ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2014 National Cybersecurity and Communications Integration Center 15' Homeland Securlty I CS-C E RT Yea r in Revi ew — 2014 What’s Inside Welcome 1 ICS-CERT Introduction 2 ICS-CERT 2014 Highlights 3 ICS-CERT Watch Floor Operations 4 Incident Response 6 Vulnerability Coordination 8 Technical Analysis 9 Assessments 10 Training 12 ICSJWG 14 Moving Forward 16 Sector Specific Onsite Support 18 ICS-CERT FY 2014 Metrics 19 ICS-CERT CY 2014 Metrics 19 Homeland Welcome As industrial control systems ICES grow more advanced and interconnected the threat of cyber attack against our Nation '5 critical infrastructure Cl grows even greater Since its inception the Industrial Control Systems Cyber Emergency Response Team has stayed true to its mission to assist Cl asset owners in reducing the risk of cyber attack Throughout the last 10 years has continued to expand and improve its capacity to provide these vital services In 2014 the increasing trend of ICS devices connecting directly to the Internet intentionally or unintentionally was a serious concern Shodan Google and other search engines have enabled threat actors to easily discover and identify a variety of Internet facing ICS devices Adding to the threat landscape is the continued scanning and cataloguing of devices known to be susceptible to emerging vulnerabilities such as the Heartbleed vulnerability The search terms needed to identify ICS devices are widely available because of an increasing public body of knowledge with detailed ICE speci c terminology The availability of this information coupled with the aforementioned tools lowers the level of knowledge required to successfully locate Internet facing control systems In many cases these devices have not been con gured With adequate authentication mechanisms thereby further increasing the chances of both opportunistic and targeted attempts to direetly access these components As these tools and the capabilities of adversaries advance we expect that exposed systems will be more effectively discovered and targeted by adversaries 2014- demonstrated ICS-CERT's ability to grow and evolve to meet the public and private sector needs of CI asset owners experienced an increase in onsite assessments ICS-CERT Year in Review 2014 information products released copies of the Cyber Security Evaluation Tool distributed or downloaded Industrial Control Systems Joint Working Group ICSIWG memberships speaking engagements number of training sessions and professionals trained The hard worlt and dedication of personnel resulted in many impressive achievements and highlights over the course of the past year conducted an intensive action campaign providing classi ed brie ngs to the critical infrastructure community on the Have and BlackEnergy malware threats to Vulnerability Coordination and Incident Response Teams released detailed and timely advisories conducted brie ngs in 15 cities and hosted Mo webinars on the Heartbleed vulnerability and one Webinar on the BlackEnergyl'Havex threats The Assessments Team deployed to 21 different states to conduct 104 onsite cybersecurity assessments The Training Team launched new online training modules incorporating a new blended learning approach The CSET DevelopmentTeaJn released two new versions of CSET 6 0 in February and 6 1 in August While 2015 is sure to bring additional and evolving cybersecurity threats is prepared to meet the challenge and support the Cl community as we combine efforts to reduce cyber risks that threaten our NationIndustrial Control Systems Cyber Emergency Response Team Department of Homeland Security Government Coordinating Council GCC Chair I CS-C E RT Yea r in Revi ew — 2014 ICS-CERT Introduction America’s economic and national security relies on the resilience and reliability of the Nation’s critical infrastructure CI Presidential Policy Directive 21 PPD-21 “Critical Infrastructure Security and Resilience ” identifies 16 CI sectors see table below The Industrial Control Systems Cyber Emergency Response Team’s ICS-CERT mission is to assist owners of CI in the 16 sectors to improve the overall cybersecurity posture of their industrial control systems ICSs In addition to working with ICS owners operators and vendors ICS-CERT coordinates its efforts with Federal state local and tribal governments ICS-CERT operates within the National Cybersecurity and Communications Integration Center NCCIC a division of the Department of Homeland Security’s DHS National Protection and Programs Directorate NPPD NCCIC’s mission is to operate at the intersection of the private sector civilian law enforcement intelligence and defense communities applying unique analytic perspectives ensuring shared situational awareness and orchestrating synchronized response efforts while protecting the Constitutional and privacy rights of Americans in both the cybersecurity and communications domains ICS-CERT’s activities are composed of four operations functions and four risk reduction functions Operations functions include incident response vulnerability coordination situational awareness and technical analysis Risk reduction functions include cybersecurity assessments the Cyber Security Evaluation Tool CSET training and the Industrial Control Systems Joint Working Group ICSJWG CI asset owners benefit from ICS-CERT’s cybersecurity services in many ways including an increased awareness of emerging threats state-of-the-art analysis incident response support established partnerships and collaboration with other agencies and partners By extension Americans benefit from ICS-CERT’s work with access to a more secure and resilient CI which undergirds our economy and provides many of the critical services we rely on every day 16 Critical Infrastructure Sectors 2 Chemical Dams Financial Services Information Technology Commercial Facilities Defense Industrial Base Food and Agriculture Nuclear Reactors Materials and Waste Communications Emergency Services Government Facilities Transportation Systems Critical Manufacturing Energy Healthcare and Public Health Water and Wastewater Systems IC S -C ERT Year in Rev iew — 2014 ICS-CERT 2014 Highlights • Havex and BlackEnergy Activities The ICS-CERT Team conducted an action campaign to provide classified briefings with contextual and detailed information about Havex and BlackEnergy malware for private sector CI asset owners These briefings covered 15 cities from November 25 through December 11 ICS-CERT also hosted a webinar and released multiple alerts and advisories with detailed actionable information related to the malware characteristics as well as methods for detecting compromise and improving cyber defenses ICS-CERT reached nearly 1 400 participants across all 16 CI sectors with these briefings • Heartbleed OpenSSL Activities The Vulnerability Coordination Team released detailed and timely advisories conducted briefings and hosted two webinars featuring the original researchers who discovered the Heartbleed OpenSSL vulnerability The team acted quickly to identify affected ICS products and developed multiple alerts in coordination with the vendor community to prevent any major incidents • Onsite Assessments The ICS-CERT Assessments Team deployed to 21 different states conducting 104 onsite cybersecurity assessments to assist CI asset owners in strengthening the overall cybersecurity posture of their ICSs • “Safeguard” Assessments ICS-CERT and the Federal Energy Regulatory Commission’s FERC Office of Energy Infrastructure Security OEIS introduced a new technical service offering entitled “Safeguard ” This engagement provided select asset owners with proactive and customized cyber assessment services based on their specific interest and area of focus • Online Training The ICS-CERT Training Team launched new online training modules with a blended learning approach which makes accessing course material easier and more efficient reduces redundancy in training materials and eliminates the need to travel to participate in ICS-CERT training • CSET Tool The CSET Development Team released two new versions of CSET in 2014 CSET 6 0 in February and CSET 6 1 in August The latest version includes the National Institute of Standards and Technology NIST Framework which allows asset owners to create their own question sets and provides industry organizations the ability to collaborate in creating and sharing question sets 3 I CS-C E RT Yea r in Revi ew — 2014 Photo credit Stephen Barrett DHS OPA ICS-CERT Watch Floor Operations Information Sharing and Situational Awareness The ICS-CERT watch floor is staffed by approximately two dozen analysts and incident handlers across two geographically separate watch floor locations These watch floors handled numerous operational activities which include responding to reported cyber incidents providing recovery and mitigation support vulnerability coordination and analysis interfacing with law enforcement and the Intelligence Community and providing situational awareness alerts and advisories to warn of cyber threats affecting the Nation’s critical infrastructure In 2014 ICS-CERT expanded its information sharing initiatives through webinars and teleconferences with public and private sector partners ICS-CERT also works closely with Information Sharing Analysis Centers ISACs researchers vendors sector specific agencies industry associations and other partners across the Nation’s 16 CI sectors to coordinate cyber risk reduction efforts In fact it is these 4 strong partnerships with key stakeholders across all sectors and government agencies that put ICS-CERT in the unique position of providing clear situational awareness of the threat landscape and associated defensive measures Timely and accurate information is essential to cybersecurity preparedness In 2014 ICS-CERT tracked and responded to multiple newly discovered cyber campaigns that had been ongoing for several years The delayed time to discovery coupled with the tactics of the threat actors was of great concern to ICS-CERT particularly when considering the potential for a large victim footprint across the Nation’s CI sectors Accordingly ICS-CERT leveraged well-established relationships to encourage asset owners to be more proactive in reporting incidents which then provided a better understanding of the depth and breadth of these campaigns by sophisticated threat actors Asset owners from across all CI sectors responded by engaging in briefings webinars and teleconferences and by reporting cyber activity to ICS-CERT In 2014 ICS-CERT continued to strengthen its trusted relationships with asset owners as they reported cyber incidents impacting their networks and utilized situational awareness information to detect intrusions and improve their defensive posture The number of returning customers also increased in 2014 as partners shared information on observed threat activity which was then used anonymously to develop alerts and warn the entire community The frequent reporting information exchanges and situational awareness updates have all helped lower the overall risk to CI Who is Reporting Cyber Incidents The watch floors also coordinated with other sections of the ICS-CERT to provide all aspects of incident response services including digital media analysis onsite response and recommendations for improving cyber defenses FY 2014 incidents reported by reporting entity 245 total 5 I Review - 2014 Commun ications 14 6% Commercial Facilities 7 3% Chemical 4 2% Unknown 6 2% Water 14 6% Transportation 12 5% Nuclear 6 2% Informat ion Technology 5 2% Healt hca re 15 6% 7 Government Facilit ies 13 5% Finance 3 1% Food and Ag 2 1% FY 2014 incidents reported by sector 245 total Incident Response ICS-CERT supports CI asset owners by responding to cyber incidents emerging threats and vulnerabilities impacting organizations that operate ICSs An essential element of our mission success is the coordination effort with partners across all I 6 CI sectors In addition ICS-CERT collaborates with international and private sector Computer Emergency Response Teams CERTs to share control systems-related security incidents and mitigation measures The coordination among these partners provides ICS-CERT with a unique perspective of the overall cyber-risk landscape and emerging threats ICS-CERT conveys this information through outreach activities briefings and information products such as alerts and advisories as well as technical information papers recommending strategies for improving cyber defense Incident response is fundamental to ICS-CERT's mission to assist CI asset owners in reducing cyber risks to critical infrastructure At the request of private industry asset owners ICS-CERT provides incident response services to assess the extent of the compromise identify the threat actor's techniques and tactics and assist the asset owner to develop strategies for mitigation recovery and improving cyber defenses for the future These mitigations are specific 6 to the cyber threat and needs of the organization In FY 2014 ICS-CERT received and responded to 245 incidents as reported by asset owners and industry partners The scope of incidents encompassed a vast range of threats and observed methods for attempting to gain access to both business and control systems infrastructure including but not limited to the following • Unauthorized access and exploitation of Internet facing CS Supervisory Control and Data Acquisition SCADA devices • Exploitation of zero-day vulnerabilities in control system devices and software • Malware infections within air-gapped control system networks • Structured Query Language SQL injection and application vulnerability exploitation • Network scanning and probing • Lateral movement between network zones • Targeted spear-phishing campaigns and • Strategic web site compromises a k a watering hole attacks Miscellaneous 21 9% Weak Authentication 13 5% Network Scanning Probing 53 22% Removable Media 5 2% Brute Force Intrusion 3 1% Abuse of Access Authority 9 4% Spear Phishing 42 17% - SQL Inj ection 5 2% FY 2014 incidents reported by access vector 245 total In FY 2014 ICS-CERT observed greater variety in the characteristics of the reported incidents Whereas spear phishing is still a popular infection vector because of its effectiveness a wider variety of techniques was reported this year While ICS-CERT has previously observed strategic watering hole attacks a new technique uses trojanized software installers at various vendors' sites to install malware on the unsuspecting user's network along with the software update Many of the victims were unaware they were compromised As expected social engineering continued to be a popular attack method enhanced by the use of social media In some cases this yielded greater success for attackers The year also saw multiple malware families targeting CS-specific functionality underscoring the evolving landscape and the recognition by adversaries of high-stakes ICS targets In response to these and other threats ICS-CERT provided remote and onsite incident response support conducted technical analysis of artifacts and malware and developed mitigation strategies for owners and operators In coordination with the Federal Bureau of Investigation FBI ICS-CERT launched a call to action campaign providing classified briefings in 1 S cities a secret-level secure video teleconference and an unclassified webinar The purpose of this campaign was to inform private sector CI stakeholders of the threat and to provide mitigation strategies for detecting and defending against malicious activity ICS-CERT issued several alerts with detailed information regarding the malware as well as detection signatures to aid in identifying if the malware files are present on a given system Sharing information about cyber incidents is essential to improving the overall security posture of our Nation's CI We encourage CI asset owners to contact ICS-CERT for assistance with responding to a cyber incident affecting the control systems environment ICS-CERT is able to leverage the breadth of knowledge available through our government and community partnerships to improve awareness and provide actionable information to the entire community without disclosing the identity or sensitive information about the reporting organization 7 I CS-C E RT Yea r in Revi ew — 2014 Vulnerability Coordination ICS-CERT coordinates vulnerability activities with ICS owners operators and vendors and with Federal state local and tribal governments to reduce the likelihood of a successful cyber attack against CI control systems The ICS-CERT vulnerability handling process involves five basic steps 1 detection and collection 2 analysis 3 mitigation coordination 4 application of mitigation and 5 disclosure ICS-CERT attempts to coordinate all reported vulnerabilities with the associated vendor and works to publicly disclose the vulnerabilities in a timely manner In November 2014 the Vulnerability Coordination team released a Vulnerability Coordination report detailing its activities from 2010–2013 This report provides trend analysis for all vulnerabilities reported to ICS-CERT and gives descriptions details and metrics for the most commonly identified vulnerabilities The report shows that improper input validation at 61 percent of reported vulnerabilities is by far the most common 8 Heartbleed Vulnerability The Vulnerability Coordination team devoted a significant amount of time and effort to combating the Heartbleed OpenSSL vulnerability in 2014 These efforts resulted in the release of several advisories briefings and two webinars on the topic The advisories listed vendors and products reported to be vulnerable and announced vendor patches as soon as they became available The advisories also included methods for asset owners to determine whether they were running vulnerable products To defend against exploitation Snort signatures and other signatures suggested by the FBI were provided to asset owners for use in determining if they were actively being exploited ICS-CERT’s first webinar on the Heartbleed OpenSSL vulnerability was aimed at a more limited audience of vendors and some asset owners The second webinar was open to a wider audience Each webinar featured an explanation of Heartbleed from the original researchers who discovered the vulnerability IC S -C ERT Year in Rev iew — 2014 Technical Analysis The Advanced Analytical Laboratory AAL provides research and analysis capabilities in support of the incident response assessment and vulnerability coordination activities of ICS-CERT The AAL’s expert cybersecurity researchers perform forensic analysis on digital media reverse engineer malware and respond to cyber incidents with both onsite and remote capacity When possible analytical efforts are performed remotely in a laboratory environment using custom tools and techniques In some cases however onsite analysis is required and a team is deployed to perform analytical efforts directly on the owner’s network In 2014 the AAL focused on automating and streamlining the lab’s analytical capabilities Improvements for the year included the following • Completion of a remote incident response network RIRN The RIRN allows analysts to remotely and securely perform an incident response engagement with an asset owner After an initial equipment installation AAL analysts can remotely sweep the asset owner’s network for indications of compromise This allows analysts to spend multiple weeks on an engagement and provides a thorough in-depth examination of the company’s network • Automation and integration of forensic analysis tools in a suite called the Analyst Network Tool ANT ANT brings together custom and commercial forensic tools in an integrated environment allowing multiple drive images to be processed simultaneously reducing the amount of analyst hands-on time ANT has greatly reduced the turnaround time for digital forensic analysis providing faster results to companies responding to a compromise • Development of a custom application called the Correlating Extensive Incident Response CEIR tool to analyze data collected during an incident response The CEIR tool allows the user to consolidate the many types of data collected into a single user-friendly database and helps identify known and unknown threats The AAL uses the CEIR tool in both onsite and remote incident response engagements With these improved analytical capabilities the AAL performed in-depth analysis of numerous malware samples associated with multiple watering hole and ICS-focused threat campaigns These efforts helped uncover sophisticated threat actor techniques and tactics which allowed ICS-CERT to publish multiple alerts warning the community of the threat and providing information for detecting and mitigating intrusion activity 9 I CS-C E RT Yea r in Revi ew — 2014 Assessments In FY 2014 ICS-CERT conducted 104 onsite cybersecurity assessments These assessments which are based on standards guidelines and best practices assist the Nation’s CI asset owners to strengthen the cybersecurity posture of their ICSs The assessment methodology provides a structured framework that asset owners and operators can use repeatedly to assess re-assess protect detect and continually validate the cybersecurity of their ICS networks ICS-CERT’s onsite cybersecurity assessment services include the following assessment types • Onsite guided Cyber Security Evaluation Tool CSET Assessment • Design Architecture Review DAR • Network Architecture Verification and Validation NAVV CSET is a stand-alone software tool that enables users to assess their network and cybersecurity methodology against recognized industry and government standards guidelines and best practices ICS-CERT released two new versions of the CSET tool in 2014 CSET 6 0 released in February included the ability to trend compare and merge assessments and 10 CSET 6 1 released in August included the NIST Framework which allows asset owners to create their own question sets and provides industry organizations the ability to collaborate in creating and sharing question sets The DAR assessment provides ICS asset owners with a comprehensive evaluation and discovery process focusing on defense strategies associated with an asset owner’s specific control systems network The DAR includes an in-depth review and evaluation of the control system’s network design configuration interdependencies and its applications ICS-CERT provides a detailed DAR report and with expert guidance positions the requesting facility’s ICS for improved security and resiliency The NAVV assessment provides a sophisticated analysis of network packet-data which is collected by the asset owner from within their control system network environment ICS-CERT passively analyzes the data using a combination of open source and commercially available tools and develops detailed representation of the communications flows and relationships between devices The NAVV also provides a practical method for asset owners to baseline the deterministic network traffic occurring within the control systems ICS-CERT Year in Review - 2014 FY 2014 Onsite Assessments • • • • 0 1-2 3-5 6 -20 21 104Total Assessments for FY 2014 Total FY 20 14 ICS-CERT onsite assessments by state environment In addition the service offering provides asset owners with a means to identify anomalous and potentially suspicious communications sourced from or destined for control systems assets In addition to these assessment offerings in FY 20 14 ICS-CERT and FERC's OEIS introduced a new proactive technical service offering entitled Safeguard These one-week engagements provide select asset owners with a menu of various proactive service offerings which are tailored and customized based on the asset owner's specific interest and area offocus Some common examples ofservices performed for these engagements include the following • Facilitated control systems security assessments and network architecture reviews • Passive network-based validation and detailed analysis of control system network traffic • Active host-based scanning for indicators of compromise and anomalous behavior within an organization's enterprise environment In FY 2014 ICS-CERT completed six Safeguard assessments These services provide enhanced value for asset owners during a week-long engagement including the following • Verification and validation of security controls based on the current threat landscape and an understanding of adversarial capabilities and tactics • Relationship building and collaboration with DHS • Tailored and prioritized recommendations and guidance based on an organization's existing architecture security controls and security posture Total FY 2014 onsite assessments by type Type ofAssessment Fiscal Year 2014 CSET 49 DAR NAVY 35 11 I CS-C E RT Yea r in Revi ew — 2014 Training Training is a critical component of the ICS-CERT program ICS-CERT performs outreach activities through training and education programs to help CI sectors and the control systems community better understand the cybersecurity risks associated with ICSs In 2014 the program adopted a blended learning approach to enhance training opportunities A new course Introduction to ICS Cybersecurity blends web-based and instructor-led methods The curriculum is made up of ten modules and is available online at no cost The challenges solved by the blended learning approach are three-fold First trainees have asked for materials in a format that is more efficient and easier to access Web-based training allows trainees to access the course on their own time in a setting that allows for asynchronous interaction and it is self-paced to better fit trainees’ work schedules 12 The second challenge was to reduce redundancy in the training materials As the ICS-CERT Cybersecurity Training Program has matured and developed new course materials to support its growth the courses were designed to build on each other Ideally a trainee would complete the Introduction to ICS Cybersecurity course followed by Intermediate Level courses and eventually complete the 5-day hands-on Technical Level ICS Cybersecurity Training These courses have no prerequisites for enrolling and include a test-out option As a result trainees can begin courses at the level appropriate to their cybersecurity experience and knowledge with the confidence that they are prepared for the more technical course work To further streamline the online training process and eliminate redundancy ICS-CERT has removed remedial material from the more technical courses The third challenge for some people is the travel required to participate in training Web-based courses alleviate the time cost and inconvenience of traveling to attend multiple in-person sessions IC S -C ERT Year in Rev iew — 2014 In addition to blending methods and creating web-based modules the program employs a learning management system LMS The LMS is a software application for the administration documentation tracking reporting and delivery of training courses The benefits of this service are as follows • Creates a unique user ID and provides credit for course completion • Provides training courses using varied multimedia approaches video audio PowerPoint Flash • Facilitates interoperability between eLearning software products through compliance with Sharable Content Object Reference Model SCORM web-based training courses • Enables live training events training invitations selfregistration and attendance tracking • Assists in tracking analyzing and reporting course statistics Over 4 760 trainees have initiated online training and have accessed the courses from multiple states and countries Additional ICS-CERT Training highlights for 2014 include the following • Initiated online introductory and intermediate courses in 10 modules • Resumed quarterly regional training which takes introductory and intermediate classroom training to trainees in their own region In 2014 regional classroom training was held in Alabama and Houston Five regional classroom training sessions are planned for 2015 • Provided 11 technical-level cybersecurity training sessions to 436 participants These 5-day courses provide intensive hands-on training and a 12-hour red team blue team exercise that simulates a corporate espionage scenario • Ensures course availability on desktop or mobile device iPads iPhones or Android devices 13 I CS-C E RT Yea r in Revi ew — 2014 Industrial Control Systems Joint Working Group The ICS-CERT established the Industrial Control Systems Joint Working Group ICSJWG to enhance collaboration between ICS stakeholders and facilitate partnerships between the Federal Government and private sector owners and operators in all CI sectors The goal of the ICSJWG is to secure CI by accelerating the design development and deployment of secure ICS 2014 Spring Meeting The ICSJWG 2014 Spring Meeting was held in Indianapolis Indiana and was attended by approximately 220 people including asset owners and operators government professionals vendors systems integrators and academic professionals from around the globe Key highlights from the meeting were an opening keynote presentation by Indiana Governor Mike Pence as well as two more keynote 14 presentations from CS C Deputy Assistant Secretary Gregory Touhill and NCCIC Director Larry Zelvin Presentations also included demos and lightning round talks that offered the opportunity for attendees to discuss the latest initiatives impacting the security of ICSs and the risk of threats and vulnerabilities to these systems 2014 Fall Meeting The ICSJWG 2014 Fall Meeting was held in Idaho Falls Idaho hosting approximately 175 attendees from the worldwide community This meeting included a classified briefing and tours of the Idaho National Laboratory facilities Further highlights include keynote remarks by the DHS Assistant Secretary for CS C Dr Andy Ozment Because of the positive reception of demonstrations and lightning round talks in previous meetings those venues were expanded to allow more opportunity for participation IC S -C ERT Year in Rev iew — 2014 The ICSJWG Steering Team The ICSJWG Steering Team IST held its first face-to-face meeting in Indianapolis and discussed a variety of topics including ways to improve the ICSJWG bi-annual meetings and the overall working group moving forward The IST is made up of members representing roles such as asset owners vendors state local and tribal governments industry associations university academia consultants integrators and the international community By bringing this diverse group together the ICSJWG hopes to improve the partnership between the public and private sectors in working together to secure our Nation’s CI ICSJWG Webinars Another outreach opportunity the ICSJWG has offered to the community is a series of webinars that focus on specific topics related to ICS cybersecurity During FY 2014 ICSJWG webinars covered various topics including the following • I Think Therefore I Fuzz—demonstration explaining the fuzzing process and how fuzzing can help users find their systems’ vulnerabilities before attackers • Online Real Time Monitoring for Change Identification—introduction to the Sophia software tool that assists control system owners in learning how their systems communicate and quickly identify new and unexpected connections • The New Paradigm for Information Security Assumption of Breach—review and discussion of the change from a defined perimeter defense to an assumption of breach of critical systems and suggestions on how to respond The ICSJWG is looking forward to offering a flexible and resilient approach as well as a substantial platform for the public and private sectors to collaborate on cybersecurity for the global infrastructure in FY 2015 15 I CS-C E RT Yea r in Revi ew — 2014 Moving Forward In 2015 ICS-CERT will continue to improve cybersecurity capabilities and extend services in support of all ICS stakeholders in the 16 CI sectors ICS-CERT will continue coordination efforts with industry and government partners to mitigate cyber risks to CI through timely and effective sharing of situational awareness information and mitigation strategies To further improve onsite assessments ICS-CERT will pursue more one-on-one engagements with CI asset owners on the use of CSET and assist them in identifying gaps and developing strategies for improving their defensive posture The Assessment team’s SafeGuard Initiative will also further aid asset owners in the Energy industry to assess critical assets for intrusion and security gaps In addition to extending onsite assessments ICS-CERT will develop and publish control system specific technical guidance related to recommended practices and defensive 16 strategies for protecting against ever-evolving threats These guidance documents will send a clear message about what ICS-CERT finds important and which threats are of greatest concern Other goals for 2015 include improving and expanding ICS-CERT technical teams and tools which will provide greater value during incident response and assessment activities We will also continue to improve training offerings and expanded training curriculum which will allow CI asset owners to better meet the demands of challenging and evolving technical issues in control system security It is uncertain what new cybersecurity threats will emerge in 2015 but ICS-CERT stands prepared to meet the challenge and help CI asset owners prevent attacks or mitigate their harmful effects lif- hl'l gs Raw AN A i Kfir P au l Year in Review 2014 I CS-C E RT Yea r in Revi ew — 2014 Sector Specific Onsite Support FY 2014 This table compares the overall sector support statistics for onsite assessments in Fiscal Years 2012 2013 and 2014 Sector Chemical Sector Commercial Facilities Sector Communications Sector Critical Manufacturing Sector Dams Sector Defense Industrial Base Sector Emergency Services Sector Energy Sector Financial Services Sector Food and Agricultural Sector Government Facilities Sector Healthcare and Public Health Sector Information Technology Sector Nuclear Reactors Materials and Waste Sector Transportation Systems Sector Water and Wastewater Systems Sector Totals Number of Sectors Assessed 18 FY 2012 4 2 0 1 0 12 3 7 6 0 3 1 5 8 10 25 87 13 16 FY 2013 0 0 2 0 0 1 0 18 0 0 2 5 2 8 10 24 72 9 16 FY 2014 1 2 0 0 0 0 0 43 0 0 5 0 0 5 10 38 104 7 16 ICS-CERT Year in Review - 2014 ICS-CERT FY 2014 Metrics This table compares the overall incident vulnerability onsite event and information product statistics for Fiscal Years 2012 2 0 13 and 2014 indicating control system cyber events and activity ICS-CERT FY 2014 Metrics ICS Incident reported - Tickets ICS Incident Response Onsite Deployments CS-Related Vulnerability Report - Tickets NCCIC ICS-CERT Information Products 2012 totals 2013 totals 2014 totals 197 257 245 6 7 4 137 187 159 347 295 339 6 631 5 085 5 132 89 72 104 2 327 693 800 56 17 21 ICSJWG Membership 1 371 1 476 1 726 Speaking Engagements 205 162 168 Conference Exhibitions 22 2 0 6 4 6 CS-RelatedVulnerability Report - Tickets 147 181 167 NCCIC ICS-CERT Information Products 343 285 362 5 584 4 175 6 364 89 78 106 2 241 445 1 048 52 12 27 ICSJWG Membership 1 416 1 544 1 733 Speaking Engagements 200 147 188 Conference Exhibitions 19 1 0 Distributed or Downloaded CSET Onsite Assessments Professionals Trained Number ofTraining Sessions ICS-CERT CY 2014 Metrics This table compares the overall incident vulnerability onsite event and information product statistics for Calendar Years 2012 2 0 13 and 2014 indicating control system cyber events and activity ICS Incident Response Onsite Deployments Distributed or Downloaded CSET Onsite Assessments Professionals Trained Number ofTraining Sessions 19 fun mild g 1 Assistance from ICS-CERT is only a phone call away CS-CERT encourages you to report suspicious cyber activity and vulnerabilities affecting critical infrastructure control systems To report control systems cyber incidents and vulnerabilities contact CS-CERT Toll Free I-877-776-7585 International Callers I -208-526-0900 ics-cert@hq dhs gov For industrial control systems security information and incident reporting http I ics-cert us-cert gov For more information about CS-CERT visit https I lies-cert us-cert govI About-Industrial-Control-Systems-Cyber-Emergency-Response-Team J n f frivm q $33391 1 2 1 time-4 - 5 3 u- - gr Homeland National Cybersecurity and 1 Communications Integration Center 14 50126
OCR of the Document
View the Document >>