12
001000011000010111010000100000011101000110100001100101011100100110 01010010011001110010011100110 111000101110101011011110011101101110011001000000110000101 111100101110100011010000110100101101110011001110010000001110111011100100 11011110110111001100111001000000111011101101001011101000110100000100000011101000110100001 1000010111010000101110001000000 1010011011100000110111101101110011001110110010101110111011011110 1110010011101000110100001 111001001011100010000001001110011001010111011101101101011000010110111 01000000100110101100001011100110111 0100011001010111001000100000011011110110011000100000011110010110111101110101011100 100001011010010110111000100000010001110110010101110 000010000001101111011101010111010000100001001000000000101001 111011010110010101110010001000000110111101 1001100010000001000111011001010 110111101110010011001110110010100100000010001100111 1100110010001110011001000 00010101000110100001100101001000000101001001100001011000110110100001100101 01010011011011010110010101101100011011000111100100100000010000110110000 101110100001000000 101011101100101001000000111011101100101011 001001100101001000000110111101101110001000000110000100100000011 110101100001011010110010000100100 00000001010010001100110000101101101011010010110110001111001 0010000001001101011 010111010001110100011001010111001001110011001000000100 10001101001011001000010000001001001001000000110010001101111 00011101000110100001100001011101000011111100 10000000001010010000110110100001100101011001010111001001110011001000000100 1100011000010111001101110100001000000100001101100 01011011000110110 00001000000100010101010010001000000100011101 10010101101111011100100110011101100101001000000100001101101100011011110110111 101101110011001010111100100100000010101001 01100001000 0001010111011011110111001001101100011001 0100000010100000111010101100011011010110010000000001010010101000110 10011000010110111001100111011001010111001001110011001000000111 00000110100 101100011011010110110010101100100001000000111010001101111001000000110 011101100110010100100000011010010110111000 0000 01010011011011010110010101101100011011000111100100100 101110100001000000 101011101100101001000000111011101100101011 001001100101001000000110111101101110001000000110000 110101100001011010110010000100100 00000001010010001100110000101101101011010010110110001111001 0010000001001101011 010111010001110100011001010111001001110011001000000100 10001101001011001000010000001001001001000000110010001101111 00011101000110100001100001011101000011111100 100000000010100100001101101000011001010110001111001010111001001110011001000000100 11000110000101110011011101000010000001000011010001 0101101100011011000011100100 00001000000100010101010010001000000100011101 10010101101111011100100110011101100101001000000100001101101 1011011100110010101111001001000000101010001101000011001010010000001010010011001010110001011 Cooperative Cybersecurity Are you doing everything you can to keep your network safe? Second Edition August 2018

0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(1)

001000011000010111010000100000011101000110100001100101011100100110

01010010011001110010011100110

111000101110101011011110011101101110011001000000110000101

111100101110100011010000110100101101110011001110010000001110111011100100

11011110110111001100111001000000111011101101001011101000110100000100000011101000110100001

1000010111010000101110001000000

1010011011100000110111101101110011001110110010101110111011011110

1110010011101000110100001

111001001011100010000001001110011001010111011101101101011000010110111

01000000100110101100001011100110111

0100011001010111001000100000011011110110011000100000011110010110111101110101011100

100001011010010110111000100000010001110110010101110

000010000001101111011101010111010000100001001000000000101001

111011010110010101110010001000000110111101

1001100010000001000111011001010

110111101110010011001110110010100100000010001100111

1100110010001110011001000

00010101000110100001100101001000000101001001100001011000110110100001100101

01010011011011010110010101101100011011000111100100100000010000110110000

101110100001000000

101011101100101001000000111011101100101011

001001100101001000000110111101101110001000000110000100100000011

110101100001011010110010000100100

00000001010010001100110000101101101011010010110110001111001

0010000001001101011

010111010001110100011001010111001001110011001000000100

10001101001011001000010000001001001001000000110010001101111

00011101000110100001100001011101000011111100

10000000001010010000110110100001100101011001010111001001110011001000000100

1100011000010111001101110100001000000100001101100

01011011000110110

00001000000100010101010010001000000100011101

10010101101111011100100110011101100101001000000100001101101100011011110110111

101101110011001010111100100100000010101001

01100001000

0001010111011011110111001001101100011001

0100000010100000111010101100011011010110010000000001010010101000110

10011000010110111001100111011001010111001001110011001000000111

00000110100

101100011011010110110010101100100001000000111010001101111001000000110

011101100110010100100000011010010110111000

0000

01010011011011010110010101101100011011000111100100100

101110100001000000

101011101100101001000000111011101100101011

001001100101001000000110111101101110001000000110000

110101100001011010110010000100100

00000001010010001100110000101101101011010010110110001111001

0010000001001101011

010111010001110100011001010111001001110011001000000100

10001101001011001000010000001001001001000000110010001101111

00011101000110100001100001011101000011111100

100000000010100100001101101000011001010110001111001010111001001110011001000000100

11000110000101110011011101000010000001000011010001

0101101100011011000011100100

00001000000100010101010010001000000100011101

10010101101111011100100110011101100101001000000100001101101

1011011100110010101111001001000000101010001101000011001010010000001010010011001010110001011

Cooperative Cybersecurity

Are you doing everything you can tokeep your network safe?

Second EditionAugust 2018

Page 2: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(2)

Cybersecurity Research at NRECANRECA has several cybersecurity research projects under way and offers numerous resources to help members meet their security needs. Visit Cooperative.com for more information on the projects below.

NRECA Resources (visit Cooperative.com):• Guide to Developing a Cybersecurity and Risk Mitigation

Plan Toolkit – a set of tools and resources cooperatives can use to strengthen their security posture.

• Cybersecurity Policy Framework – a collection of cybersecu-rity policy templates developed in collaboration with the Kentucky Association of Electric Cooperatives.

• RC3 Website – cybersecurity resources developed by the RC3 Program.

• Business and Technology Update – a twice-monthly email newsletter containing the latest information on techni-cal publications, articles, reports, webinars, and confer-ences.

Other Resources:• Cybersecurity Capability Maturity Model (C2M2) – a self-as-

sessment evaluation tool from the DOE. (https://www.energy.gov/ceser/activities/cybersecurity-critical- energy-infrastructure/energy-sector-cybersecurity-0-0)

• Cybersecurity Risk Management Process (RMP) Guideline – guidance from the DOE to incorporate risk-manage-ment processes into a new or existing cybersecurity

program. (https://www.energy.gov/sites/prod/files/Cybersecurity%20Risk%20Management%20Process%20Guideline%20-%20Final%20-%20May%202012.pdf)

• Information Security Program Library (ISPL) – cyber- security template policies, procedures, standards, and forms developed by SEDC. (https://www.sedata.com/cyber-resilience-initiative-information- security-program-library-ispl-download-request)

• NISC Cybersecurity Services – A suite of training and network protection resources (https://www.nisc.coop/cybersecurity)

• Cyber Mutual Assistance (CMA) – an Electricity Subsec-tor Coordinating Council (ESCC) initiative to develop a pool of industry experts. (http://www. electricitysubsector.org/CMA )

• Computer Emergency Readiness Teams (CERT) – teams funded by the Department of Homeland Security to respond to major cyber incidents, analyze threats, and exchange critical cybersecurity informa-tion with trusted partners. https://www.us-cert.gov https://www.ics-cert.us-cert.gov

For more information and updates:• Visit cooperative.com/topics/cybersecurity • Sign up for Business and Technology Update: https://www.cooperative.com/programs-services/bts/Pages/

Technology-Update.aspx• Contact Cynthia Hsu, NRECA cybersecurity program manager, at [email protected] or the RC3 team at

[email protected].

• RC3 (Rural Cooperative Cybersecurity Capabilities Program) Program to develop tools, resources and training opportunities to improve the cybersecurity and resiliency capa-bilities of electric cooperatives. Funded by the U.S. Department of Energy (DOE).

• Essence Completed project that successfully developed a cybersecurity technology to detect anomalies in utility network traffic. Funded by the DOE.

• GridState Project to extend and improve the capabilities of Essence. Funded by the U.S. Department of Defense (DOD).

• REACT Research collaboration between NRECA, N-Dimension Solutions, Inc., Milsoft Utility Solutions, and NRTC to integrate Essence into commercial products and services. Funded by the DOE.

• Simba Project to develop a rapid cybersecurity testing capability using software that can process a year’s worth of data in 52 minutes.

• MultiSpeak® Platform to provide online comprehensive interoperability testing and certi-fication and implement cybersecurity extensions for de-risking technology integration.

Page 3: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

Table of ContentsOnline Cybersecurity Resources . . Page 2

Introduction. . . . . . . . . . . . Page 3

Main Story – Cyber Cooperation . . Page 4

Graphic: Ransomware Explosion . . Page 6

Defense in Depth Steps . . . . . Page 8

HR and Cybersecurity . . . . . . Page 9

Keys to the Kingdom . . . . . . Page 10

New Cybersecurity Tool . . . . . Page 11

Digital technologies are allowing electric cooperatives to improve service to members in countless ways. Smart grid communications and remote access or automated control equipment enable more cost-effective, efficient, and safer options to manage our systems.

But greater connectivity comes with a cost.

We are collecting more data and moving it in new and complicated ways. Digital communications, for all their benefits, also create openings for cybercriminals, and our data is an attractive commodity.

As cooperatives ramp up capabilities in the beneficial use of digital technologies, they must also integrate effective practices to safeguard consumer data and grid operations from cyberattacks.

To this end, NRECA launched RC3, the Rural Cooperative Cybersecurity Capabilities program, to help distribution cooperatives address the persistent and evolving reality of cyberthreats. One co-op general manager told us, “If you create a strong culture around security, you can prevent 95 percent of the risks of a bad guy getting in.” With funding from the U.S. Department of Energy, RC3 is developing tools and resources to help cooperatives build that culture of cybersecurity.

The good news is that effective cybersecurity at the distribution level does not take a massive financial investment. This document serves as an update to the August 2017 RE Magazine Cybersecurity Insert with a few modifications and updated website links. We pay particular attention to how small- and medium-size distribution systems are meeting cybersecurity challenges. It takes planning and commitment, from the board of directors and from every employee, to make cybersecurity a permanent priority and an essential element in utility operations.

Cooperatives cooperate. It’s what we do. And in the following pages, we share key observations, solutions, and successes from several co-op leaders. A critical component of our success as a community to deter and mitigate cyberthreats will be our inclination to share information and collaborate. This is our strength.

Cynthia Hsu NRECA Cybersecurity Program Manager

Barry Lawson NRECA Senior Director, Regulatory Affairs

Jim Spiers NRECA Senior Vice President for Business and Technology Strategies

Bridgette L. Bourge NRECA Director, Legislative Affairs

Welcome to the Special Cybersecurity Insert

Page 4: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(4)

Excerpted version; visit REmagazine.coop for the full article

Tim Lindahl pulled into the parking lot of Wheat Belt Public Power District in Sidney, Nebraska, on a January morning in 2005. He was early for his

interview for a manager of information technology posi-tion, so he turned off the engine of his pick-up truck, pulled out his laptop, and searched for an internet signal to check emails while he waited.

In 2005, cellular signals were far less ubiquitous than today, even in a town of 6,000 on the panhandle of western Nebraska with an interstate highway close by. But he was in luck; the signal from Wheat Belt’s Wi-Fi network was strong—and unsecured.

Lindahl found that not only could he jump onto the internet signal to access his email; he could freely surf inside the utility’s network.

“I quickly found the server and several computers, one named ‘CFO,’ another named ‘General Manager,’ none of which were password protected,” he says. “I realized that [network protection] was not on their minds, as it wasn’t for most people at that time.”

His discovery provided an opportunity to demonstrate his IT credentials once inside the office.

“I showed them what I had found and gave them some pointers on how to secure that down a little bit,” he says. His interviewers “realized that I could have absconded with every single file they ever had and they would have never known I was there in the network.”

He got the job.

RC3Communication-based technologies are now integrated into every facet of a cooperative’s business, and securing those technologies from cyberthreats will help safeguard the financial security and welfare of the co-ops, their members, and the integrity of the electric grid. Helping cooperatives build stronger cybersecurity programs is the goal of the Rural Cooperative Cybersecurity Capa-bilities Program (RC3), launched by NRECA in 2016 with U.S. Department of Energy funding and managed by the association’s Business and Technology Strategies (BTS) team.

The program is developing tools, resources, and training opportunities to help co-ops build stronger cyberdefenses and increase their resiliency to cyber- attacks like ransomware.

Led by Cynthia Hsu, manager of cybersecurity programs at BTS, the RC3 Program held a series of six Cybersecu-rity Summits around the country in 2017. More than 150 cooperatives from 33 different states participated in the summits. Five of the summits were hosted by a leading university or national energy lab conducting cyberse-curity research. Due to the success of the 2017 Summits, RC3 will hold five more summits in 2018/2019. At the heart of each one-day event is a peer-to-peer exchange among cooperative employees on the key challenges they face.

Cyber CooperationCo-ops have a secret weapon in the war against network attacksBy Bob Gibson

Attendees at an RC3 Cybersecurity Summit participate in a cybersecurity exercise.

Photo by Bob Gibson

Page 5: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(5)

An engaged boardHsu says one particular message came through loud and clear from the 2017 summit participants: An engaged board and supportive CEO makes all the difference.

Lindahl, who is now Wheat Belt’s general manager, says the foundation for a strong cybersecurity program was in place before he arrived.

“I’ve had the luxury of having a very technology-adept board ever since I was hired,” he says. “Twelve years ago, they saw that we really needed to make better use of the technology we have and pay attention to it. Hav-ing a board that was engaged since the beginning has made my life a lot easier.”

Brian Heithoff, CEO of High West Energy in Pine Bluff, Wyoming, and an attendee at the first summit, agrees.

“Boards take a lot of pride in being good stewards of the co-op’s well-being today and in considering how to innovate for the future,” he says. “My board has displayed considerable foresight when it comes to protecting our cyber assets, and I appreciate their lead-ership.”

Small does not mean safe“In general, boards easily get the financial and opera-tional risk of something that threatens the co-op’s distri-bution lines,” says Heithoff. “They have a harder time gauging the possibility that the co-op’s IT system will be hacked.”

He says many think, “We’re a small utility in the mid-dle of rural America. Why would they target us when they have Citibank and ExxonMobil to go after?”

Mark Hayden, CEO of Missoula Electric Coopera-tive in Missoula, Montana, is working to correct this misperception.

“It’s not about being on anyone’s radar. The bad guys are throwing out a wide net looking to see who they can snag,” he says. “They may not necessarily be targeting Missoula Electric Co-op, but if they find a crack, they’ll exploit it.”

Who ‘owns’ cybersecurity?Hsu says defining who at a co-op “owns” cybersecurity is an important part of developing a cybersecurity plan.

“Cybersecurity is a risk-management strategy which [belongs to] everybody,” says Lindahl. “Yes, cybersecu-rity is an IT function, but it goes far beyond that. IT just carries out the strategy.”

He says at Wheat Belt, cybersecurity is handled much like safety, where everyone is responsible.

“We do monthly security updates for our directors, and we talk about it extensively in our weekly staff meet-ings,” he says. “Can I say with absolute confidence that one of our guys won’t get hurt tomorrow? No. But we haven’t had anyone injured in 10 years because we’ve focused on safety. With cybersecurity you can create a good culture, put in the right policies and procedures, the layers of risk protection, and prevent 95 to 98 per-cent of the intrusions you might otherwise experience.”

Resources for small utilitiesRC3 summit attendees expressed a strong desire for resources that are specifically designed for cooperatives

and for smaller utilities. As one participant explained, “One of the biggest challenges for small IT staffs is just knowing where to start.”

Co-op representatives at the summits also expressed a range of concerns about shar-ing information. This includes the risk of information about a cybersecurity vulnera-bility or incident falling into the wrong hands; fear of repercussions if a security breach were revealed; uncertainty about how to differen-tiate between an actual vulnerability and a benign communication; and lack of clarity on when and where to report an incident.

Lindahl says that despite these uncertain-ties, it’s more important than ever for co-ops to find ways to learn from one another and share

ideas and experiences.

“There are certain practices that we won’t allow outside our walls just for our protection,” he says. “But there are a lot of things that we can share, simple things that everybody can do that won’t harm the organization if they get out.”

What Tactics Do Hackers Use?Percent of network breaches in 2017 involving:

Source: 2018 Verizon Data Breach Investigations ReportReport: https://www.verizonenterprise.com/resources/

reports/rp_DBIR_2018_Report_en_xg.pdf

Source: 2018 Verizon Data Breach Investigations Reporthttp://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/

What tactics do hackers use?

0 2010 30 40 50 60 70 80 90

Hacking

Malware

Errors as casual events

Social engineering

Privilege misuse

Physical actions

48%

30%

17%

17%

12%

11%

Page 6: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

Attackers can use freely available tools and advanced computing power to break uncom- plex passwords in as little as one second, depending on the composition and complex-ity. Longer passwords are more secure than shorter ones. And passwords that are long and include a combination of numbers, spe-

cial characters, and both lowercase and capital letters are even better.

When possible, use mnemonics to remember complex passwords (passphrases), replace let-ters with numbers, and always use a different password for each account.

Ginx

Magic

LeChi�re

Nanolocker

KeRanger

PayCrypt

Job Cryptor

Hi Buddy

Vipasana

VirLock

Pclock

Threat Finder

Hidden Tear

ORX-Locker

Simplocker

GpcoderReveton

Urausy

Kovter

Linkup

Cryptolocker2015Dumb

Mabouia OSX POC

Power Worm

DMA-Locker

Gomasom

Chimera-Locker

Browlock

Slocker

Synolocker

CTB-Locker/Citron

Nymaim

Cryptowall Cryptvault

Tox

Troldesh

Encryptor RaaS

CryptoApp

LockDroid

Coinvault

LowLevel404

Cryptinfinite

Unix.Ransomcrypt

BandarChor

73v3n

CryptoJocker

Radamant

VaultCrypt

XRTN

Locky

Zerolocker

TorrentLocker

TeslacryptOnion

Ransom32

2005 2012 2013Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1

2014 2015 2016

Umbrecrypt

Hydracrypt

Pacman

Ransomware ExplosionHackers discovered the ease of use and profitability of ransomware in mid-2014, when widespread innovation in ransomware “families” increased from just a handful annually to dozens each year. “The proliferation in ransomware families in 2014 was the beginning of a disturbing trend in cyberattacks that have continued to increase in frequency and sophistication,” says NRECA cybersecurity program manager Cynthia Hsu.

Note: Data on this chart is current through first quarter 2016. Since then, ransomware attacks have increased dramatically. By the end of 2016, 101 new ransomware families were discovered.Source: Symantec Report: https://www.symantec.com/content/dam/symantec/docs/security-center/archives/istr-16-april-volume-21-en.pdf

(6)

Passwords: Longer = Better By Glenn Montgomery and Cynthia Hsu

Page 7: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

How long should your password be?The length and complexity of a password has a direct impact on how difficult it would be to crack.

Source: BetterBuys

Ginx

Magic

LeChi�re

Nanolocker

KeRanger

PayCrypt

Job Cryptor

Hi Buddy

Vipasana

VirLock

Pclock

Threat Finder

Hidden Tear

ORX-Locker

Simplocker

GpcoderReveton

Urausy

Kovter

Linkup

Cryptolocker2015Dumb

Mabouia OSX POC

Power Worm

DMA-Locker

Gomasom

Chimera-Locker

Browlock

Slocker

Synolocker

CTB-Locker/Citron

Nymaim

Cryptowall Cryptvault

Tox

Troldesh

Encryptor RaaS

CryptoApp

LockDroid

Coinvault

LowLevel404

Cryptinfinite

Unix.Ransomcrypt

BandarChor

73v3n

CryptoJocker

Radamant

VaultCrypt

XRTN

Locky

Zerolocker

TorrentLocker

TeslacryptOnion

Ransom32

2005 2012 2013Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1

2014 2015 2016

Umbrecrypt

Hydracrypt

Pacman

(7)

Page 8: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(8)

-$15 0-$5 $5 $15-$20 -$10 $10 $20

-$19.3-$16.1

-$12.5-$10.9

-$8.0 -$6.8 -$6.2

-$5.7 -$5.4 -$5.2-$5.1

-$2.9$2.0

$2.7$5.5

$7.6

Impact of 16 factors on the per capita cost of data breach

In U.S. Dollars

Incident–response teamExtensive use of encryption

Employee training

Participation in threat sharingUse of security analytics

*BCM involvement

Extensive use of DLP**

***CISO appointedBoard-level involvement

Data classification schemaInsurance protection

Provision of ID protection****CPO appointed

Consultants engaged

Lost or stolen devicesExtensive use of mobile platforms

Rush to notify

Extensive cloud migrationCompliance failures

Third–party involvement

$8.8$11.2

$14.3$16.9

Defense in Depth: Considerations for Building a Strong Cyber Defense Strategy

Identify• Understand and control what sensitive, personal, and critical data, assets, processes, and systems your

co-op stores and uses.• Identify mission critical systems that cannot be exposed to either the internet or the enterprise network.• Determine what threats and vulnerabilities your co-op faces.• Understand what access third-party vendors have to your system.• Assign responsibility for enforcing cybersecurity policies to a senior manager.

Protect• Restrict network access to an employee’s specific job requirements.• Use firewalls to segment your internal network.• Physically segregate mission critical systems from both the enterprise network and the internet.• Use multi-factor authentication and consider IP whitelisting for sensitive and critical systems.• Change all default passwords on your computers and operational devices.• Use long (12 character or more), strong passwords and update passwords every six months.• Eliminate unnecessary communications between all computers and devices on your network.• Disable all unnecessary services running on your computers/servers.• Update and patch operating systems and software on a regular basis.• Patch mission critical systems with only OEM supplied updates. DO NOT patch mission critical

systems with generic OS patches.• Perform regular security awareness training for all employees.

Detect• Maintain anti-virus and anti-malware solutions and review firewall rules regularly.• Perform regular vulnerability assessments, at least once a year.• Maintain and monitor logs on sensitive and critical systems.• Use an intrusion-detection system to identify anomalous behavior on your network.• Hold monthly calls with other co-ops on the latest cyberthreats and solutions.

Respond• Understand your legal obligations with the assistance of counsel. • If you have cybersecurity insurance, contact your insurance provider for assistance. • Isolate the impacted computers, devices, and/or systems, and work with professionals to perform

forensic analyses. • Integrate cybersecurity into incident-response, business-continuity, and crisis-communications plans,

and hold practice drills regularly. • Join the Electricity Information Sharing and Analysis Center (E-ISAC). • Consider contacting the Electricity Sector Coordinating Council’s Cyber Mutual Assistance

(CMA) Program.

Recover• Back-up files daily, store back-ups in locations not connected to your network, and test back-ups regularly. • Employ a “generational” back-up strategy.• Perform a post-incident review, and update policies and procedures as needed.

NOTE: This list is not exhaustive, so it does not include all options and considerations and resources. The notes above are merely considerations. Each electric cooperative has unique circumstances, and this document is provided as a general resource, among others, for their consideration.

Page 9: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(9)

HR’s Role in Cybersecurity By Cynthia Hsu and Bob Gibson

When it comes to creating a culture of cybersecurity within a cooperative, one thing is clear: Changes must be made throughout the organization, not just the IT department.

A natural partner in developing a stronger cybersecurity posture is the human resources team.

After testing a new self-assessment tool as part of NRECA’s Rural Cooperative Cybersecurity Capabilities Program (RC3), employees at Laurens Electric Coopera-tive in Laurens, South Carolina, discovered HR’s critical role in cybersecurity.

“I realized as we went through it that there is much more value from a human resources standpoint than I had expected,” says Dena Moore, the co-op’s human resources coordinator.

-$15 0-$5 $5 $15-$20 -$10 $10 $20

-$19.3-$16.1

-$12.5-$10.9

-$8.0 -$6.8 -$6.2

-$5.7 -$5.4 -$5.2-$5.1

-$2.9$2.0

$2.7$5.5

$7.6

Impact of 16 factors on the per capita cost of data breach

In U.S. Dollars

Incident–response teamExtensive use of encryption

Employee training

Participation in threat sharingUse of security analytics

*BCM involvement

Extensive use of DLP**

***CISO appointedBoard-level involvement

Data classification schemaInsurance protection

Provision of ID protection****CPO appointed

Consultants engaged

Lost or stolen devicesExtensive use of mobile platforms

Rush to notify

Extensive cloud migrationCompliance failures

Third–party involvement

$8.8$11.2

$14.3$16.9

Breach LiabilitiesA 2017 Ponemon Institute report estimates that the cost of a data breach in the energy sector is $137 per sensitive or confidential record. Certain actions, however, will have a negative or positive effect on that number. Below are factors that can change that breach liability.

Source: Ponemon Institute/IBM Report: https://www.ibm.com/security/infographics/data-breach/

After the self-assessment, Moore met with IT staff to re-write job descriptions to include each position’s network access needs and create new network security procedures for employees who leave the co-op.

At North Carolina’s Electric Cooperatives (NCEMC; state- wide), responsibility for security practices has been moved from IT to the supervisory level in each department.

“Rather than being seen as a special function in just one part of the cooperative, this makes cybersecurity a part of the day-to-day work of every employee,” says Ajaz Sadiq, NCEC’s vice president of grid modernization and technology integration.

Look to your HR department for other cybersecurity input, like recruiting security-minded staff and develop-ing cyber training programs.

* Business continuity management** Data loss prevention***Chief information security officer**** Chief privacy officer

Page 10: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

Identify target data

Internal Recon

Identify exploitable vulnerabilities

Initial Recon

Gain initial access to target

Initial Compromise

Strengthen position within target

Establish Foothold

Steal valid user credentials

EscalatePrivileges

Package and steal target data

Complete Mission

Mai

ntai

n Presence Lateral Movem

ent

(10)

Life Cycle of a CyberattackFrom the time a cybercriminal identifies a potential vulnerability until the end of a criminal mission, a cyberattack goes through a series of definable steps. Certain defenses can be used to prevent movement from one phase to the next, and a successful defense-in-depth strategy will ensure the cybercriminal never reaches the final step.

Cybersecurity professionals agree that no organization can be 100 percent secure 100 percent of the time. The question is, how do you thwart cybercriminals most of the time, and how do you limit the damage if they do get in?

The answer: layers.

One of the primary values of your computer network is the ability for employees to access resources across the network. Not surprisingly, this is also one of its greatest security weak-nesses. The risks are compounded if co-ops don’t actively limit access to their most critical data and systems.

“If everyone has the ‘keys to the king- dom,’ then every access point to the net-work becomes a liability,” says Cynthia Hsu, NRECA’s cybersecurity program manager.

Experts recommend a combination of people, processes, and technologies to ensure that employees can reach the data they need, but only the data they need. The process, Hsu says, begins by determining what is valuable, where it’s located on the network, and how it’s accessed. Then decide who should be able to get to these assets, and

create layers of defenses to limit access based on job responsibilities.

Known as a defense-in-depth strategy, possible layers of defense include:

• Establishing policies and using technology to enforce the principle of “least privilege;” no user should be allowed administrative or gen-eral access to assets and systems on the network unless it’s absolutely needed to perform their job;

• Establishing policies, training staff, and using technology to ensure someone is who they say they are. This includes using strong passwords, updating passwords at least annually, and

implementing a multi-factor authentication program;

• Using technology to limit unnecessary communications between desktops, laptops, mobile devices, printers, routers, servers, worksta-

tions, and other devices;

• Creating separations in your network using internal firewalls or demilitarizedzones (DMZs) between critical systems/assets and less-critical systems/assets;

Limit the DamageNot everyone should have the ‘keys to the kingdom’By Bob Gibson

Page 11: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

Identify target data

Internal Recon

Identify exploitable vulnerabilities

Initial Recon

Gain initial access to target

Initial Compromise

Strengthen position within target

Establish Foothold

Steal valid user credentials

EscalatePrivileges

Package and steal target data

Complete Mission

Mai

ntai

n Presence Lateral Movem

ent

(11)

Taking StockA tool to assess your co-op’s cybersecurity postureBy Bob Gibson

How robust are your cooperative’s cybersecurity defenses? It’s a question that can be hard to answer, particularly for smaller utilities.

There are many tools that can help assess an organiza-tion’s cybersecurity posture, but “the biggest need we have is for a cybersecurity guide that is scaled to utili-ties of our size,” says Mark Hayden, CEO of Missoula Electric Cooperative, a Montana co-op that serves about 14,500 meters.

To fill this gap, NRECA’s Rural Cooperative Cybersecu-rity Capabilities (RC3) Program developed a self-assess-ment tool specifically designed for small- and mid-sized utilities with few or no IT employees.

The tool, which is in field testing at cooperatives around the country, is designed to be a cross-depart-mental team exercise. The process walks the organi-zation through a series of questions about their cyber capabilities and practices, and assigns a ranking based on the maturity of the utility’s program.

“The cross-department engagement was awesome,” says Kirk Garrett, vice president of safety and loss con-trol at Laurens Electric Cooperative in South Carolina, one of the field test participants.

“It absolutely made sense for the non-IT people to be there,” agreed Matt Stanley, vice president of finance and accounting at Laurens Electric.

“Going through the self-assessment will give co-ops a baseline for their current capabilities, identify priorities for improvement, and help them document their prog-ress over time,” says Cynthia Hsu, NRECA’s cyberse-curity program manager and head of the RC3 program.

The RC3 team will make changes to the tool based on recommendations from the field tests, and a final ver-sion will be released to all cooperatives.

• Using technology to detect threats and filter incoming files to prevent them from reaching end users;

• Regularly patching computers, network equipment, and substation devices and equipment.

Hsu says deploying strong network defense techniques can be disruptive, particularly if employees aren’t supportive of policy changes that limit their access to the internet or certain files or drives. They may question

why they’re no longer allowed to download software directly, or why they have to install security systems onto their mobile phones.

“Ultimately, it’s a question of convenience vs. security,” says Edward VanHoose, general manager of Clay Elec-tric Cooperative. “How much convenience do we need versus how much security are we willing to give up?”

Credit: FireEye Report: https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html

Page 12: 0000 August 2018 Cooperative Cybersecurity · benefits, also create openings for cybercriminals, and our data is an attractive commodity. As cooperatives ramp up capabilities in the

(12)

This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.

$7.5 millionreceived from the U.S. Department of Energy in 2016 for RC3, a 3-year

program to work withcooperatives’ as they

improve their cyber andphysical security.

NRECA’s Rural Cooperative CybersecurityCapabilities Program (RC3)*

August 2018 This material is based upon work supported by the Department of Energy National Energy Technology Laboratory under Award Number(s) DE-OE0000807.

194sta� from 152 electric co-ops received cybersecurity awareness training at six RC3 Cybersecurity Summits in 2017.

40 co-ops are helping each other and

the broader co-op community learn cybersecurity skills

through the RC3 SANS Voucher Training

Program.

One

(1)

00100001100001011101000010000001110100011010000110010101110010011001010010011001110010011100110111000101110101011011110011101101110011001000000110000101111100101110100011010000110100101101110011001110010000001110111011100100 1101111011011100110011100100000011101110110100101110100011010000010000001110100011010000110000101110100001011100010000001010011011100000110111101101110011001110110010101110111011011110 1110010011101000110100001 111001001011100010000001001110011001010111011101101101011000010110111 010000001001101011000010111001101110100011001010111001000100000011011110110011000100000011110010110111101110101011100100010000001000100011011110110110101100001011010010110111000100000010001110110010101110 00001000000110111101110101011101000010000100100000000010100101001101110101011011010 111011010110010101110010001000000110111101 1001100010000001000111011001010 1101111011100100110011101100101001000000100011001110010011010010110010101101 110011001000111001100100000010101000110100001100101001000000101001001100001011000110110100001100101011011000010000001010011011011010110010101101100011011000111100100100000010000110110000 101110100001000000101011101100101001000000111011101100101011 001001100101001000000110111101101110001000000110000100100000011000100111001000100000011001000000110111010110000101101011001000010010000000001010010001100110000101101101011010010110110001111001001000000100110101101011101000111010001100101011100100111001100100000010010001101001011001000010000001001001001000000110010001101111 0001110100011010000110000101110100001111110010000000001010010000110110100001100101011001010111001001110011001000000100 1100011000010111001101110100001000000100001101100010110110001101100000100000010001010101001000100000010001110110010101101111011100100110011101100101001000000100001101101100011011110110111101101110011001010111100100100000010101000110100001100101001000000101001001100101011000010100100000101100001000000101011101101111011100100110110001100101000000101000001110101011000110110101100100000000010100101010001101001100001011011100110011101100101011100100111001100100000011100000110100101100011011010110110010101100100001000000111010001101111001000000110110001100100000011001000000011101100110010100100000011010010110111000000001010011011011010110010101101100011011000111100100100000010000110110000 101110100001000000101011101100101001000000111011101100101011 00100110010100100000011011110110111000100000011000011010110000101101011001000010010000000001010010001100110000101101101011010010110110001111001001000000100110101101011101000111010001100101011100100111001100100000010010001101001011001000010000001001001001000000110010001101111 00011101000110100001100001011101000011111100100000000010100100001101101000011001010110001111001010111001001110011001000000100 11000110000101110011011101000010000001000011010001010110110001101100001110010000001000000100010101010010001000000100011101100101011011110111001001100111011001010010000001000011011011011011100110010101111001001000000101010001101000011001010010000001010010011001010110001011

More than 100 co-op sta� who participated in the RC3 Self-

Assessment Research Program said it will help their co-op improve its

cybersecurity capabilities.

leadership sta� at 36 co-ops received cybersecurity training

in 2017 and helped build anRC3 Self-Assessment toolkit.

co-op network, with NRECA’s leadership, fostering a culture of cybersecurity.

$

* RC3 is starting the final year of this 3-year e� ort.

copies of RE Magazine’s supplement and articles on cybersecurity

distributed to members.

22,000200+