{"id":2030,"date":"2020-10-28T00:12:22","date_gmt":"2020-10-28T00:12:22","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=2030"},"modified":"2021-04-12T03:06:28","modified_gmt":"2021-04-12T03:06:28","slug":"effective-organizational-change-management-in-light-of-changing-standards","status":"publish","type":"post","link":"https:\/\/itegriti.com\/staging\/2020\/cybersecurity\/effective-organizational-change-management-in-light-of-changing-standards\/","title":{"rendered":"Effective Organizational Change Management in Light of Changing Standards"},"content":{"rendered":"<p>[fusion_builder_container hundred_percent=&#8221;no&#8221; hundred_percent_height=&#8221;no&#8221; hundred_percent_height_scroll=&#8221;no&#8221; hundred_percent_height_center_content=&#8221;yes&#8221; equal_height_columns=&#8221;no&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; status=&#8221;published&#8221; background_position=&#8221;center center&#8221; background_repeat=&#8221;no-repeat&#8221; fade=&#8221;no&#8221; background_parallax=&#8221;none&#8221; enable_mobile=&#8221;no&#8221; parallax_speed=&#8221;0.3&#8243; video_aspect_ratio=&#8221;16:9&#8243; video_loop=&#8221;yes&#8221; video_mute=&#8221;yes&#8221; border_style=&#8221;solid&#8221; type=&#8221;legacy&#8221; admin_toggled=&#8221;no&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; layout=&#8221;1_1&#8243; spacing=&#8221;&#8221; center_content=&#8221;no&#8221; link=&#8221;&#8221; target=&#8221;_self&#8221; min_height=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; background_image=&#8221;&#8221; background_image_id=&#8221;&#8221; background_position=&#8221;left top&#8221; background_repeat=&#8221;no-repeat&#8221; hover_type=&#8221;none&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; border_position=&#8221;all&#8221; border_radius=&#8221;&#8221; box_shadow=&#8221;no&#8221; dimension_box_shadow=&#8221;&#8221; box_shadow_blur=&#8221;0&#8243; box_shadow_spread=&#8221;0&#8243; box_shadow_color=&#8221;&#8221; box_shadow_style=&#8221;&#8221; padding_top=&#8221;&#8221; padding_right=&#8221;&#8221; padding_bottom=&#8221;&#8221; padding_left=&#8221;&#8221; margin_top=&#8221;&#8221; margin_bottom=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221; last=&#8221;true&#8221; border_sizes_top=&#8221;0&#8243; border_sizes_bottom=&#8221;0&#8243; border_sizes_left=&#8221;0&#8243; border_sizes_right=&#8221;0&#8243; first=&#8221;true&#8221; type=&#8221;1_1&#8243;][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; content_alignment_medium=&#8221;&#8221; content_alignment_small=&#8221;&#8221; content_alignment=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; sticky_display=&#8221;normal,sticky&#8221; class=&#8221;&#8221; id=&#8221;&#8221; font_size=&#8221;&#8221; fusion_font_family_text_font=&#8221;&#8221; fusion_font_variant_text_font=&#8221;&#8221; line_height=&#8221;&#8221; letter_spacing=&#8221;&#8221; text_color=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221;]Attacks against industrial control systems (ICS) are only getting worse with time. There are two key reasons for this. First, these attacks are becoming more numerous as time wears on. <a href=\"https:\/\/securityintelligence.com\/posts\/what-the-explosive-growth-in-ics-infrastructure-targeting-means-for-security-leaders\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM X-Force<\/a> revealed in February 2020 that the security incidents involving attacks against ICS and operation technology (OT) assets had increased over 2,000% since 2018, with the number of events observed in 2019 exceeding the total for the past three years combined. Most of those incidents consisted of attackers exploiting vulnerabilities in supervisory control and data acquisition (SCADA) assets and other ICS hardware components, as well as using brute-force login techniques.<\/p>\n<p>Second, these attacks are becoming easier to launch. About a month after IBM X-Force announced its research, <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/03\/monitoring-ics-cyber-operation-tools-and-software-exploit-modules.html\">FireEye<\/a> clarified that standardized digital operation tools were enabling malicious actors with even low levels of technical expertise to customize and launch attacks against organizations\u2019 ICS and OT assets. The security firm observed that the vast majority of those tools had emerged in the past 10 years, didn\u2019t target a specific vendor and contained exploit modules for over 500 zero-day flaws and other vulnerabilities.<\/p>\n<h2 class=\"navy\">Why and How Attackers Target Organizations\u2019 ICS<\/h2>\n<p>The growth of attacks against ICS reflects the ability of all kinds of malicious actors to find motivations for launching new operations. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tr\/security\/news\/cyber-attacks\/why-do-attackers-target-industrial-control-systems\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro<\/a> noted that digital criminals could prey upon an organization\u2019s industrial assets for financial gain by stealing information and selling it to a competitor, for instance. Malicious insiders could have a similar goal. Alternatively, attackers could embrace hacktivism by seeking to disrupt industrial processes for a political cause or other aim. They might even be state-sponsored actors and carry out their attacks with the purpose of fulfilling a military objective that\u2019s received authorization from their government.<\/p>\n<p>Regardless of who\u2019s behind it, an attack against an organization\u2019s ICS tend to follow a certain playbook. Trend Micro explained that the typical intrusion begins with a reconnaissance phase in which the malicious actors collect intelligence about the targeted environment. They then use phishing attacks or other techniques to gain an initial foothold in the environment. At that point, they can deploy malware that preys upon an ICS asset\u2019s vulnerabilities or configurations. Such functionality could disrupt the organization\u2019s industrial operations more broadly.<\/p>\n<p>The common thread that unites each phase of this attack scenario is change. Malicious actors need a way to exfiltrate information gained in the reconnaissance phase. They need to remain persistent on the target\u2019s environment. And they need to activate their payload\u2019s malicious capabilities by adjusting a configuration or exploiting a bug. All of these steps require that the attackers change something within the target environment.<\/p>\n<h2 class=\"navy\">A Window of Opportunity for Defending Organizations<\/h2>\n<p>These changes by attackers open a window of opportunity for organizations to protect themselves. This window comes in the form of change management, a process which allows organizations to control and approve changes to their IT and other technology assets.<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) pointed out in a <a href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/c3vp\/crr_resources_guides\/CRR_Resource_Guide-CCM.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">resource guide<\/a> that change management is particularly pertinent given the growing complexity that characterizes the processes necessary to create ever-evolving information systems. These processes elevate the probability of accidental errors surfacing in the configuration of those systems. Such mistakes could jeopardize the data and\/or business operations of an organization.<\/p>\n<p>In response, CISA urged organizations to follow the four phases of change management:<\/p>\n<ol>\n<li>Create a change management plan<\/li>\n<li>Identify which assets need protection<\/li>\n<li>Implement the configuration changes necessary to protect those assets<\/li>\n<li>Monitor configuration changes and use those results to adjust the plan, thereby creating a feedback loop.<\/li>\n<\/ol>\n<h2 class=\"navy\">Why Change Management Isn\u2019t Always that Easy<\/h2>\n<p>The issue is that change management isn\u2019t always that easy. For example, <a href=\"https:\/\/www.csoonline.com\/article\/3191947\/what-is-a-supply-chain-attack-why-you-should-be-wary-of-third-party-providers.html\" target=\"_blank\" rel=\"noopener noreferrer\">CSO Online<\/a> drew attention to the special case of applying change management to supply chain attacks. These security incidents involve malicious actors infiltrating an organization\u2019s systems via an outside provider or partner with access to the organization\u2019s network. Such attacks increase the attack surface by enabling nefarious individuals to use security weaknesses affecting third parties as attack vectors into an organization\u2019s systems.<\/p>\n<p>Supply chain attacks are no laughing matter. As an example, the FBI issued an alert in late March 2020 warning organizations about a state-sponsored group called \u201cKwampirs\u201d using malware to conduct supply chain attacks against organizations in healthcare and other sectors. <a href=\"https:\/\/www.zdnet.com\/article\/fbi-re-sends-alert-about-supply-chain-attacks-for-the-third-time-in-three-months\/\">ZDNet<\/a> clarified this was the third time that the FBI had sent out an alert about the group that year. It had published its earlier alerts on January 6 and February 5.<\/p>\n<p>What makes supply chain attacks so insidious is that they\u2019re difficult to spot. In these types of attacks, malicious actors target organizations in specific regions, sectors or industries. A successful vendor or partner breach enables attackers to wind their way through the supply chain via automatic updates and verified partner pathways. All of this complicates the ability of organizations to control changes across their entire attack surface.<\/p>\n<h2 class=\"navy\">Cyber Security Supply Chain Risk Management<\/h2>\n<p>The difficulties discussed above aren\u2019t lost on industry entities. Back in July 2016, for instance, the Federal Energy Regulatory Commission (FERC) issued <a href=\"https:\/\/www.ferc.gov\/sites\/default\/files\/2020-04\/E-8_1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Order No. 829<\/a>: \u201cRevised Critical Infrastructure Protection Reliability Standards.\u201d That directive instructed the North American Electric Reliability Corporation (NERC) to devise a new standard or modify existing practices in order to help organizations managing Bulk Electric System (BES) operations to mitigate the risks of supply chain attacks.<\/p>\n<p>NERC responded by creating <a href=\"https:\/\/www.nerc.com\/pa\/Stand\/Pages\/Project201603CyberSecuritySupplyChainManagement.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Project 2016-03<\/a>: \u201cCyber Security Supply Chain Risk Management.\u201d This initiative consists of three standards. One of them is <a href=\"https:\/\/www.nerc.com\/pa\/Stand\/Project%20201603%20Cyber%20Security%20Supply%20Chain%20Managem\/CIP-010-3_Clean_071117.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CIP-010-3<\/a>: \u201cConfiguration Change Management and Vulnerability Assessments.\u201d The purpose of this Critical Infrastructure Protection standard is to help organizations prevent and detect unauthorized changes to their BES Cyber Systems by abiding by the following roadmap:<\/p>\n<ol>\n<li>Develop a baseline configuration that includes OS or firmware versions, open-source applications, custom software, logical network accessible ports and security patches.<\/li>\n<li>Authorize and document changes that deviate from the baseline.<\/li>\n<li>Update the baseline configuration within 30 days if the change deviates from the existing baseline configuration.<\/li>\n<li>In the event the change deviates from the baseline, determine which controls in CIP-005: \u201cElectronic Security Perimeter(s)\u201d and CIP-007: \u201cSystem Security Management\u201d might be affected by the change. It\u2019s also important to verify that the change won\u2019t affect required measures in either of those standards and document the results.<\/li>\n<li>Test the change prior to fully deploying it in a production environment and document the results to ensure that CIP-005 and CIP-007 aren\u2019t adversely affected.<\/li>\n<li>Verify the identity of the software source as well as the integrity of the software program obtained from that source.<\/li>\n<li>Monitor for changes to the baseline configuration at least once every 35 calendar days, paying particular attention to unauthorized changes.<\/li>\n<li>Conduct a vulnerability assessment at least once every 15 calendar ,months.<\/li>\n<li>Perform an active vulnerability assessment in a test environment or an assessment in a production environment that models the baseline configuration of the BES Cyber System at least once every three years and document the results.<\/li>\n<li>Perform a vulnerability assessment of most new assets before adding them to the production environment.<\/li>\n<li>Document the results of all vulnerability assessments as well as all remediation action plans that are necessary to safeguard the assets.<\/li>\n<\/ol>\n<h2 class=\"navy\">Beyond the Industrial Sector<\/h2>\n<p>Change management isn\u2019t just essential to industrial supply chains. It\u2019s becoming increasingly relevant to entities in all sectors. This becomes truer every day as new data protection standards come into being. According to the <a href=\"https:\/\/unctad.org\/en\/Pages\/DTL\/STI_and_ICTs\/ICT4D-Legislation\/eCom-Data-Protection-Laws.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">United Nations Conference on Trade and Development<\/a>, 132 of 194 countries of the world have already put legislation in place that\u2019s designed to protect people\u2019s data and privacy. That number is likely to grow. Indeed, 67% of respondents to a SAS survey said that they think the U.S. government should be doing more to protect data privacy such as via federal legislation, reported <a href=\"https:\/\/www.prnewswire.com\/news-releases\/sas-survey-67-percent-of-us-consumers-think-government-should-do-more-to-protect-data-privacy-300761765.html\" target=\"_blank\" rel=\"noopener noreferrer\">PR Newswire<\/a>. It\u2019s these types of attitudes that support <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/gartner-predicts-for-the-future-of-privacy-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner\u2019s forecast<\/a> of modern privacy regulations covering 65% of the global population\u2019s personal information by 2023\u2014up from 10% today.<\/p>\n<p>Along the way, organizations will need to keep up with the latest standards, determine whether those regulations apply to them and work to maintain compliance. ITEGRITI can be a partner in helping organizations achieve compliance as well as align digital security design approaches with the risks in their networks. Learn more <a href=\"http:\/\/72.52.228.46\/~itegriti\/cybersecurity\/\">here<\/a>.[\/fusion_text][\/fusion_builder_column][\/fusion_builder_row][\/fusion_builder_container]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attacks against industrial control systems (ICS) are only getting worse with time. There are two key reasons for this. First, these attacks are becoming more numerous. Second, these attacks are becoming easier to launch. <\/p>\n","protected":false},"author":12,"featured_media":2035,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13,2180],"tags":[1941],"_links":{"self":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/2030"}],"collection":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/comments?post=2030"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/2030\/revisions"}],"predecessor-version":[{"id":2032,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/2030\/revisions\/2032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media\/2035"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media?parent=2030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/categories?post=2030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/tags?post=2030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}