Energy and Utilities

Attacks on critical infrastructure pose a threat to national security.

Cybersecurity attacks may threaten energy systems, electric utilities and the electric grid, water systems, aviation systems, and food and agriculture systems. Sophisticated attacks may even support espionage, extract high-value intellectual property, and compromise networks to lay a foundation for future exploits.

In our modern society, energy is at the heart of supplying critical and even life saving facilities across the nation. Nation threat actors have significantly ramped up their activities of cyber war and are determined to damage or incapacitate our critical infrastructure to hurt citizens and destroy our way of life without a single shot being fired!

Enhance your energy and utilities cybersecurity with Highgate.

Highgate Cyber Security, with the help of our alliance partners and leading consultants is determined to help protect our energy industry. Let us know how we can help you. We will enhance your security posture within days not weeks.

Ransomware threats against critical infrastructure

There have been several high-profile ransomware attacks on critical infrastructure in recent years, including attacks on energy and water utilities, transportation systems, and healthcare providers. Here are some recent statistics on ransomware attacks on critical infrastructure:

  1. In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a significant increase in ransomware attacks on industrial control systems (ICS) and critical infrastructure. These attacks involved a range of sectors, including manufacturing, energy, and transportation.
  2. According to a report by cybersecurity firm Dragos, there were at least five ransomware attacks on operational technology (OT) networks in 2020, including attacks on energy and manufacturing companies.
  3. The 2021 Data Breach Investigations Report by Verizon found that ransomware was involved in 10% of all data breaches in the public sector, which includes critical infrastructure organizations.
  4. In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United States, was hit by a ransomware attack that caused a temporary shutdown of its operations. This incident highlighted the vulnerability of critical infrastructure to cyber attacks.
  5. According to a report by cybersecurity company CrowdStrike, the number of ransomware attacks on critical infrastructure increased by 158% in the first half of 2021 compared to the same period in 2020.

These statistics highlight the growing threat of ransomware attacks on critical infrastructure and the need for organizations responsible for these systems to take proactive measures to protect against cyber threats.

Why NERC CIP?

The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards are a set of cybersecurity regulations designed to ensure the reliability and security of the bulk power system in North America. While the importance of each standard may vary depending on the specific context and requirements of an organization, there are a few key NERC CIP standards that are widely considered crucial:

  1. CIP-002-5.1: BES Cyber System Categorization: This standard lays the foundation for the application of security controls by categorizing the cyber systems within the Bulk Electric System (BES) based on their criticality. It helps identify which systems are most important to protect, ensuring that resources are allocated appropriately.
  2. CIP-003-8: Security Management Controls: This standard establishes requirements for implementing security management controls that form the basis of an organization’s cybersecurity program. It covers areas such as risk assessment, security policies, personnel and training, and incident response planning. Compliance with this standard is essential for establishing a robust cybersecurity framework.
  3. CIP-004-6: Personnel and Training: This standard focuses on ensuring that personnel with authorized cyber or unescorted physical access to critical cyber assets (CCAs) have the necessary knowledge, skills, and training to perform their duties securely. It sets requirements for background checks, training programs, and access controls, aiming to reduce the risk of insider threats.
  4. CIP-005-6: Electronic Security Perimeter(s): This standard focuses on securing the electronic perimeters that protect Critical Cyber Assets (CCAs). It establishes requirements for firewalls, intrusion detection systems, and other security measures to protect against unauthorized access. Securing the electronic perimeter is crucial for preventing external cyber attacks and minimizing the potential impact on the BES.
  5. CIP-010-3: Configuration Change Management and Vulnerability Assessments: This standard emphasizes the importance of managing configuration changes and conducting regular vulnerability assessments. It requires organizations to establish controls and procedures for tracking changes to BES cyber systems and identifying potential vulnerabilities. By maintaining a secure and well-managed system, organizations can reduce the risk of cyber incidents.

It’s important to note that the significance of each standard may vary based on an organization’s specific risk profile, infrastructure, and regulatory requirements. Compliance with all NERC CIP standards is necessary to establish a comprehensive and effective cybersecurity program, as they collectively address different aspects of protecting the bulk power system from cyber threats.

Also see Small Utilities Must Master Cybersecurity by Forbes.