment. Historically this integration has been difficult due to the proprietary nature of many building systems. However, the increasing adoption of open standards and commercial ‘off the shelf’ products to © The Institution of Engineering and Technology 7 build these systems, for example TCP/IP networking and the use of commercial operating systems, has made the integration much easier. Unfortunately the use of these technologies can create significant issues from a resilience and security perspective. For example, some software products have ‘remote access’ links inbuilt, connecting them to their suppliers for upgrade and maintenance support by default, and the increasing use of browser-based control interfaces has encouraged some manufacturers to require Internet access to their systems for condition monitoring and diagnostic purposes. If these remote connections are not adequately protected and managed, they create vulnerabilities and adversely affect system security and resilience. The greatest economic and environmental benefits are likely to be derived from deployment of new automation and control systems that take information from business systems and data from sensor networks and building systems, to automate routine functions, maintain an optimum environment and achieve improved performance. In an office environment an example of intelligent building technologies could be the management of meeting rooms. If a building management system has access to meeting room booking information, it could be configured to reduce energy use by turning off non-essential equipment in the room and limiting environmental conditioning until the room is required and the first occupants arrive. This would require interaction between building systems and the room-booking service, which may be part of the organisation’s email or operational systems. In a factory environment, similar integration might be used to control the heating and lighting of operational areas based on shift patterns, operational demand and the presence of the workforce in a particular area. Provided that these features work reliably they can offer significant user benefits, but chaos can result when there are system failures or unwanted/unauthorised human intervention. Therefore, the more complex the technology and the greater the reliance on its fault-free operation, the greater the need will be for integrity, availability and confidentiality from a safety, security and reputational perspective. Any IT system is potentially at risk, regardless of whether it is standalone or part of an integrated system. The increased systems integration required to deliver an intelligent building is therefore not without risk even when carefully managed and monitored. We need to recognise that intelligent buildings are complex systems. This document outlines the key factors that need to be addressed to identify and manage the resilience and cyber security factors, and risks to an intelligent building. 2.2 What is an intelligent building? The precise definition of an intelligent building varies around the world. Although there is no agreed definition, there is a common theme – the integration of technologies. For the purpose of this document we define an intelligent building as one that provides a responsive, effective and supportive environment within which an organisation can achieve its business objectives. Intelligent buildings may also be referred to as smart buildings. Some of the systems that may be integrated in an intelligent building are illustrated in Table 1. The fact that a building contains some of the listed systems does not 8 © The Institution of Engineering and Technology make it an intelligent building: it is the systems integration to achieve operational efficiencies, energy efficiency, additional functionality or other user benefits that delivers the intelligent element. An issue that potentially increases the operational complexity of managing an intelligent building is the organisational and often contractual boundaries between those responsible for the different elements of infrastructure, building, ICT and business systems. A key principle for an intelligent building is that it needs to be designed and operated so that it provides a safe, secure and resilient environment, and to the extent that is practical, it needs to include a degree of future-proofing. Infrastructure Sensors, Structured cabling, IP network, Wireless*, Plant rooms, Data rooms, Server rooms, Communications rooms, etc. Building systems (ICS)† ICT systems Business systems‡ Building management HVAC controls Access control Lighting control Intruder alarm Security/CCTV Fire alarm Water management Waste management Utilities Stand-by generators UPS Office automation (email, data, Internet) Enterprise resource planning (ERP) Material requirements planning (MRP) Customer relationship management (CRM) Integrated commandand-control centre Integrated service/ helpdesks Media/multi-media (voice, video, music) Telephony (voice, fax, video conferencing, SMS, pagers) Table 1 – Systems that may be integrated in an intelligent building IP-based applications§ * The term ‘wireless’ is used as a generic term to cover communications and data links that do not require a physical connection; technologies employed include WiFi, Bluetooth, ZigBee, radio, NFC, RFID † ICS – Industrial Control Systems ‡ Only included to the extent that they are integrated with building systems, for example CRM – Access Control, ERP/MRP – Supply Chain Management § Relevant where they interact with building systems or sensors, for example RFID for tracking location of material or assets An innovative aspect of systems integration is the increasing use of sensors within intelligent buildings. This can range from passive infrared motion detectors, to the CCTV motion detection and the use of radio frequency identification (RFID) technologies. By allowing sensors that are usually applied to a single sub-system to be used by other systems, the building can be made more intelligent: for example, the use of RFID tokens to control access to the building or building zones, to provide access to the corporate network and to retrieve documents on communal printers. Another example is the use of building security sensors and CCTV motion detection to operate and control lighting (both internal and external) and in conjunction with environmental monitoring systems to manage heating, shutters, etc. Appendix A to this document contains some intelligent building case studies, which provide examples of the types of systems integration already occurring and the operational benefits achieved. Currently the ‘intelligence’ is predominantly automation of routine tasks, based on the sharing of information or data, e.g. energy efficiency measures applied to unoccupied rooms. © The Institution of Engineering and Technology 9 As technology develops it is likely that significant gains will occur when the converged systems become self-aware, with network-based tools learning over time and responding accordingly. For an intelligent building this could represent the development of a ‘self-preservation’ response, with the systems developing an awareness of relationships between events. An example might be that rather than relying on signature-based analysis to detect malware, attacks or system failures, the intelligent building responds to deviations from system and network behavioural norms, seeking to minimise disruption and alerting an operator to the need for an intervention. With this increased integration and interaction there will be a need to avoid the creation of single points of failure. Economic and environmental factors place increasing pressure on building owners and operators to adopt a converged (i.e. common or shared) IT infrastructure and to achieve integration between multiple electronic systems supporting building management functions and business applications. 2.3How does this integration affect building operations? There are three fundamental issues that need to be considered in respect of the operation of an intelligent building: ●● ●● ●● the organisational responsibilities for integrated technical infrastructure; the differences in the nature of corporate IT and building systems (ICS); the processes, practices and governance, including legal and regulatory compliance, required to operate and maintain the intelligent building in a safe, secure and resilient fashion. In multi-occupancy buildings there will also be the issue of maintaining the privacy of the occupiers, and where appropriate, their information and data, their staff, visitors or customers. If there is no integration or interconnection between corporate IT and building systems (ICS), the responsibility for these systems will lie with IT management and facilities or operations management respectively. Integration and interconnection creates a shared responsibility across two often culturally and technically different teams, because a malware incident on a corporate computer could have a significant impact across the entire intelligent building, affecting all the systems. At a generic level, the differences between the building systems (ICS) and corporate IT systems (ICT and business systems) are shown in Table 2. These differences are significant and inevitably lead to differing operational practices. For an intelligent building, the criticality of a system needs to be assessed in terms of business impact on resilience, physical security and personal safety. A failure to recognise these differences and system-criticality assessments, or to take account of them in the design, delivery and operation phases of an intelligent building, will significantly affect resilience and increase cyber security risks. Where some features are at the very least safety or security critical, they must be adequately protected from unauthorised intervention or access from the rest of the system while being part of it. 10 © The Institution of Engineering and Technology Characteristic Corporate IT systems Building systems (ICS) Lifetime 3–5 years 5–20 years Availability Out-of-hours outages often acceptable Continuous operation typically required for control systems Time-critical Delays often acceptable May be safety-critical Patching Frequent, can be daily Rare User accounts Usually individual users with permissions according to business role Often shared functional accounts, based on specific roles, e.g. operator, administrator, engineer Outsourcing Widely used Varies, rare for production systems Antivirus Widely used Difficult/impossible to deploy Security skills Limited to good Often poor or non-existent Security awareness General awareness Often poor or non-existent Security testing Widely used Rarely used and risk of damage to control systems Physical security Generally secure and manned Generally remote/ unmanned Table 2 – Comparison of corporate IT systems and building systems (ICS)2 2 An example of the difference between systems is the practice of allowing users to access removable media (CDs, DVDs, USB drives) from their desktop or laptop computers, which may be acceptable on the corporate IT system, where antivirus and anti-malware is installed, but is best avoided on the building management network where not all computers can be protected in this way. The practices for dealing with a compromise may also differ significantly. The New York Times,3 for example, simply replaced all compromised computers on its corporate network when faced with a serious threat. Removing a virus or malware from a building management system may be significantly more complex, however, given that some electronic sensors or components will be embedded in many different major components and sub-systems. The problem may be further exacerbated by the potential age of the systems and the need to maintain building operations. Historically, industrial control systems (ICS), including the subset that comprise building systems, and corporate IT systems have been managed by operations (including estates) teams and IT teams respectively, with different operational processes, practices and governance. The combination of these organisational Adapted from Table 5.1 in Protecting Industrial Control Systems from Electronic Threats, Joseph Weiss, 2010, 978-1-60650-1979 3 http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-timescomputers.html [accessed 24 Apr 2013] 2 © The Institution of Engineering and Technology 11 boundaries coupled with systems integration and/or interconnection can introduce significant operational complexity and risk into intelligent buildings. Given that systems integration blurs the boundaries between traditional roles and responsibilities in any organisation, it is important to adapt the business practices and governance processes to work effectively across organisational boundaries. 12 © The Institution of Engineering and Technology CHAPTER 3 Overview of resilience and cyber security 3.1 What does resilience mean and why is it an issue? Resilience is the ability to adapt and respond rapidly to disruptions and maintain continuity of business operations. From a business perspective, resilience is generally about preparing for any potential threat to the delivery of a smooth, steady and reliable service so as to maintain the delivery of critical services. Thus when bad things happen, as they do, the personnel operating the building are expected to minimise disruption to the use of the building. To achieve this goal they should have considered potential causes of disruption, both human and natural, make sure that key systems and processes are maintained to ensure business continuity, and have in place systems and processes to enable timely detection of, and response to, disruptive events. The concepts of business continuity and disaster recovery are reasonably well understood by organisations in respect of their corporate IT systems and the management of manufacturing or production processes. To ensure the resilience of business operations, the organisation might employ a range of provisions, including: alternate/disaster recovery premises; offsite backups of business-critical data; diverse network and communication routes, etc. This is particularly the case for organisations that are heavily dependent on technology and IT for their business operations. From a resilience perspective, the threat to business-critical corporate IT systems is generally mitigated and managed through disaster recovery, incident response and business continuity plans. The nature of these plans and the specific measures required to maintain business operations should be determined by the nature of the business, regulatory and legal requirements, and a business impact analysis. Where there is a critical business need to maintain continuity of IT operations, the solution may be to increase redundancy, such as through the provision of duplicate IT systems in geographically separate high-availability data centres. The resilience of systems, whether they are IT or building systems (for example HVAC), is generally considered in terms of redundancy and their availability under both fault and maintenance conditions. Table 3 illustrates a classification mechanism used for data centres and industrial plants. A building or plant classified as Tier 1 will have minimal resilience, with single points of failure in critical systems. This type of accommodation is likely to be used by organisations that can tolerate some loss of IT or building systems. In contrast, a building or plant classified as Tier 4 will have a high degree of fault tolerance and might be used by an organisation delivering critical national infrastructure services. A Tier 4 site should be able to accommodate varying levels of scheduled maintenance and systems failure without losing capacity. © The Institution of Engineering and Technology 13 Tier Description Performance 1 Basic infrastructure Non-redundant capacity components and single non-redundant connection/ distribution paths 2 Redundant capacity components infrastructure Redundant capacity components and single non-redundant connection/ distribution paths 3 Concurrently maintainable infrastructure Redundant capacity components and multiple distribution paths 4 Fault-tolerant infrastructure Fault-tolerant architecture with redundant capacity systems and multiple distribution paths 4 In the built environment, the need for building systems to be resilient will generally be determined by the operational use of the accommodation. Thus for example data centres and acute health care facilities will have requirements for the continuity of critical building services, whereas a retail outlet or warehouse may only require the provision of emergency lighting to allow safe evacuation of the premises. In an intelligent building, resilience and cyber security are inextricably linked, because the failure of a building system could have a significant impact on the cyber security of the building. In view of the significant level of systems convergence in intelligent buildings and the consequent higher probability of systems failure, the design of the built environment should take resilience into account. 3.2 What does cyber security mean? Cyber security is a broad subject – it is not just about the technology, but has to address a wide range of factors: people, process and governance issues, and their interrelationships. These factors are management issues and are as important in cyber security as the deployment of technical solutions such as firewalls and antivirus software. One internationally agreed definition for cyber security is ‘the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets’.5 The aim is that they remain under the control of legitimate users. Adapted from ‘Site Infrastructure White Paper – Tier classifications define site infrastructure performance’, W. Pitt Turner IV, John N. Seader and Kenneth G. Brill, 2008, The Uptime Institute; available from http://www.greenserverroom.org/Tier%20Classifications%20 Define%20Site%20Infrastructure.pdf [accessed 24 Apr 2013] 5 From ITU-T X.1205: http://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity. aspx [accessed 24 Apr 2013] 4 14 © The Institution of Engineering and Technology Table 3 – Tier classifications for site infrastructure performance4 This definition refers to a couple of terms that perhaps need clarifying: ●● ●● the ‘cyber environment’ (also sometimes called ‘cyberspace’) effectively comprises the interconnected networks of electronic, computer-based and wireless systems; the ‘organization and user’s assets’ includes connected computing devices, personnel, infrastructure, applications, services, telecommunication systems, and the totality of transmitted, processed and/or stored data and information in the cyber environment. The cyber environment therefore encompasses the Internet, telecommunication networks, computer systems, embedded processors and controllers, and a wide range of sensors, storage and control devices. Although this definition of cyber environment only makes reference to systems, it also includes the information, services, social and business functions that exist only in cyberspace. Experience shows that even standalone systems and isolated networks are at risk from attacks by malicious users and from the introduction of malicious software via removable media. Cyber security strives to ensure the attainment and maintenance of the security objectives of the organisation and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: ●● ●● ●● ●● Confidentiality, including the control and authorisation of access to information or data, for example to protect personally identifiable information, intellectual property and commercially sensitive data such as financial transactions, energy-metering data and production records. Integrity, which may include the trustworthy and safe operation of electronic and computer-based systems, their software and associated business processes, the assurance and authenticity of data or information, and the validity and retention of transactions including their authentication and nonrepudiation. Availability of the building in general, and in particular the systems and processes required for its safe, secure and reliable operation. The availability needs to take into account the impact of failure on the ‘system of systems’ arising from the failure of a single system, i.e. is there a cascading or domino effect. Privacy, as, although this is often treated as part of the confidentiality objective, the convergence of systems creates additional risks. It is important that personal data remains ‘private’ and that in any system where there is an aggregation of data, that personal data is given appropriate protection as required by regulation and/or legislation. An example of this aggregation in a transport terminal is the aggregation of data relating to individual travellers as ‘passenger data’. 3.3 Why is cyber security an issue? For both safety and security reasons it is important that an intelligent building meets the general security objectives of its owners, operators and occupiers, thus maintaining the required level of confidentiality, integrity and availability. From legal and regulatory perspectives (e.g. under EU and UK data protection and privacy legislation) there are also requirements to protect personal data. The interconnection and integration of systems from the three categories (i.e. building, ICT and business © The Institution of Engineering and Technology 15 systems) creates additional risks. Without careful planning, testing and monitoring, the more technology that is added to a building, the more the ‘Law of Unintended Consequences’6 may apply to the ‘system of systems’. From a cyber security perspective it is important that the intelligent building is designed and operated so as to minimise and manage the risks to confidentiality, integrity and availability. The nature of potential threats to intelligent building systems will vary widely and will in part depend on the nature of the building and its occupants or users. Threats to systems include deliberate attacks, unintentional disruption and natural factors. A key difference between the cyber security of corporate IT systems and buildings systems (ICS) is the focus of protective measures, as illustrated in Figure 2. In part this arises from the differences between the systems that were outlined in Table 2, but it is also influenced by the differing operational priorities. Corporate IT systems Financial integrity Denial of service Figure 2 – Risks arising from compromised systems Building systems (ICS) Loss of information Loss of view Loss of control Impact on systems Financial and reputational risk Safety and operational risk In protecting corporate IT systems the emphasis is typically on the prevention of data loss and the threats to the financial integrity of the business, for example loss of intellectual property or customer data, fraudulent transactions and the continuity of business operations. The focus of technical solutions is therefore generally on the protection and control of information, with solutions deployed to address known attack vectors, for example network security, access control, advanced persistent threat (APT) detection and prevention and encryption. In building systems (ICS), prevention of loss of control (i.e. the ability to control the process and physical assets) or loss of view (i.e. the ability of an operator or manager to see what is actually happening in the process or systems) are the primary requirements. Prevention of information or data loss is potentially accorded a much lower priority for these systems. The reason for this difference in emphasis is that the loss of control or view can lead to significant safety and operational risks: the former could lead to death or serious injury and physical damage to equipment; the latter may ultimately have financial or reputational consequences. Therefore system availability and integrity are generally afforded the greatest protection, with for example mechanisms such as verification of message integrity and the authentication of devices being given a higher priority than encryption of data. 6 16 http://www.econlib.org/library/Enc/UnintendedConsequences.html [accessed 24 Apr 2013] © The Institution of Engineering and Technology Solutions that afford protection to a corporate IT system may not be an appropriate or optimum solution for building systems (ICS). Thus in an intelligent building, infrastructure convergence and systems integration may impose technical and operational constraints on the protective measures employed. Sharing of IT infrastructure and the integration of corporate IT and industrial control systems (ICS), including building systems, in an intelligent building poses a number of design and operational challenges if a safe, secure and resilient environment is to be achieved. Thus whenever upgrades or new investment are planned, a strategic review of new or upgraded threats should inform the requirements and design brief. © The Institution of Engineering and Technology 17 CHAPTER 4 Understanding the threat landscape 4.1 Who or what might cause an incident? This section examines different sources of threats in terms of who (or what) might cause an incident. It considers the potential threat agents, which can be individual(s) whose actions or inactions will cause or potentially cause a cyber security incident, or natural factors. For those threat agents with a malicious intent, it then considers the nature of the groups to which the threat agents may belong, because this may influence the potential severity and sophistication of the threat. From a resilience perspective the greatest threat to the building is likely to come from single points of failure, which may be the building fabric or structure, utilities, infrastructure, systems or processes. 4.1.1 Potential threat agents The potential threat agents that initiate a cyber security incident are as follows: ●● ●● ●● ●● Malicious outsiders: This is a person or persons unconnected with the building owner, the building occupier or supporting contractors; in essence, a person who does not have privileged access to the building or its systems. A malicious outsider could be a hacker, a cyber criminal, activist, terrorist or state-supported attacker – in all cases the intent is to cause harm or disruption. The attack may be targeted at the intelligent building and/or its occupants or be indiscriminate, for example malware or viruses. Malicious insiders: This is a person (or persons) connected with the building owner, the building occupier or supporting contractors; in essence a person who has some level of authorised or privileged access to the building or its systems and puts that privileged access to a use not intended or allowed. Non-malicious insiders: This is a person (or persons) connected with the building owner, the building occupier or supporting contractors, who through error, omission, ignorance or negligence causes a cyber security incident. Nature: This could be solar, weather, animal or insect related and result in a failure or significant impairment of one or more of the utility supplies or building systems, with a knock-on effect on systems that enable the correct operation of the intelligent building. When considering the potential threats to a building the assessment should take into account non-malicious acts, malicious acts (from employees, contractors, visitors and, in open access buildings, from the public) and the potential effects of natural causes. 18 © The Institution of Engineering and Technology 4.1.2 Potential threat agent groups Malicious threat agents will belong to one of the following groups, which are listed in order of increasing sophistication and capacity to cause damage and disruption: ●● ●● ●● ●● ●● ●● ●● Sole activists: This could be a disaffected employee or an activist in an organised group who decides to take his or her own action. The severity and sophistication of the threat will be determined by the individual’s capabilities. Unfortunately, the ready availability of hacking and denial-ofservice tools on the Internet (and in some cases distributed with technical magazines) means that the level of technical understanding required to launch an attack has been significantly reduced. Activist groups: The recent activities of some groups demonstrate that when a team of determined activists work together the threat increases, e.g. when they have persuaded naïve third parties to allow installation of software on their computers, thus magnifying the effect of distributed denial of service (DDoS) attacks. Competitors: These groups are likely to work through third parties, with the aim of harming a rival by stealing intellectual property or disrupting operations to cause financial or reputational loss. Organised crime: These groups are well organised and motivated by financial gain, through fraud, theft of intellectual property, attacks on e-commerce and banking systems, and blackmail or extortion. The sophistication of the malware used by these groups is increasing and there is evidence that they operate on a commercial basis, making their tools available to third parties. Terrorist: These groups have demonstrated that they are increasingly IT aware, making use of the Internet to distribute propaganda and for communications purposes. Well-funded groups could take advantage of the services offered by organised crime, seek support from a nation state or encourage internal members to adopt these attack methods. Again these groups could rely on the various toolkits available for download. Proxy terror threat agent with nation state support: In effect, this is statesponsored terrorism, where the proxy party is used to provide deniability. This type of group effectively has the capacity and sophisticated technical support available to a nation state made available by the sponsoring nation. Nation states: It is alleged that some nation states are actively involved in cyber attacks on a wide range of organisations to acquire state secrets or sensitive commercial information and intellectual property. During periods of heightened international tension and conflict, these activities may include more widespread attacks as evidenced by malware such as Stuxnet, Duqu and Flame. 4.2 What harm might an incident cause? Depending on the nature of the incident, where it occurs during the building life cycle and whether it is deliberate (the motivation of the threat agents), the building owner, operator, occupants and user may suffer significant inconvenience or losses. It is important that the losses below are not considered in isolation and there may be significant interdependencies. ●● Commercial losses: These could be consequential losses due to the building being uninhabitable or inoperable, or they could arise from loss of commercial opportunities, e.g. due to commercial espionage during a tender exercise. © The Institution of Engineering and Technology 19 ●● ●● ●● ●● ●● ●● ●● ●● Reputation loss: The higher the profile of the building and its occupants, the greater the potential for loss of reputation. These losses are likely to arise from incidents that cause major disruption or malfunction of the building, loss of personal or sensitive data, or widespread negative publicity. Theft or loss of intellectual property: This is of the greatest sensitivity during the specification, design and construction phases of the intelligent building where particularly innovative techniques or commercially sensitive options are being examined. However, even during the operations phase, including any significant changes or refurbishments, there may be significant volumes of commercially sensitive or proprietary information being handled by the building owner, building operators and support staff. Regulatory action: Depending on the use of the intelligent building, the failure or malfunction of systems as a result of an incident could lead to regulatory action. For example, a significant loss of personal data could trigger action by the data protection regulator, and incidents involving serious injury or death could trigger action by health and safety officials. IT incidents: Following an incident, there may be significant work required by IT and operations teams to identify, clean or restore affected systems and make appropriate changes to prevent a repetition of the incident. Depending on the nature of the incident, there may also be significant damage to the fabric of the building, the technical infrastructure and to non-IT systems. This damage may need to be repaired before the building can be restored for operational use. This represents an opportunity cost, because the resources could presumably have been deployed on other tasks. Contract and service delivery costs: The impact of dealing with an incident may include making changes to contracts and service level agreements, with a consequential impact on their costs. Disruption and recovery costs: If the incident causes physical damage to the building there may be significant costs associated with the repair and cleaning of affected facilities or assets and their restoration into fully serviceable condition. Investigation costs: Depending on the nature of the incident, there may be significant investigation costs associated with the use of digital forensic and engineering specialists to establish the chain of events. This will particularly be the case where there is a need to involve law enforcement agencies or insurers, who will both want evidence of the cause of the incident. Mitigation costs: If the incident leads to loss of availability of the intelligent building or the need to invoke business continuity measures, there are likely to be a range of mitigation costs, e.g. the temporary provision of alternative accommodation, the refund of tickets or the rescheduling of events. A serious challenge with some incidents, particularly for those that are cyber security related, may be identifying the cause of an incident. The task is particularly difficult where there is a lack of logs or system logging and audit. 4.3 How do you assess vulnerability? The evaluation of vulnerabilities is typically based on a risk management cycle, as illustrated in Figure 3. The assessment generally starts with the identification of a threat agent; examples of these were discussed in section 4.1. For a particular threat agent the threat types can be identified based on the vulnerabilities they exploit. The existence of a specific vulnerability creates a risk that may damage or 20 © The Institution of Engineering and Technology impair an asset. Having identified the asset at risk, the exposure can be assessed; this may be financial and reputational loss. The potential exposure is mitigated by putting an appropriate safeguard in place, which should limit the ability of the threat agent to cause a problem. In undertaking the threat assessment, it is normal to assess the likelihood of the risk event occurring, the value of the exposure and the cost of implementing the safeguard. Affects Threat Agent Figure 3 – Typical risk management cycle Causes Threat Type Safeguard Exploits Mitigated by Exposure Vulnerability Creates Causes Asset Risk Damages In considering proportionate safeguards, four options are typically considered: ●● ●● ●● ●● Avoidance, e.g. by deciding not to start or continue with the activity that gives rise to the risk. Reduction, i.e. taking steps to reduce the impact or reduce the likelihood of the risk occurring, e.g. through controls and protective measures. Sharing the risk with another party or parties, e.g. through contracts, outsourcing or insurance. Retention, i.e. accepting the risk, and taking appropriate steps to manage the consequences, e.g. budgetary provision or business continuity measures. To illustrate this process in an intelligent building, an example might be a review of a proposal to replace a number of physically cabled building security cameras with new wireless CCTV cameras. The building contains a number of pieces of expensive equipment and the assessment might consider the following scenario: ●● ●● ●● ●● ●● ●● Threat agent – thief wants to break into the building to steal equipment. Threat type – wants to disrupt CCTV recording to prevent identification following break-in. Vulnerability – has ability to jam WiFi signals used by CCTV cameras. Risk – that jamming may be successful, preventing recording of security events and hindering the investigation of the subsequent criminal activity. Asset – thief to break into premises and steal equipment. Exposure – loss of equipment, creates financial loss through the cost of replacing and any consequential losses until missing equipment is replaced. © The Institution of Engineering and Technology 21 ●● Safeguard – use wired CCTV cameras to cover all points of entry to and exit from the building and adopt a policy to permit the use of wireless CCTV only in internal areas where there is limited ability to jam or disrupt the network connection from outside the building. Examples of increased vulnerability for an intelligent building include: ●● ●● ●● ●● ●● ●● The potential for deliberate disruption of the systems due to the increased connectivity between systems, particularly where some of the systems connect to networks outside the building, e.g. network connectivity or remote monitoring functionality. The potential for accidental disruption of systems due to the failure of a system or of the building’s infrastructure. The possibility that unforeseen consequences will arise from unintentional system interactions, e.g. the potential for one system to interfere with the operation of another, under both normal and abnormal operating conditions. The potential for unintentional increased vulnerability of one system arising from its connection to or access from another system, e.g. arising from systems operating with different security rules and levels of trust. The need to manage access of staff, suppliers, contractors, and building occupants or users to the intelligent buildings systems so as to prevent unauthorised access to sensitive information and prevent unauthorised changes to systems or information. The need to understand the consequences of natural phenomena, such as extreme weather, earthquakes, flooding, solar storms, etc. for the operation and integrity of the building systems. To illustrate the impact of the last bullet point above, an interesting example of the vulnerability of a complex building was the flooding in October 2012 of a Verizon office in New York by Hurricane Sandy.7 When the storm surge flooded Verizon’s Manhattan office, the underground 90,000 cubic foot cable vault suffered a ‘catastrophic failure’, rendering miles of copper wiring useless and causing severe disruption to north-eastern US telecommunications services while the damage was repaired. In this example the threat actor is nature (the hurricane-induced storm surge) and the vulnerabilities are the failure to maintain a watertight underground cable vault or to predict the possibility of the event and prevent its occurrence by relocating the core function away from the flood risk. http://www.theverge.com/2012/11/17/3655442/restoring-verizon-service-manhattanhurricane-sandy [accessed 24 Apr 2013] 7 22 © The Institution of Engineering and Technology CHAPTER 5 Resilience and cyber security during specification phase 5.1 Resilience and cyber security requirements During the specification phase the project team will develop a specification or design brief for the proposed building, setting out constraints and parameters for the design and outlining the project’s objectives, including proposed use and key functional requirements. Work on this initial project brief potentially encompasses three workstreams related to resilience and cyber security of the planned building: ●● ●● ●● establishing resilience requirements of the building and its systems; establishing cyber security requirements for the building systems; and protecting intellectual property and commercial data. These workstreams should take into account the nature of the building, its profile, proposed use and potential threats. Thus, for example, potential threats to a new high profile building in a prime city location or a new maximum security prison are likely to be different to those faced by a new environmentally controlled warehouse in an out-of-town industrial park. The cyber security requirements will need to take account of the increasing practice of running physical security systems over the IT infrastructure.8 5.1.1 Establishing resilience requirements Key to achieving a resilient building is the design of building structures that are durable, and resistant to fire, flood, seismic events, severe weather events and other potential disasters. Failure to address resilience requirements at the specification stage can lead to significant cost increases or delays during design and construction, or expensive and disruptive changes when occupied or in operation; in some cases it may not be possible to address the threats adequately, thus increasing the risks to building owners and occupiers. Resilience requirements should be determined by the building owner or investor based on location factors, proposed type and use of the building, and anticipated needs of the occupants. The extent to which resilience requirements and associated level of availability are affordable should be determined by the business case for construction or modification of the building. Financial pressures may be used during cost reduction or value management exercises to justify reducing or removing resilience or cyber security requirements. This can be a short-sighted decision because the costs of taking remedial or recovery action may be significantly greater than the savings, and the reputational damage may be irrecoverable. Resilience requirements should take into account a wide range of factors including: ●● Physical location and environment of the building, in particular any need to assure access, prevent flooding, handle severe weather events, prevent CPNI is publishing guidance on ‘Physical Security over Information Technology’; see http:// www.cpni.gov.uk for further information [accessed 24 Apr 2013] 8 © The Institution of Engineering and Technology 23 ●● ●● ●● forced entry, etc. These requirements should also address utility supplies and communications, including any need for diversely routed supplies, the quality and reliability of these supplies and potential for single points of failure. Physical design of the building, including susceptibility of the design to physical damage from natural events (e.g. seismic activity), durability of materials used, robustness of construction, ease of maintenance and repair, and the ability to adapt the building for future reuse for new ownership or occupancies. Overall systems availability requirements and the functional criticality of each system, or technical service, in relation to correct operation of the building. In addition to the functional assessment, the consequences of system failure for the safety and security of the building occupants and assets should be assessed. When considering the building systems, both physical location and environment of the building and its proposed physical design should be taken into account. For example, for a high availability building such as a data centre,9 the supply of power to the site is critical, and the reliability of its supply influences the nature of any onsite generation required to provide resilience and continuity of supply. Any consequences of integrating building systems with corporate and operational IT systems, including any issues arising from convergence of the technical infrastructure used by these systems. 5.1.2 Establishing cyber security requirements Cyber security requirements need to be considered in conjunction with the resilience requirements because there will be some dependencies between these requirement sets. It is important that relationships between these sets are taken into account, as failure to address a critical resilience issue could have a significant effect on the cyber security of the building and vice versa. The building specification should cover both cyber security requirements and their assurance across the building life cycle. Cyber security requirements of all building systems should be determined by the building owner or investor, based on proposed type and use of the building, proposed design of the building systems and their convergence or connectivity with systems outside the control of the building owner, and any anticipated needs of the occupants. The extent to which cyber security requirements are affordable should be determined by the business case for the construction or modification of the building and its intended or subsequent use and occupation. By identifying and incorporating appropriate cyber security requirements in the building specification, appropriate measures can be considered during design and implemented as part of construction and commissioning. These measures should take into account the level of system integration both between individual building systems and between the building systems and any corporate and operational systems used by the building occupants. If the building is being constructed on a speculative basis, i.e. without known occupants or tenants, any cyber security requirements will need to be reviewed and potentially updated as the building occupancy is established. 5.1.3 Protecting intellectual property and commercial data Widespread use of the Internet and email has revolutionised the way that organisations work. The construction industry makes extensive use of these technologies to support collaboration and data exchange on projects. When planning a major 9 24 CPNI Viewpoint 02/2010 – Protection of Data Centres: http://www.cpni.gov.uk/Documents/ Publications/2010/2010006-VP_data_centre.pdf [accessed 24 Apr 2013] © The Institution of Engineering and Technology construction project, whether new build or refurbishment, steps need to be taken to ensure that adequate cyber security measures are in place. In September 2012, CESG, CPNI, BIS and the Cabinet Office launched Cyber Security Guidance for Business, a guide aimed at industry Chief Executives and board members. The guide draws upon the technical foundations of the 20 critical controls (see Appendix B), and the executive summary indicates that the Government has seen determined and successful efforts to:10 ●● ●● ●● steal intellectual property; take commercially sensitive data, such as key negotiating positions; exploit information security weaknesses through the targeting of partners, subsidiaries and supply chains at home and abroad. As part of this guidance there are ten advice sheets,11 which outline actions and measures representing a good foundation for improving cyber security. These advice sheets for ten steps to cyber security cover: ●● ●● ●● ●● ●● ●● ●● ●● ●● ●● information risk management regime; network security; user education and awareness; malware prevention; removable media controls; secure configuration; managing user privileges; incident management; monitoring; and home and mobile working. Although the degree of implementation of these steps will inevitably vary between organisations depending on the specific risks faced, they do represent common key measures that may be used to protect the confidentiality, integrity and availability of corporate IT systems used during the specification phase. Protection of key information assets, e.g. plans, business cases, designs, tender specifications, financial models and contracts, is essential to maintain a sustainable and competitive business. This is an issue not only for the building owner or investor, but also for all professionals involved in the specification phase of a project, i.e. architects, lawyers, financial advisers, engineers and lead suppliers. This protection needs to encompass all aspects of confidentiality, integrity and availability. It could be as financially damaging to lose an opportunity through theft of sensitive data as it would be if critical documents were destroyed or corrupted prior to submission of a bid. Protecting commercially sensitive data is likely to become more complex with the increasing electronic integration of the design and construction supply chains. For example, the introduction of Building Information Modelling (BIM) will enable and require tighter integration of the architecture, engineering and construction industries.12 Cyber Security Guidance for Business, published by CESG, BIS, CPNI and Cabinet Office 10 Steps to Cyber Security Guidance Sheets, published by CESG, BIS, CPNI and Cabinet ­Office 12 ‘Building Information Modelling is digital representation of physical and functional characteristics of a facility creating a shared knowledge resource for information about it forming a reliable basis for decisions made during its lifecycle from earliest conception to demolition’: http://www.cpic.org.uk/en/bim/building-information-modelling.cfm [accessed 24 Apr 2013] 10 11 © The Institution of Engineering and Technology 25 This tighter electronic collaboration has the potential to speed up the design, reduce cost and improve competitiveness. However, it will also affect working practices, sharing of and access to information, intellectual ownership of designs, and the whole digital environment in the construction industry. There is a need for better cyber security during design and construction, as well as during subsequent operation. Unauthorised access to BIM data could jeopardise security of sensitive facilities, such as banks, courts, prisons and defence establishments, and in fact most of the Critical National Infrastructure. 5.2 Specifying appropriate resilience and cyber security The degree of resilience and level of cyber security protection required by a building should be determined by a number of factors, including: ●● ●● ●● ●● ●● ●● ●● ●● ●● ●● ●● location; physical environment; profile and attractiveness as a target; planned use/function, including particular safety or physical security requirements; nature of occupiers/users; any legal or regulatory requirements; whether it is a single or multi occupancy building; construction materials and overall design; complexity and criticality of building systems; degree/level of systems integration and convergence; degree of connectivity to systems outside the building. A project team that is developing a requirements document and business case during the specification phase needs to conduct an initial threat assessment taking into account these factors to identify any safeguards that may be required as part of the design and implementation. A decision to require implementation of a specific safeguard should be reflected in the specification by adding appropriate requirements. During the specification process, decisions should be made as to the acceptable degree of risks from individual threats. These decisions and any supporting analysis should be recorded, because subsequent design decisions may require individual threats to be reassessed. This audit trail will also support assumptions in the business case regarding any residual financial risk associated with individual mitigated resilience or cyber security risks and their ‘cost–risk balance’. Owners and occupiers need to understand the nature of any residual risks and level of financial exposure so that they can make informed decisions about the degree to which insurance cover may be required to protect against specific risks. During the requirements, concept and specification phase of a building project, the resilience and cyber security requirements need to be identified, taking into account the nature and purpose of the construction and the potential threats to the occupants and their business operations. The requirements should include appropriate protection for intellectual property, and commercial or sensitive information. 26 © The Institution of Engineering and Technology CHAPTER 6 Resilience and cyber security during design phase 6.1 Designing a resilient and cyber secure building 6.1.1 The design process As the building project moves through this phase, all aspects of the design will progress through a number of iterations as it evolves from an initial concept design to a detailed technical design. The latter often includes a substantial amount of work by specialist sub-contractors and suppliers. Throughout this phase, building requirements should be analysed, interpreted and elaborated by the project team, with design decisions progressing from an early strategic level to increasingly detailed technical decisions. Given this progressive evolution of a final design and a need to address resilience and cyber security requirements throughout, workstreams are required to: ●● ●● interpret resilience requirements and ensure that appropriate measures are designed in; and interpret the cyber security requirements and ensure that appropriate measures are designed in. As the design evolves, with key decisions being made and more detail becoming available, it is necessary to consider how well specific design options meet resilience and cyber security requirements. It is important that these requirements are addressed in the contractual frameworks as they develop. There will inevitably be tensions arising from the cost of additional space, systems and protective measures required to fulfil these requirements, particularly if these requirements are not well understood. For example, to deliver mechanical and electrical systems that meet Tier 3 requirements rather than Tier 1 (see Table 3 in Chapter 3), the additional systems cost and complexity may appear unnecessary to a designer. This is often the case where a project team is struggling to stay within a space and cost budget. However, achieving this level of resilience may be an essential feature of the delivered accommodation and is likely to be difficult and expensive to retrofit. Throughout this phase there is a need to review and update the threat assessments that were used to inform the development of the original resilience and cyber security requirements. As design work progresses, it should be possible to verify, through design assurance, that the proposed technical solutions continue to meet the requirements (see section 6.2). The design process needs to address the change management of requirements and ensure that there are mechanisms in place to prevent compromise of resilience and cyber security requirements. For example, a shift from single occupancy to multi-occupancy use, or change of use for part of the accommodation, could have significant implications depending on the planned use of the building. © The Institution of Engineering and Technology 27 Some technical proposals may require further threat assessments to be conducted, such as where the solution introduces a feature that was not taken into account during the original assessment. An example of this might be the proposed supplier of a major building systems component requiring remote electronic access to a system in order to monitor performance and provide remote diagnostics. If this aspect had not been considered at the specification stage it may require the cyber security requirements to be revisited. 6.1.2 Design considerations During the design of any complex building there will be a number of strategic choices that need to be taken at an early stage. These choices are often about the overall architecture, both at the physical level and for an intelligent building at the infrastructure and systems levels. Examples of architectures the systems design authority may have to consider for the building infrastructure include the following: ●● ●● ●● ●● truly converged networks, with logical partitions (VLANs) for functional separation of applications/data traffic; multiple physical IP networks for estate/premises management, electronic security, building controls, metering and business productivity applications (the networks may be converged in the same physical spaces or managed in separate (or caged) spaces); bespoke data communications for building automation/controls, electronic security and metering applications, rather than IP networks; use of physical (cable or fibre) versus wireless networking infrastructures. The decisions about the most appropriate technology to use should not be made solely from a cost and performance perspective, but also need to take into account factors such as the safeguards required when IT infrastructure, telecoms and IT applications are partially or fully outsourced. As part of an integrated design there may be requirements to interconnect systems with differing criticalities or security requirements. The standard ANSI/ISA-99 (Security for Industrial Automation and Control Systems) introduces the concept of Security Zones and Conduits to control access between Zones. The standard defines a Zone as a grouping of logical or physical assets that share common security requirements. Each Zone will require a Security Level Target (SLT) based on factors such as equipment criticality and consequence of loss or failure. Equipment in a Zone has a Security Level Capability (SLC) only if that capability is not equal to or higher than the SLT, in which case extra security measures, such as additional security technologies or policies, must be provided. The Conduits between Zones should provide protection by resisting denial-ofservice (DoS) attacks, preventing transfer of malware, shielding equipment in the Zone and by protecting the integrity and confidentiality of network traffic. Any communications between Zones must be via a Conduit. The use of Conduits can increase the SLC for all equipment in the connected Zone. Figure 4 illustrates an approach using Zones and Conduits to allow data from the building systems local site computer to the business systems. In this illustration a data diode (a one-way traffic regulator) is used to create a one-way flow of data from the local site computer to ICT systems in a DMZ (‘demilitarised zone’) protected by a firewall. The business systems are able to communicate via the firewall to collect 28 © The Institution of Engineering and Technology data, but due to the use of the data diode they cannot communicate with or control the building systems. Business System Centralised ERP, ERM, CRM, C&C, Helpdesk ICT System Level 5 Figure 4 – Security Zones and Conduits DMZ Office Automation, Media, Telephony Building Systems Level 4 Data Diode Local Site Computer Level 3 Firewall Control Systems PLC, SCADA, ICS Level 2 Critical I/O Infrastructure Level 1 Sensors, Actuators, Motors Level 0 Figure 4 demonstrates a building management systems (BMS) application with network segregation (the firewall) and secure gateway protection (the data diode) as an example of securing safety critical BMS infrastructure from external threats and vulnerabilities in a manner compliant with ANSI/ISA-99. 6.2 Design assurance In complex technical systems a large percentage of failures and anomalies that occur during implementation and operation are attributable to errors or omissions originating in the design process. By implementing a design assurance process, steps can be taken to identify and resolve undiscovered or unidentified design risks and issues, with the aim of addressing them as early as possible in the design phase. The design assurance process has two principal functions: ●● ●● to ensure that the proposed design appropriately addresses the specified requirements; to ascertain that the requirements and the proposed design are complete and have not introduced any new or unforeseen risks. A design assurance process should be an independent, formal, systematic process that complements the design team’s work and increases the probability that a design conforms to agreed requirements and meets the foreseeable operational © The Institution of Engineering and Technology 29 needs of the building’s owner, occupiers and users. At this stage it should be an exercise based on examination of a range of material including architectural and engineering drawings, systems models, technical analysis and specifications, security and implementation strategies. The design assurance aims to ensure that the resilience and cyber security requirements are addressed adequately by the design and associated engineering documentation supporting the procurement, manufacture/build, configuration, test/acceptance, operation and maintenance of the building and its systems. During the design phase of a building project, appropriate solutions to the resilience and cyber security requirements should be developed. As part of a design assurance exercise the proposed design should be assessed to ensure that it has not introduced any new or unforeseen risks. Assuring the continuity of intent through the construction phase may require investment in competent resources. 6.3 Protecting intellectual property and commercial data As outlined in section 5.1.3 there is a continuing need to protect adequately the intellectual property inherent in the design and the commercial confidentiality of any procurement processes and contract negotiations. The design phase is likely to see a significant increase in the number of collaborating organisations, particularly once specialist contractors become involved in the design process. 30 © The Institution of Engineering and Technology CHAPTER 7 Resilience and cyber security during construction 7.1 What needs to be addressed during construction? A particular challenge during this phase is establishing and maintaining appropriate security for the technical infrastructure and building systems without unduly hindering the construction and fit-out teams. Resilience and cyber security consequences of an action or inaction by a contractor may not be apparent initially but could have serious cost and schedule implications if an agreed safe and secure design is compromised, requiring rework during occupation. A number of issues need to be addressed regarding the resilience and cyber security of the building during construction: ●● ●● ●● ●● managing the supply chain; monitoring design integrity; maintaining physical security; implementing systems security. Handling of these issues may be complicated by contractual relationships between the building owner, the design team, construction contractors and the planned building occupants. The situation may be exacerbated if it is unclear who is responsible for decisions and governance related to the building’s resilience and cyber security. During construction of the building, resilience and cyber security issues need to be addressed while managing the supply chain, monitoring design integrity, maintaining physical security and implementing systems security. 7.2 Managing the supply chain The transition from design to construction phase will result in a significant expansion in the number of individuals involved in the project. Contracts and sub-contracts are let for materials, systems and services required for construction, fit-out, commissioning and preparation of the accommodation ready for occupation and use. The contracts and sub-contracts need to address the security and resilience issues, with steps taken to ensure that they are handled in a consistent manner and managed at the most appropriate level in the contracts hierarchy. It is important that they are not simply pushed down the contractual chain, because small sub-contractors may have little interest in, understanding of or control over key vulnerabilities and design decisions. Site offices will have a steady turnover of personnel, bringing with them a variety of personal and storage devices, and connectivity to a range of external systems. The contracts and site operating procedures should define responsibilities and © The Institution of Engineering and Technology 31 acceptable practice to address the risks associated with the frequency of personnel changes. These controls should be applied to permanent staff of all construction and site contractors and to all agency personnel. This may have human resource implications if changes are required to standard employment contracts and acceptance of monitoring of systems use. Appropriate measures should be established to protect intellectual property and commercial data, both from threat of theft and from unauthorised change or destruction. These threats can arise from insiders, external hackers and the introduction of viruses or malware onto the site or suppliers’ equipment and networks. On a large or complex site, controlling these threats is difficult given the number of companies and contractors involved, and the inevitable differences in contractual terms and responsibilities. A potential lack of clarity as to who is responsible for cyber security within the overall construction team may further exacerbate the problem. There is an increasing need to ensure quality and integrity of all supplied equipment, systems and software. With initiatives like the UK Trustworthy Software Initiative, some steps are being taken to improve the quality and integrity of software. With pressure to keep costs down, suppliers are encouraged to source ‘best value’ hardware and software; this is often interpreted as the cheapest source of a particular component, software package or piece of technical equipment. However, this increases the risk that the purchased item may be counterfeit. A study by Microsoft found that cyber criminals had infiltrated an insecure supply chain to introduce counterfeit software embedded with malware onto brand new computers.13 Microsoft claim that 20 per cent of the computers sampled were infected with malware.14 Counterfeiting is not limited to software. Studies by the Alliance for Gray Market and Counterfeit Abatement (AGMA) indicate that there is a significant volume of counterfeit technical hardware sold every year.15 It is estimated that up to 10 per cent of IT products sold may be counterfeit. A report by the US Bureau of Industry and Security on behalf of the US defence industry found that ‘The rise of counterfeit parts in the supply chain is exacerbated by demonstrated weaknesses in inventory management, procurement procedures, recordkeeping, reporting practices, inspection and testing protocols, and communication within and across all industry and government organizations.’16 This is an important issue for intelligent buildings because the use of counterfeit components could lead to premature systems failures and create significant cyber security weaknesses in the delivered systems. 7.3 Monitoring design integrity To address implementation issues, changes are often made to the design during construction. These changes may be required to address new business requirements, to overcome defects or shortcomings in the physical design or to http://blogs.technet.com/b/microsoft_blog/archive/2012/09/13/microsoft-disrupts-theemerging-nitol-botnet-being-spread-through-an-unsecure-supply-chain.aspx [accessed 24 Apr 2013] 14 http://www.youtube.com/watch?v=mP4LwIPzcvU [accessed 24 Apr 2013] 15 http://www.agmaglobal.org/cms/uploads/news%20releases/current/Four%20Pillars%20 FINAL%203-1-12.pdf [accessed 24 Apr 2013] 16 http://www.agmaglobal.org/cms/uploads/BIS%20Survey%20%28January%202010%20 final%29.pdf [accessed 24 Apr 2013] 13 32 © The Institution of Engineering and Technology cater for errors that are expensive to fix. For example, when contractors come to install network cabling they might discover a failure to provide a specific cable route for diverse cable routing, and the rectification of this problem may involve significant additional structural work. It is essential that design change management processes incorporate appropriate assessment of any impacts on resilience and cyber security. In this cable routing example, a failure to provide diverse routes may have significant implications for resilience of affected systems, allowing connections to be disrupted in the event of a fire, accidental damage to a single cable leading to denial of services or external tampering. This may not seem a significant issue to a contractor responsible for the physical works, but may be very significant for facilities managers and building occupiers. Following physical installation of building systems, there will normally be a period where systems are configured, tested and commissioned with the aim of achieving contractual acceptance and handover to the building owner. This programme of work should be designed to assure the integrity of the design from an overall integrated systems perspective rather than a purely physical perspective. If schedule overruns occurred during the physical construction of the building there may be significant pressure to curtail these activities and then fix any problems during operational use of the building. For buildings with significant resilience or cyber security requirements, curtailing these activities will increase the risk that the system design has not been verified and that operational use may be disrupted by foreseen but untested failure scenarios. 7.4 Maintaining physical security For health and safety reasons and to prevent theft of construction materials, most building construction sites have a reasonable level of physical security. Although this may be adequate to prevent theft of large items, the building and corporate IT systems will also contain a range of relatively small, high-value components. Once installation of these systems commences, consideration should be given to providing additional security for IT equipment, plant-rooms and communications/ networking rooms. This security will also prevent unauthorised access to these systems during the configuration, testing and commissioning activities, i.e. prior to the handover of the building to its occupiers and their support teams. From a cyber security perspective the prevention of ‘tampering’ or addition of unauthorised software or other components is as crucial as prevention of theft. 7.5 Implementing systems security During the technical implementation of the systems, i.e. once the equipment has been turned on and while it is being tested and configured, systems are vulnerable to hostile reconnaissance and tampering to install backdoors17 and malware. So even though systems are not yet fully operational, steps must be taken to prevent reconnaissance, attacks or future compromise. Many common IT components are supplied from the manufacturers with standard administration accounts preconfigured to use default passwords. This is a common 17 A ‘backdoor’ is a means to access a computer program or system that bypasses security mechanisms, sometimes inserted by programmers to enable access for troubleshooting, but also created by some malware © The Institution of Engineering and Technology 33 cause of security weakness in deployed systems, because default passwords are often widely known and many can be found on the Internet. In addition to this basic account/password weakness, steps need to be taken to address other important initial security tasks, such as removing or disabling guest accounts. It should not be assumed that because the building is not yet occupied, its systems will not come under external scrutiny. Any new connection to the Internet is likely to be scanned as soon as it becomes available. Some of these scans are relatively benign, e.g. those of common search engines looking for new web content. However, other scans by specialist search tools, e.g. Shodan,18 or by potential hackers who are sweeping through particular TCP/IP address ranges, are potentially more serious. The problem is not limited to Internet connections, because an unsecured wireless access point or dial-up modem may be used to gain unauthorised access to the network. Securing the networks and all external connections at an early stage reduces the risk of accidental data loss, and prevents reconnaissance during system configuration, testing and commissioning. 7.6 Preparing for handover to operations Before completing this phase a critical step is the preparation and handover of the systems documentation to the operations team employed by the building owner or occupier. The design documentation should reflect the ‘as built’ building; i.e. all approved changes have been incorporated into the design drawings and specifications. Without this handover of accurate information it is impossible to operate an effective change management process during subsequent building occupancy. There is also an increased risk of system integrity being compromised during maintenance or systems changes, thus reducing resilience and creating the potential for cyber security breaches. http://www.shodanhq.com [accessed 24 Apr 2013]: Shodan is a tool to search for specific computers (routers, servers, etc.) 18 34 © The Institution of Engineering and Technology CHAPTER 8 Resilience and cyber security during operations 8.1 Managing and maintaining resilience The needs of the building’s users will change and develop over time. It is therefore important that the resilience requirements of an intelligent building are regularly reviewed to ensure that the building and its systems continue to meet the operational needs. Management of this ongoing monitoring can be handled through the business continuity plans for the building and its occupiers. When undertaking the reviews it is important to revisit the operational and business criticality of both discrete elements of the building and the various business and corporate IT systems that relate to or are located in the building. It is not uncommon to find that over time part of the accommodation, a system or process has become business critical and that it is not adequately protected from a business continuity perspective. This unforeseen or emergent loss of resilience can be addressed once it has been identified as part of a business continuity review. When the building is in operational use, its resilience should be proactively managed to prevent any unforeseen or emergent loss of resilience and to identify any additional requirements arising from changes in the building’s use. 8.2 Managing and maintaining cyber security Once it becomes operational the building is exposed to a diverse range of threats. Some will have been foreseen and appropriate measures may be in place to mitigate the risk, whereas others will be new or unforeseen with no effective countermeasures in place. From a cyber security rather than resilience perspective, the majority of threats are related to attempts to compromise the system, which may originate from threat agents that are insiders or from external parties or systems. In an intelligent building, maintaining resilience and cyber security should be a multidisciplinary team effort involving teams managing building and corporate IT systems and to varying degrees the cooperation of building occupants and users, support contractors and suppliers. As cyber security issues are rapidly evolving, it is likely that many of the technical threats the building will face would not have been seen or experienced at the time the building was designed. The 20 critical controls, which are summarised in Appendix B, are a list of technical measures that should be implemented by organisations in order to improve cyber defences. The controls can be visualised as providing protection by ●● ●● ●● ●● detecting reconnaissance; preventing unauthorised access or actions; detecting unauthorised access or actions; mitigating cyber security events. © The Institution of Engineering and Technology 35 The building’s IT systems are at risk from the outset. Application of the 20 critical controls (see Appendix B) can provide protection by detecting reconnaissance, preventing and/or detecting unauthorised access or actions, and mitigating cyber security events. 8.3 Detecting reconnaissance Before many cyber security incidents occur there may have been various reconnaissance activities by the perpetrators, where the threat agent is looking for weaknesses to exploit or material to steal. The reconnaissance may involve: connecting an unauthorised device to the network or systems; introducing unauthorised software to allow weaknesses to be probed; or installing backdoors or Trojans. To protect the network and systems it is important to know whether reconnaissance activities have occurred. This information may also assist in the mitigation and resolution of any subsequent events. Here are some specific control measures that can assist in the detection of reconnaissance: ●● ●● ●● ●● ●● creating and maintaining an inventory of authorised and unauthorised devices; creating and maintaining an inventory of authorised and unauthorised software; performing continuous vulnerability assessment and remediation; implementing secure network engineering; performing penetration tests and red team exercises. 8.4 Preventing unauthorised access or actions In the event that a threat agent is trying to compromise the system, the threat may be partly mitigated by secure configuration of the organisation’s networks and systems. For example, the failure to remove or disable guest accounts, the use of default passwords on systems components or the failure to limit access to sensitive files make it easier for threat agents to achieve their objective. Specific control measures that can be used to prevent unauthorised access or actions include the following: ●● ●● ●● ●● ●● ●● ●● implementing secure configurations for hardware and software; implementing secure configurations for network devices; vulnerability assessment and remediation; addressing application software security; supplying wireless device control; implementing malware defences; limiting and controlling network ports, protocols and services. 8.5 Detecting unauthorised access or actions To minimise the impact of any cyber security event it is important that unauthorised access or actions are detected as early as possible so that a suitable response can 36 © The Institution of Engineering and Technology be initiated. For example, if attempts are being made to steal intellectual property, early detection may allow preventative measures to be taken to minimise the loss. Specific control measures for preventing unauthorised access or actions include the following: ●● ●● ●● ●● ●● maintenance, monitoring and analysis of audit logs; implementing boundary defence; controlled use of administrative privileges; controlled access based on the need to know; performing penetration tests and red team exercises. 8.6 Mitigating cyber security events Should a cyber security event occur, the damage and disruption may to some extent be mitigated by an appropriate response from the organisation. The response will be determined by the skills and training of the team handling the event as well as the ability and preparedness of the organisation to recover systems. It is not only a case of having processes and procedures in place, but also the ability of the personnel involved to implement them correctly and appropriately under pressure. Here are some specific control measures that can be used to mitigate cyber security events: ●● ●● ●● ●● ●● regular security skills assessment and appropriate training to fill gaps; maintaining a data recovery capability; account monitoring and control; implementing data loss prevention; incident response and management. The manner in which incidents are handled can have a significant impact on the damage or disruption that occurs. It is important that there is clear assignment of responsibility and roles, that procedures have been tested and that key staff know what is expected of them during and after an incident. 8.7 Addressing the insider threat The term ‘insider threat’ applies to a malicious threat to the organisation that originates from people within the organisation. These people can be employees, former employees, contractors or suppliers, who are familiar with the organisation’s security practices, policies and procedures, and who have or had access to data and the organisation’s systems. An insider threat can involve a range of actions causing financial or reputational loss, including fraud; theft of intellectual property, commercially sensitive or personally identifiable data; or sabotage of corporate IT, building or industrial control systems. Insiders may also be implicated in attacks by third parties (criminals, terrorists or competitors seeking business advantage). In these cases the insider may provide assistance to circumvent defences or information on specific measures in place to counter threats. © The Institution of Engineering and Technology 37 The damage from insiders can be significant because they may have both detailed knowledge of the sensitivity of the systems or data they are attacking and privileged access that gives them the ability to bypass many protective measures. To address the insider threat, appropriate personnel security measures are required, not just during recruitment processes but on an ongoing basis. Appropriate measures that should be put in place with regard to existing staff include the following:19 ●● ●● ●● ●● ●● ●● ●● identifying changes in circumstances that make an individual more vulnerable; access controls to manage staff access to company assets; security passes and access privileges, i.e. controlling access to buildings, sensitive places and systems, so that access is limited to those who genuinely need it; management practices, e.g. the implementation of appropriate personnel security procedures and availability of confidential reporting mechanisms; manipulation, i.e. ensuring that staff are aware of social engineering techniques and the mechanisms to defend against such attacks; protective monitoring of employees’ use of IT systems, which in the UK should be in accordance with the Data Protection Act – Code of Practice: Monitoring Workers’ Activities; investigation of cases of non-compliance with security rules to ascertain the facts and take appropriate follow-up action. 8.8 The cyber security responsibility paradigm An issue that exists in any building where there is a converged infrastructure is allocation of responsibility and the boundaries of influence. For example, in Figure 5 where building management, communications and corporate IT services are all delivered using a structured cabling infrastructure, it may be unclear who is responsible for the management of it. Responsibility could rest with the head of IT or with a facilities manager. If there are two cabling systems in use there is an issue as to whether they are physically separate or whether they share cable risers and patch rooms. If they share any space, measures should be implemented to prevent unauthorised connection of the two systems. Where a building is multi-occupancy, this fact changes the responsibility of the building’s facilities manager and the relationships with those responsible for management of tenants’ IT infrastructure. Further advice is available at http://www.cpni.gov.uk/advice/Personnel-security1/Ongoingmeasures [accessed 24 Apr 2013] 19 38 © The Institution of Engineering and Technology IT departments Data centres Tenants areas of assumed responsibility for their own cyber security Users Figure 5 – Cyber security responsibility paradigm CCTV and surveillance Authentication Access control BMS Comms Comms distribution and management Developers/architects/engineers/owners/landlords area of ‘policy development’ for cyber security on areas under direct control Network External supply Power Power management In a complex multi-occupancy building, it is reasonable to expect the building operators (who could be an owner, developer or landlord) to have responsibility for supply and management of ‘services’ over and above their obvious interest in the BMS, fire alarms and building security systems. If responsibilities are allocated as shown in Figure 5, building operators must take responsibility for cyber security of the building’s technical infrastructure, including delivery of communications and networks to their tenants. The tenants are then responsible for cyber security of their own ‘domain’ at their boundary, serviced by the building infrastructure, i.e. security of their IT equipment, applications and data storage. To manage this interaction between infrastructure and business systems, there should be clear operating procedures and agreed ‘best practice’ in respect of connection to and use of the infrastructure. These procedures should be based on recognised standards for information security management, e.g. ISO 27001. © The Institution of Engineering and Technology 39 Adoption of a converged IT infrastructure and the integration of building and corporate technologies create issues related to allocation of responsibility and boundaries of influence. The interaction between infrastructure and business systems should be based on clear operating procedures and agreed best practice regarding the technical integration. 8.9 Legal issues To maintain the security of the converged systems over the operational life of an intelligent building there will be a continuing need to install countermeasures. If the building is not owner occupied, the lease should include terms that allow the tenants to obtain the landlord’s permission to install the countermeasures and for the landlord to provide reasonable support and assistance in their design and deployment. Where the landlord, or the landlord’s agents or contractors, have access to the converged systems, the lease/tenancy agreements should include appropriate provisions in respect of data protection, human rights (e.g. monitoring and CCTV surveillance) and any requirements for employment contracts to include provisions regarding matters such as appropriate use, confidentiality, etc. Some of these provisions will also be applicable to visitors to, or users of, the building. For example, where public WiFi access is provided, users should be required to agree to specified conditions of use. Without such agreement there is an increased risk of malicious claims or prosecution for data protection breaches. 40 © The Institution of Engineering and Technology CHAPTER 9 Managing change – impact on resilience and cyber security Change is inevitable during the operational phase of a building’s life cycle. When changes are made there is a risk that they will compromise the resilience and/or cyber security of the building. Impact assessment of building, infrastructure and systems related changes should therefore include any impact on both resilience and cyber security. It is essential that assessment addresses not only changes to systems and infrastructure, but also physical changes to the building and changes to its local environment. A simple internal change, e.g. a proposal to move internal partitions, may result in unsecured cable ducts becoming accessible in a public area, where previously they were located within a secure area. The implication of this change, which may not have directly affected any IT systems, is that the structured cabling could be exposed to an increased risk of damage or tampering. Impact of this change may not be immediately apparent to the person making the request and may only be detected on detailed examination of building and infrastructure plans. It is essential that the detailed plans are an accurate reflection of the ‘as built’ infrastructure and not what was originally designed but not built. The detailed plans must be maintained to reflect the implementation of cumulative changes, again with the emphasis on what was actually changed. Another example is partial decommissioning of a building, where an area is taken out of operational use to be refurbished or remodelled. The presence of construction contractors in a decommissioned area can increase the risk of damage to building systems, e.g. power, structured cabling, alarm systems, etc. These resilience risks need to be assessed to determine their impact and the potential for business disruption or loss of security. Common problems can include power outages due to the actions of a contractor and false fire or security alarms arising from damage to circuits or sensors. Before an area is decommissioned and handed over for work to commence, steps should be undertaken to ensure that cyber security is maintained, including the following: ●● ●● ●● ●● ●● ●● removal and secure storage or disposal of any special security equipment, e.g. cryptographic systems; removal and secure storage or disposal of any systems used to process or store personally identifiable or commercially sensitive data; removal and secure storage or disposal of all other IT equipment in the area; decommissioning of any public telecommunications network links/services; decommissioning of any network or communications links to other company/ organisation sites; decommissioning of any network or communications links to building management systems; © The Institution of Engineering and Technology 41 ●● ●● removal and secure storage or disposal of all used media, paper records, etc. containing personally identifiable or commercially sensitive data; re-routing of sensitive communications and network cabling routes. During the construction and fit-out, and prior to occupation of the area, the security measures outlined in Chapter 7 should be applied. When changes to the building, its infrastructure, systems and use are being planned and implemented, the impact on resilience and cyber security should be assessed and appropriate steps taken to address any new or modified risks. This should include assessment of the impact of any decommissioning. 42 © The Institution of Engineering and Technology CHAPTER 10 Resilience and cyber security during decommissioning If an intelligent building is no longer required it should be decommissioned prior to sale or demolition. This will ensure that appropriate steps have been taken to maintain the security of any personally identifiable or commercially sensitive data, without impacting on other ongoing operations of the building owner, support contractors or occupants. The process for managing the decommissioning of an entire building is similar to a partial decommissioning, but should address all connectivity to the building that is not required to maintain it in a safe and secure state until it is reoccupied, refurbished or demolished. When an entire building is being decommissioned, the impact of changes on infrastructure and systems should be assessed and a decommissioning plan drawn up that takes account of system and infrastructure dependencies. The sequence in which decommissioning changes are made is significant. They should be planned carefully so as to minimise the risk to resilience and cyber security throughout the process. The insider risk should be assessed throughout the planning and implementation of the decommissioning programme. The changes in personal circumstances brought about by the closure of the building may increase the risk of security breaches or careless mistakes by disaffected employees or contractors. If the building is leased rather than owner occupied, at the end of a lease provisions covering dilapidations will mean the lessee has to restore the building to the state that it was in when first occupied. Removal of security systems, equipment and cabling, and the inevitable need to make good any damage caused during their removal, can be expensive. Leaving the items behind may represent a windfall for the landlord, and may also involve costly decommissioning processes to ensure that all personally identifiable data is removed from the systems. These removal and decommissioning costs can represent a disincentive for tenants to install such systems and thus increase the risk of the converged infrastructure being compromised. © The Institution of Engineering and Technology 43 CHAPTER 11 Relevant standards This chapter lists the standards that are relevant to the design and operation of an intelligent building. 11.1 Security standards 44 Reference Title/Description ISO/IEC 13335 IT Security Management – Information technology – Security techniques – Management of information and communications technology security ISO/IEC 15408 Common Criteria for Information Technology Security Evaluation ISO/IEC 27001 Information security management systems requirements ISO/IEC 27002 A code of practice for information security management IEC 62443 Security for Industrial Automation and Control Systems ANSI/ISA-99.00.01 Part 1: Terminology, Concepts, and Models PCI DSS Payment Card Industry Data Security Standard NIST IR 7176 System Protection Profile – Industrial Control Systems – V1.0 Incorporates industrial control systems into Common Criteria NIST SP 800-82 Guide to Industrial Control Systems (ICS) Security NIST SP 800-61 Computer Security Incident Handling Guide PAS 97: 2012 A specification for mail screening and security BS 7799 Part 3 – Guidelines for information security risk management RFC 2196 Site Security Handbook From IETF (The Internet Engineering Task Force) RFC 2350 Expectations for Computer Security Incident Response From IETF (The Internet Engineering Task Force) HMG IA Standard No 1 Technical Risk Assessment – IA Standard for Risk Managers and IA Practitioners responsible for identifying, assessing and treating the technical risks to ICT systems and services handling HMG information © The Institution of Engineering and Technology Reference Title/Description Supplier Information Assurance Assessment Framework and Guidance Guidance on how the Supplier Information Assurance Tool (SIAT) question sets and tool specification can be used by suppliers of key business services to the Government Supplier Information Assurance Tool (SIAT) – Summary Brief summary of the SIAT Community of Interest set up to drive development of a supplier Information Assurance model. ISAB Approved CESG IA Top Tips 2010/01 – DDoS – Distributed Denial of Service 2010/02 – Importing Data from External Networks 2010/03 – Basic Web Server Security 2011/01 – Trusted Platform Modules 2011/02 – Delivering Services Online 2011/03 – Mitigating Attacks to Online Services 2012/01 – Network Access Control 11.2 Operational and safety standards Reference Title/Description IEC 61508 Functional Safety of Electrical/Electronic/ Programmable Electronic Safety-related Systems ISO 20000 IT Service Management Standards BS 15000 Based on Information Technology Infrastructure Library (ITIL) COBIT 5 A Business Framework for the Governance and Management of Enterprise IT [Control Objectives for Information and Related Technology (CobiT)] © The Institution of Engineering and Technology 45 11.3 Technical standards 46 Reference Title/Description ISO 7498 Information Technology – Open System Interconnection Part 1 – Basic Reference Model Part 2 – Security Architecture Part 3 – Naming and Addressing Part 4 – Management Framework ISO/IEC 14543 Information Technology – Home Electronic System (HES) Architecture A set of common open standards include the KNX standard, which has been approved as ●● European Standard (CENELEC EN 50090 and CEN EN 13321-1) ●● Chinese Standard (GB/Z 20965) ●● US Standard (ANSI/ASHRAE 135) IEC 14908.1 LonTalk ISO 16484-5 BACnet X10 An international and open industry standard for communication among electronic devices used for home automation IEC 61158 PROFIBUS – Process Field Bus A standard for field bus communication in automation technology and used by Siemens MODBUS A serial communications protocol published by Modicon (now Schneider Electric) in 1979 for use with its programmable logic controllers (PLCs) RP-570 RTU Protocol based on IEC 57 part 5-1 (present IEC 870) version 0 or 1 A communications protocol used in industrial environments to communicate between a front-end computer and the substation to be controlled It is a SCADA legacy protocol and is based on the low-level protocol IEC TC57, format class 1.2 IEC 60870 – Part 5 Telecontrol Equipment and Systems A communication profile for sending basic telecontrol messages between two systems which uses permanent directly connected data circuits between the systems ZigBee A low-power wireless mesh network standard © The Institution of Engineering and Technology APPENDIX A Intelligent building case studies A.1 Office building In the office environment there has been an increasing convergence of infrastructure and systems driven by the economic and environmental pressures to operate the accommodation efficiently, from both user and energy perspectives. The levels of convergence achieved vary considerably, depending on the objectives of the building’s owners, operators and occupiers. Figure 6 illustrates the wide range of systems that are now typically managed over an IP-based infrastructure. Converged vs multiple IP propriety networks Building Services Fire/Life Safety Interface annunciation View functionality only Figure 6 – Convergence of IP-based infrastructure HVAC Air-handling units VAV and CV boxes Exhaust fans Chilled water plant Hot water plant Energy control CO monitoring Air quality Elevators Elevator retrieval on demand maintenance Lighting Schedules Scenes Shades Light-level sensing Occupancy sensing Accommodation Services Security Intrusion detection Energy Management Utility monitoring (electric/water/gas/oil) Utility purchasing Back-up generation 24/7 Monitoring Plant management Condition monitoring Parking garage utilisation Access/Video Building/doors/garage Elevator Occupied suites Asset and personnel tracking Multiple control environments Business Services Communications Voice/video/data Central Monitoring and Control Networking Fixed/WiFi © The Institution of Engineering and Technology 47 Traditionally the disparate building systems (e.g. HVAC, CCTV, access control, lighting, energy management) all had their own control, and were often implemented using different methods of cabling. The first step in the convergence process is typically the movement of these systems onto a common cabling and TCP/ IP-based network infrastructure. This convergence has led to the adoption of open standards (e.g. LonWorks® and BACnet®)20 to support system interoperability and to allow upgrade or replacement of individual sub-systems over the building life cycle. Adoption of this building systems architecture allows the use of a common centralised building management system (BMS) to control the individual building systems. These central control facilities are typically implemented via a single browser-based operator interface. Where the building is part of a campus or its facilities management is outsourced, the use of a centralised BMS enables the remote monitoring of the facility via the Internet. Following on from the convergence of building systems, there are opportunities to derive greater efficiency from the installed building systems. For example, the building’s access control system, passive infrared (PIR) occupancy sensors and images from the security CCTV system may be used to determine when an area is occupied, allowing the level of lighting and environmental conditioning to be automatically controlled. Common examples are in server rooms and network/ cabling rooms, which generally operate in a lights-out mode with fire suppression systems enabled. When a technician enters the room the access control system can automatically turn the lights on and turn the fire suppression system off. This level of complexity may bring significant convenience benefits but also carries unintended vulnerability. From the building users’ perspective, the systems convergence may be visible from the use of smart ID cards for access control, attendance management and retrieval of printing jobs. The shared use of the ID card for these tasks requires interaction between the access control system (a building system), the attendance system (part of the HR systems) and printer queues (part of the corporate IT system). More complex examples include the automated reservation and management of meeting rooms; e.g. building users may book a meeting room using their office calendar application. This data is stored in a central application database and is accessed by the building management system, which then reduces energy consumption by turning off non-essential equipment in the room and limiting the environmental conditioning until the room is required and the first meeting attendees arrive. This example requires interaction between building systems and the room-booking service, which may be part of the organisation’s email, i.e. a corporate IT system. The increasing emphasis on the environment has led organisations to monitor their energy consumption and carbon footprint, with some displaying information on this aspect in the reception areas of their buildings. This information typically originates in the building systems but is displayed using the corporate IT network. If some of the developing cloud-based utility management services are used, it is possible that the data from the building system may have been passed over the Internet to a cloud service provider, processed and then returned for display via the corporate intranet. With the increasing use of wireless networks in buildings, new opportunities have arisen for convergence of systems: e.g. the use of wireless surveillance cameras 20 48 LonWorks and BACnet are communications protocols used to control and automate ­various functions within a building © The Institution of Engineering and Technology and web-enabled tablet devices or smartphones to allow security guards to view live video feeds as they move through the building. These examples have focused on the convergence and systems integration at a building level. As smart cities start to develop, there will be increasing interaction between the building and its environment. This could include sharing data with other local buildings, the local transport infrastructure and the smart electricity grid. These interactions may be passive, i.e. simply making available information such as the current power consumption of the building, or active, where the building systems respond to local energy demand and shed non-critical loads to stay within the contracted supply tariff. A.2 Sports stadiums Modern sports stadiums are complex buildings capable of hosting entertainment events and conferences and providing banqueting and catering services for thousands of people. In many ways they are akin to a large town or small city. The building contains a vast range of services including heating, ventilation, air conditioning (HVAC), lighting, building management systems (BMS), fire, security (typically comprising access, CCTV and public-address systems), lifts, escalators, scoreboards, telephones, Internet access for press and visitors, integration with business systems (e.g. supply chain and payroll), electronic point of sale (EPOS), ticketing and turnstile systems. During events there is often a demand for access to large-format video, master aerial television and broadcast systems. To support these services, hundreds of kilometres of optical fibre and network cabling are installed in the stadium, with dozens of communications rooms housing networking equipment. These networks will facilitate the use of IP data, IP telephony and video communications both within the stadium and providing external links to law enforcement and other emergency authorities. Although most of the services may make use of a common cabling infrastructure, the fire systems will require the use of separate fire-rated cabling. In addition to the systems and infrastructure using fixed cabling there will also be wireless-based systems, including wireless networking, use of private radio systems by stewarding and security personnel, and the radios used by law enforcement and emergency services. A modern stadium could have up to two hundred building management systems monitoring and controlling the operation of thousands of heating, lighting, ventilation and air-conditioning devices. For efficient operation of these during an event it is common practice for all these technical operations to be integrated onto a single management system to provide the event, security and police control rooms with a common single view of the building’s operations. For large public events, with tens of thousands of spectators, security and public safety are paramount. The stadium security system will typically manage digital video feeds from over a hundred cameras and this may include feeds from police or local authority systems covering areas outside the stadium. The system will also monitor and control access through all doors and turnstiles, as well as escalators and lifts. Crowd messaging can be critical for the smooth handling of entry to and egress from the stadium, and to manage unforeseen incidents. The messaging will use the public address/voice announcement system and any large-format video screens, both of which are controlled via the integrated building systems. © The Institution of Engineering and Technology 49 The operation of the stadium as an intelligent building using a converged IP-based infrastructure and integrated systems, as illustrated in Figure 7, can offer significant commercial and operational advantages to the stadium operators and owners. Access to up-to-date information about incidents in or near the stadium can increase public safety and security, making it easier to manage the large spectator volumes in the event of an emergency. The flexibility of the systems also allows the flexible use of the venue, enabling quick turnarounds between events without the need for extensive reconfiguration of the technical and support system. Heating, ventilation and air conditioning (HVAC) Lighting Public address and voice announcement (PA/VA) Fire detection and alarms Building Services Lift and escalator management Structured cabling Voice and data communications Wireless systems (radio, WiFi, etc.) Business systems Access control Large format video/scoreboards Security closed circuit television (CCTV) Stadium control room Business Services Police control room and links to external authorities People and asset location and management A.3 Perimeter protection Master aerial television (MATV) Energy management Digital video surveillance Accommodation Services Transport terminals An increasing demand for transport at both international and national levels places pressure on transport hubs, e.g. airports and railway stations, to handle passenger volumes efficiently and safely. In response to economic and environmental factors, the owners and operators of these terminals have sought to reduce the cost of ownership and operation. Their solution has been to seek innovative IT-enabled solutions to facilitate energy savings and increase the capacity of the terminal buildings. Given the increasing levels of systems integration and the complexity of the systems, transport terminals should be regarded as intelligent buildings, where the combination of technologies and interconnected systems are essential for the smooth operation of the transport operation. Within a transport terminal, the IT-based systems typically comprise four layers: ●● ●● 50 A physical layer, which includes the cable and fibre infrastructure used within and between the systems; A networking layer operating over a combination of the physical layer and wireless to deliver local area and wide area networking (LANs and WANs) and voice communications; © The Institution of Engineering and Technology Figure 7 – Typical IP-based systems in a modern sports stadium ●● ●● An application layer comprising a range of applications delivering operational functionality, including passenger processing and ticketing systems, luggage and freight handling systems, business and financial systems, safety and security systems, and the facilities management systems (e.g. building and energy management); A systems integration layer, which enables sharing of data between the various applications and with external systems, e.g. international air traffic control and flight reservation systems. With the pressure to reduce costs, new and refurbished terminal buildings will typically use a common physical layer to support a variety of operational, business and facilities management systems. Although doing so makes it easier to manage and reconfigure the flow of data, it also creates the risk of inadvertent creation of unauthorised paths between systems. Pressure for operational efficiencies has also created a demand for increased integration of the applications, the objective being to streamline the capture of data and reduce the opportunities for errors. The provision of a systems integration layer provides the means to share data between systems and can include access to common data stores or direct messaging interfaces between systems to allow for user access and the exchange of data. An example of this integration is the interaction between systems handling transportation data (e.g. train or aircraft movements) and the passenger information systems displaying arrivals and departure information, where the provision of automated updates can be used to inform passengers of changes or delays and boarding locations. This can allow the terminal operators to manage delays and scheduling changes efficiently, and improve the handling of passengers within a terminal. Although this integration of systems can offer significant business benefits by providing passengers with accurate up-to-date information on departures from the terminal, it also creates a number of potential risks. The increasing dependence on correct, interruption- and error-free operation of a range of integrated systems can lead to simple problems having a disproportionate impact on terminal operations. For example, the problems with baggage-handling systems at Denver Airport and Heathrow Terminal 5 demonstrate how critical these systems are for smooth terminal operation. It is important to recognise that terminal buildings fulfil multiple roles, supporting the basic transport function, local and national security functions (e.g. immigration control and customs), and housing extensive retail and catering outlets. Building systems have an increasingly important role in the efficient operation of terminals, to provide a comfortable, safe and secure environment for passengers and staff. Availability of the terminal may be seriously affected when building systems are disrupted, thus preventing the building from delivering the required functionality. The nature of the availability risk will depend on the type of building and the criticality of the affected building service. As an example, if a BMS became inoperable and allowed the temperature to stray outside acceptable limits, the areas of the building could become inhospitable for the occupants, damage equipment through excessive temperatures or result in damage to stored materials. This would be critical in an airport terminal for spaces such as airside lounges and waiting areas, where the passengers have already been screened by customs and airport security. © The Institution of Engineering and Technology 51 APPENDIX B Twenty critical controls The top 20 critical security controls for cyber defence are a baseline of highpriority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. CPNI is participating in an international government–industry effort to promote the top 20 critical controls for computer and network security.21 The development of these controls is being coordinated by the SANS Institute.22 The descriptions in the following list of the individual controls have been adapted to highlight their relevance to both building and corporate IT systems. 1 Inventory of authorised and unauthorised devices For IP-based networks this includes the processes and tools used to track, control, prevent and correct network access by devices (computers, network components, printers, anything with IP addresses) based on an asset inventory of which devices are allowed to connect to the network. For networks and systems that are not IP-based or include elements that are not IP-based, the inventory should include all communications devices (e.g. modems, protocol converters, etc.), sensor and control devices, etc. 2 Inventory of authorised and unauthorised software The processes and tools that organisations use to track, control, prevent and correct installation and execution of software on computers based on an asset inventory of approved software. This should include code running on embedded processors, networking and communications components. 3 Secure configurations for hardware and software on mobile devices, laptops, workstations and servers The processes and tools that organisations use to track, control, prevent and correct security weaknesses in the configurations of the hardware and software of mobile devices, laptops, workstations and servers based on a formal configuration management and change control process. This should include code running on all digital devices, including embedded processors, networking and communications components. 4 Continuous vulnerability assessment and remediation The processes and tools used to detect, prevent and correct security vulnerabilities in the configurations of devices that are listed and approved in the asset inventory database. From a resilience perspective the vulnerability assessment should include factors that disrupt or prevent the operation of the device, e.g. loss of power, loss of cooling, electromagnetic interference, flooding, vandalism, theft, etc. Further advice on the CPNI website: http://www.cpni.gov.uk/advice/cyber/critical-controls ­[accessed 24 Apr 2013] 22 Version 4.1 of the controls has been published: http://www.sans.org/critical-security-controls/cag4-1.pdf [accessed 24 Apr 2013] 21 52 © The Institution of Engineering and Technology 5 Malware defences The processes and tools used to detect, prevent and correct installation and execution of malicious software on all devices. 6 Application software security The processes and tools that organisations use to detect, prevent and correct security weaknesses in the development and acquisition of software applications, including embedded code. This should address the full suite of software across all devices in the inventory. 7 Wireless device control The processes and tools used to track, control, prevent and correct the secure use of wireless LANS (local area networks), access points, wireless client systems and all uses of radio for communications and data links, e.g. Bluetooth, ZigBee, NFC, RFID, etc. 8 Data recovery capability The processes and tools used to back up critical information/data with a proven methodology for its timely recovery. This should include state or configuration data for devices to allow a system to be recovered to a known safe and secure state following an incident. 9 Security skills assessment and appropriate training to fill gaps The process and tools needed to make sure that an organisation understands the technical skill gaps within its workforce, including an integrated plan to fill the gaps through policy, training and awareness. 10 Secure configurations for network devices The processes and tools used to track, control, prevent and correct security weaknesses in the configurations in network devices such as firewalls, routers, and switches based on formal configuration management and change control processes. The term ‘network’ should be taken to include communications and data links required for the operation of the organisation and its systems. This includes the configuration of all transmitters and receivers in an organisation’s systems. 11 Limitation and control of network ports, protocols and services The processes and tools used to track, control, prevent and correct use of ports, protocols and services on networked devices. The term ‘network’ includes communications and data links required for the operation of the organisation and its systems. 12 Controlled use of administrative privileges The processes and tools used to track, control, prevent and correct the use, assignment and configuration of administrative privileges on computers, networks and applications. 13 Boundary defence The processes and tools used to detect, prevent and correct the flow of information-transferring networks of different trust levels with a focus on security-damaging data. For building and industrial control systems the boundary should be considered in terms of protecting the availability and integrity of the system(s). © The Institution of Engineering and Technology 53 54 14 Maintenance, monitoring and analysis of audit logs The processes and tools used to detect, prevent and correct the use of systems and information based on audit logs of events that are considered significant or could impact the security of an organisation. 15 Controlled access based on the need to know The processes and tools used to track, control, prevent and correct secure access to information according to the formal determination of which persons, computers and applications have a need and right to access information based on an approved classification. For building and industrial control systems, access should be granted on a basis of need to know for specific job roles and responsibility rather than primarily on classification of the information in the system. 16 Account monitoring and control The processes and tools used to track, control, prevent and correct the use of system and application accounts. This should include those used by the organisation and those accessed by suppliers or manufacturers to configure and support devices. 17 Data loss prevention The processes and tools used to track, control, prevent and correct data transmission and storage, based on the data’s content and associated classification. 18 Incident response and management The process and tools used to make sure that an organisation has a properly tested plan with appropriately trained resources for dealing with any adverse events or threats of adverse events. This should include resilience and cyber security events and threats. 19 Secure network engineering The process and tools used to build, update and validate a network infrastructure that can properly withstand attacks from advanced threats. The term ‘network’ should be taken to include communications and data links required for the operation of the organisation and its systems. 20 Penetration tests and red team exercises The process and tools used to simulate attacks against a network or system to validate the overall security of an organisation. © The Institution of Engineering and Technology APPENDIX C Glossary Abbreviation/Term Meaning APT Advanced Persistent Threat – a form of cyber security attack, often used for intelligence gathering, involving an attacker who has the capability and intent to target a specific individual or organisation persistently and effectively BIM Building Information Modelling – digital representation of physical and functional characteristics of a facility, creating a shared knowledge resource for information about it forming a reliable basis for decisions during its life cycle, from earliest conception to demolition [UK Construction Project Information Committee] BIS Department for Business, Innovation and Skills Bluetooth A wireless technology standard [IEEE 802.15.1] used for communicating data over short distances and which may be used to create personal area networks BMS Building Management System CESG Information Security arm of the Government Communications Headquarters (GCHQ) Continuity The unbroken and consistent operation of a system, process or business over a period of time Convergence The tendency for previously separate technologies, e.g. voice, data, video, to now share resources, both physical (e.g. cabling) and logical (processing, storage, etc.), and to interact with each other CPNI Centre for Protection of National Infrastructure CRM Customer Relationship Management DDoS Distributed denial of service – an attack by multiple systems that tries to flood a targeted system with traffic until connection requests are refused and the targeted system fails to respond to existing connections DMZ Demilitarised zone – a physical or logical sub-network protected by firewalls used to share data between trusted and untrusted networks, e.g. between an organisation’s intranet and the Internet ERP Enterprise Resource Planning Governance The management, decision-making and leadership processes employed by an organisation to ensure consistent and cohesive management of a given area of responsibility © The Institution of Engineering and Technology 55 56 Abbreviation/Term Meaning HVAC Heating Ventilation and Air Conditioning ICS Industrial Control Systems ICT Information and Communications Technology Malware Malicious software used to attack, disrupt and compromise security, or take control of a computer system or individual computer MRP Materials Resource Planning NFC Near Field Communications PLC Programmable Logic Controller Reconnaissance The preliminary inspection, survey, exploration and/or research undertaken when contemplating an attack or specific action Resilience The ability to withstand a level of failure or disruption and to adapt or respond to dynamic internal or external changes while continuing to operate with limited impact on the organisation or business RFID Radio Frequency Identification SCADA Supervision Control and Data Acquisition SMS Short Message Service – the text service used for communication between phones/mobile phones Structured cabling The implementation of a structured building or campus telecommunications (i.e. telephony, computer network, video, etc.) cabling infrastructure, which comprises a number of standardised smaller elements Systems integration The process of bringing together component systems or sub-systems to create a single system whose functionality operates as a coordinated whole UPS Uninterruptible Power Supply – an emergency power system providing continuity of supply in the event of an interruption in the mains power supply VLAN Virtual Local Area Network – configuration of a network to create broadcast domains that are mutually isolated WiFi Technology used to deliver a wireless local network based on the IEEE 802.11 standards Wireless Used in this document to cover networks and communications carried by radio frequency transmissions allowing passage of information or data without a physical (wired) connection ZigBee A specification for a communications protocol using small, low-power digital radios, based on the IEEE 802.11 standard for personal area networks © The Institution of Engineering and Technology In November 2011 the Government launched the UK Cyber Security Strategy: Protecting and promoting the UK in a digital world. The strategy acknowledges the importance of a safe cyber environment for business. Cyber-crime is today the world’s fastest-growing crime sector. Your cyber security is paramount if you are beginning to trade overseas or expanding your overseas business. The cyber risks include viruses, identity theft (spyware, wifi eavesdropping, hacking) and threats to wealth (fraud, identity theft, spam emails). Of special concern to businesses is cyber-crime connected to intellectual property theft. This report is the first publication of its kind from IET Standards. Its purpose is to inform professionals involved in the development and operation of intelligent or smart buildings about the resilience and cyber security issues that arise from a convergence of the technical infrastructure and computer-based systems. Resilience and Cyber Security of Technology in the Built Environment Resilience and Cyber Security of Technology in the Built Environment IET Standards IET Standards Technical Briefing IET Standards Technical Briefing Resilience and Cyber Security of Technology in the Built Environment www.theiet.org/standards IET Standards Michael Faraday House Six Hills Way Stevenage Hertfordshire SG1 2AY Cyber Security Cover.indd 1 17/06/2013 13:25:29