It has been reported that the Department of Homeland Security has announced new requirements for US pipeline operators to bolster cybersecurity following Colonial Pipeline ransomware attack. In a statement, DHS said it would require operators of federally designated critical pipelines to implement “specific mitigation measures” to prevent ransomware attacks and other cyber intrusions. Operators must also implement contingency plans and conduct what the department calls a “cybersecurity architecture design review.”
It's the latest response by the Biden administration to a series of ransomware attacks and intrusions hitting critical US infrastructure and raising fears about American cybersecurity. DHS did not immediately release further details about the guidance, which comes after another directive issued weeks after the 7 May attack on Georgia-based Colonial Pipeline.
Commenting on this, Michael Fabian, Principal Security Consultant, Synopsys Software Integrity Group, said:
"In the case of Colonial Pipeline, the pipeline operations were halted due to the inability for the operator to bill customers. While this particular attack didn’t affect OT systems, Colonial Pipeline reportedly did fear that the attackers gained information allowing them to potentially attack OT areas of their operations. In the OT/IT evaluations that I’ve conducted over the past 12+ years, I have observed many violations of basic security concepts. This is particularly the case in industries largely free of directed regulation (unlike the financial industry, for instance). Some of the standard security controls include asset inventories, secure configurations, network segmentation, incident response and disaster response planning, technical solutions around backup and recovery, network and host protection technology (e.g., NIDS, AV, DLP). Security hygiene practices around incident response and disaster response are key when it comes to ransomware attack potential in terms of business continuity and damage control. If a system is impacted by an attack, with a strategy in place, organisations are better positioned to minimise the effects of finding themselves helpless to the demands of the ransomware attackers."
Roger Grimes, Data Driven Defense Evangelist at KnowBe4, added:
"This is good news. Anything that gets us better secured is a good thing. It will also likely not work. Why? Because it is hard to be perfect and every organisation is already trying to do computer security perfectly. Adding another requirement on top of all the other requirements and regulations overtop of what they already know they should be doing is likely not going to result in being significantly more resilient to cyberattacks. It cannot hurt...but it is not likely to be the final nail in the coffin that defeats all malicious hackers and malware. Well, what then will it take? For one, we need to make it harder for malicious hackers and malware to hide. Hackers hack and spread malware because they either cannot be traced or cannot be arrested and punished when caught. A malicious hacker is more likely to be struck by lightning, twice, than to get arrested for hacking.
"We need to significantly secure the internet itself, to make it more secure by default. We will stop more bank robbers when we stop allowing so many banks to be robbed and for all the bankrobbers to get away. There are ways to make the internet significantly more secure. I have written on this topic for decades and recently re-submitted plans for how to do so to CISA and other internet security groups. We have the technology. We do not have to re-invent the wheel. We just need the right people in the same room and a true willingness to solve the problem. I do not want to undersell how hard it is to get people to agree on anything, much less how to fix the internet. But it is not a technical problem. It is a sociological problem...it is a human problem. One day, some digital 9/11-type event will happen to the internet, and when it does, enough enemies and competitors will come together against a common foe that we actually get the support to push the new technology. The technology is there. We are just waiting for agreement. Until we get a far more secure internet and global agreement on digital crimes, we will fight malicious hackers and malware. One more regulation on an industry is not going to change the problem. How do I know? Because we have had three decades of increased regulation and the problem is only getting worse each year."
Read the latest issue of World Pipelines magazine for pipeline news, project stories, industry insight and technical articles.
The July issue of World Pipelines includes a regional report on China’s major oil and gas pipeline projects, as well as technical articles on surface preparation, welding, vacuum lifting, inline inspection and more. Don’t miss our annual Pigging Services Directory, showcasing the latest in pigging products and services, along with pigging project updates.
Read the article online at: https://www.worldpipelines.com/regulations-and-standards/21072021/security-experts-react-to-new-dhs-directive-on-cybersecurity/
You might also like
The use of repurposed steel pipes can support a circular economy by reducing the need for new materials and produce CO2e savings as high as 97%, says Sean Conway, Managing Director, Decom Engineering Ltd, UK.