You are on page 1of 16

An integrated approach to

combat cyber risk


Securing industrial operations
inoil and gas
Contents

Foreword 1
Introduction 2
Understanding the risks4
Conduct amaturity assessment 6
Build aunified program 8
Implement key controls 9
Embrace good governance 10
Conclusion 11
Contact us 12
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Foreword
The oil and gas industry is moving into the Solving these challenges requires aclear
next stage of evolution, whereby robotics, understanding of both the engineering
digitization, and the Internet of Things and IT disciplines as well as leading
(IoT) are rapidly being integrated into the sectorspecific cyber security practices.
operational environment. Theinterest of Thispaper shares the insight gained from
cyber criminals in industrial operations has our extensive field experience, including
increased over the last decade resulting in lessons learned in helping oil and gas
cyberattacks that have compromised both companies to go beyond safety in securing
production and safety. Theseattacks have their industrial control systems (ICS).
made cyber security ahot discussion topic Wehope you find thisreport to be both
in boardrooms around the world, and now, thought provoking and useful.
agrowing number of organizations are
developing large transformation programs Regards,
to address these new operational threats.

However, making operational processes


secure, vigilant and resilient is achallenge Paul Zonneveld
as this requires the organization to Global Energy & Resources
harmonize and align two cultures, Risk Advisory Leader
engineering and IT. Inaddition, the Deloitte Canada
operations environment demands tailored
technical solutions that are not always easy
to secure.

Thispaper shares the insight gained


fromour extensive field experience,
including lessons learned in helping
oiland gas companies to go beyond
safety in securing their industrial
controlsystems (ICS).

1
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Introduction
Critical infrastructure relies on industrial Like other industries, the oil and gas While the industry
control systems (ICS) to maintain safe sector has been working to improve cyber
and reliable operations. Engineershave security, which is apriority concern among has escaped amajor
successfully designed and deployed ICS senior leadership and boards of directors. operational catastrophe
with safety and reliability in mind, but not
always security. Why? Originally, there was While the industry has escaped amajor thus far, this good fortune
little need for it. Fitforpurpose, isolated operational catastrophe thus far, this good may not last unless
operational systems were the order of the fortune may not last unless companies
day. Sincethese operational systems were expand their cyber security programs. companies expand their
not integrated to enterprise systems or Todate, oil and gas companies have been cyber security programs.
even to each other, the risk of alargescale primarily focused on protecting corporate,
cascading failure due to an attack, cyber or as opposed to operational, systems
otherwise, was extremely isolated. and data. Thats because IoTwhere
production can be controlled from an
Fast forward 20years, and the ubiquitous iPad or asmart phone, for instanceis
connectivity of the Internet of Things (IoT) relatively new, gaining momentum over the
has turned the most basic assumptions last decade. Also, operational systems are
about operational security upside down. inherently different, requiring engineering
Today,all sorts of industrial facilities, knowhow, and not just IT expertise, in
including oil fields, pipelines and order to secure them appropriately.
refineries, are vulnerable to cyber attacks.
Regardlessof their location, operational Today, an approach that brings together
systems can now be compromised by IT and engineering is needed to address
external or internal risks, causing safety cyber security programmatically and
or production failures and increasing sustainably. Thefollowing discusses
commercial risk. AlthoughICS are typically the goals of such an approach as well
designed to fail safe, the increasing as practical steps for getting started.
sophistication of cyber criminals heightens First,lets take acloser look at the types of
the risk of catastrophic incidents, along cyber risks facing the oil and gas industry,
with the magnitude of the impacts in terms how they can disrupt the value chain, and
of cost, safety, reputation, and commercial what the consequences could be.
or financial losses.

2
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Figure 1. Howcyber threats impact Cyber threat


the oil and gas value chain

Upstream

Exploration Production

Geophysical evaluation anddesign Bringing the oil to thesurface


Field development
Drilling operations

Upstream scenario #1: Upstream scenario #2:


Misappropriation of commercially sensitive Key wellcontrol and safety equipment is
reservoir performance and welldata pushed outside normal operating parameters
or shut down completely
Risk: Damage to the operators competitive
position in aplay or field Risk: Operational shutdown and
financial loss, as well as field safety incidents,
due to equipment malfunction

Midstream

Transportation

Gathering and transportingpipelines, tankers, trucks

Midstream scenario #1: Midstream scenario #2:


Unauthorized access to and manipulation of Monitoring is distorted or interrupted, thus
pipelines systems compromising equipment integrity

Risk: Explosion, spillage, environmental, Risk: Shutdown of system for investigation,


damage, and unsafe conditions for personnel resulting in missed shipments and financial
and adjacent populations loss

Downstream

Refining Marketing

Processing of crude oil into petroleum Retailing


products Trading
Product blending

Downstream scenario #1: Downstream scenario #2:


Theft of inventory data on crude oil and Interruption or tampering with operational
refined products controls

Risk: Failure to meet business commitments Risk: Unsafe operating conditions and
and reputation damage downtime, leading to supply disruption and
revenue loss

3
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Understanding the risks


One of the main factors that makes it so As these examples illustrate, cyber Its easy to see why integrating effective
difficult to secure ICS is that they were not threats can come from many directions, and comprehensive cyber security controls
designed to be connected; yet, today they including internal actors aiming to sabotage into ICS is necessary, if not increasingly
are networked. Digitizationof operational production, competitors seeking to cause becoming mandatory. However,in order
processes in the oil and gas industry brand damage, and external parties, such to get there, companies must find away
has led to new opportunities to improve as activist groups, wanting to shut down to reconcile the divergent points of view
productivity and to drive down costs. operations. of IT and operations as ICS specialists do
However,the convergence of operational not always fully understand modern IT
and business systems has also opened the Not all vulnerabilities stem from the security risks, just as IT security specialists
enterprise to awhole new array of cyber technologies themselves; behavioral often do not completely comprehend the
risks. Considerthe following scenarios, the aspects also come into play. Forinstance, industrial processes supported by ICS.
possibility of which didnt exist afew years sometimes alack of security awareness Abowtie analysis, acommon concept used
ago: within the organization can inadvertently in engineering for failure mode evaluation,
expose systems to cyber attacks, such can be auseful tool for bridging this gap.
Insecure remote access communication as when employees bring portable Whileany analysis will be companyspecific,
allows acyber criminal to hijack aprocess media that is infected with malware into figure 2provides an example of how the
control system and push production to the environment. Furthermore,many bowtie analysis might look for an oil and
unsafe levels. operations employees simply believe gas company.
their systems are an unlikely target, thus
Poor security practices by athirdparty they are reluctant to buy into the need to
contractor allow avirus to migrate into change their behaviors and implement new
Digitizationof operational
the production environment, shutting security protocols. Afterall, not long ago processes in the oil and
down critical Supervisory Control and they could safely assume all equipment
Data Acquisition (SCADA) systems and components were trustworthy, which is
gas industry has led to
creating unsafe working conditions. no longer the case since digital sensors new opportunities to
and controllers can be manipulated to
Improper testing of IT systems prior to provide false input and misguiding status
improve productivity
deployment results in asystem crash, information. Anotheroutdated assumption and to drive down costs.
leading to disruption or shutdown of is that process failures are mainly caused
operations. by weather conditions, human error, and
However,the convergence
equipment fatigue and not necessarily of operational and
Technology acquired directly by a facility, malicious manipulation of the system by
without adequate testing and evaluation, those intending to inflict harm.
business systems has
goes unpatched and introduces a also opened the enterprise
vulnerability which allows members of Whether acyber breach is intentional
an adversarial community to gain remote or unintentional, the consequences can
to awhole new array of
access to programmable logic controllers be grave, ranging from compromising cyber risks.
(PLC), thus giving them the ability to confidential data to triggering system
disrupt the production process at will. failure or shutdown. Thiscan result in
decreased revenue, reputational damage,
environmental disaster, legal penalties, and
in extreme cases, loss of life.

4
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Figure 2. Exampleof a Cyber Risk bowtie analysis for an oil and gas company

Likelihood management Consequence management

Threat actors

Foreign intelligence Operational


Policy and
services disruption
standards
24/7
Risk assessment
security Injury or fatality
Terrorists
Training and and incident
awareness event monitoring
Loss of critical

Consequences
Vendor Threat or confidential
Employees management intelligence information
Threats

Event
Contractors Information Incident Financial loss
and vendors protection response
and encryption
Emergency
Identity management response Reputational
Hackers damage
Network segmentation

Physical security
Regulatory fines
Activists
Malware and patch and penalties
management

Source: Information adapted from Talbot, J, and Jakeman, M, 2008, Security Risk Management Body of Knowledge, RMIA, Carlton South

5
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Conduct amaturity assessment


Once the risks are understood, an oil and Determine if critical assets and Assess the maturity of the controls
gas company should assess the maturity of facilities have wellknown and environment for proactively
its cyber security controls in an operational exploitable vulnerabilities. Inthe oil managing these threats. Ingauging
environment. Whilenot every risk can be and gas industry, these vulnerabilities the sophistication of governance and
mitigated, its important to know what differ somewhat according to subsector. controls, it is often helpful to use
type of controls are in place and where to Forinstance, exploration systems an established framework such as
focus improvement efforts. Thismeans are commonly exposed to theft of the Deloitte cyber security maturity
giving appropriate consideration to how proprietary data, such as geophysical model, which is presented in figure 3.
potential security breaches within ICS surveys, exploration data, well statistics, Inperforming maturity assessments for
link to business risks. Importantly,this research studies, and strategic abroad range of energy and resources
cant be done by an engineering or planning information, all of which can companies, weve observed that the
IT group independently; it requires jeopardize competitive positioning. maturity of the oil and gas industry
amultidisciplinary team of business, Productionsystems, on the other hand, as awhole is about 2.5on this scale,
operations, engineering, and IT security are vulnerable to manipulation of SCADA whereas the recommended position is
professionals to: and other operational systems, as well greater than 4.
as loss of communication to remote
Conduct an inventory assessment facilities and production shutdowns Throughout the maturity assessment
of assets and facilities and rank due to virus infections. Here,the process, it is important to understand
them in terms of criticality. Thiscan consequences are more physical, the difference between the security
involve asking questions such as: Are resulting in unsafe conditions and considerations for business systems versus
there factors that make acertain facility downtime, which, in turn, could lead to industrial control systems. Intodays
aparticularly attractive target? Are human and financial loss. Similarly,cyber integrated environment, IT security
corporate IT standards, governance, and risks in the midstream sector also have standards and processes must be capable
monitoring processes being applied to all both physical and financial implications, of addressing both backoffice systems and
ICS assets? Have the full range of cyber such as unsafe conditions, spills, and ICS in amanner that doesnt interfere with
vulnerabilities been considered, and disruption to delivery or production existing mechanisms for protecting safety
have the potential consequences been flow. Thedownstream sector is also and reliability.
identified and ideally quantified? vulnerable to manipulation of operational
controls, with the same physical and In addition to the maturity assessment,
financial implications as the other and as part of ongoing monitoring
Whilenot every risk sectors.However,downstream also activities, organizations need to
can be mitigated, its encompasses customerfacing marketing retroactively scour their assets regularly
activities, with the potential for theft of for not only known vulnerabilities but also
important to know what customer data and the manipulation for emerging threats, advanced persistent
type of controls are in of trading systems. Thiscould result threats (APT), suspicious behavior and
in revenue loss, brand damage, and to identify compromised assets before it
place and where to focus regulatory and compliance violations. becomes an incident.
improvement efforts.

6
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Figure 3. TheDeloitte cyber security maturity model

Observed position of Recommended position for


Overall cyber security

the oil and gas industry oil and gas 5


maturity

4
Optimized

3
Managed
2
1
Defined

Repeatable
Initial

Behaviors
Dependent primarily Adhoc approach Clearly defined Established security Risk sensing and
on individuals and with some tools strategy supported capability, with predictive analytics
isolated practices and documented with tools and methods defined processes and used to model threats
procedures to manage risk measures
New or relatively Highly automated
inexperienced security Established security Security processes Focused on risk
Five plus years
team function defined and in place management and
operating without
business enablement
Established security asignificant failure
function with Two plus years
integrated systems operating with
designed to predict, defined processes and
prevent, detect, and practices
respond

Key controls
General awareness ICS cyber security Inventory of all Industrial control Cyber threat
of ICS cyber security strategy and policy cyberassets systems secured intelligence/sensing
needs but not established according to security
Security standards Data loss prevention
considered apriority standards
Awareness and developed
Behavioral analytics
education Identity and access
Annual vulnerability
management for
Segmentation of testing
provisioning and
ICS and corporate
24/7security authentication
networks
monitoring
End point security
Annual risk assessment
Incident response plan
with identified gaps Mobile protection
developed and tested
and remediation plan
Third party security
Virus and malware
Physical security
protection

7
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Build aunified program


For over 50years, safety was the primary Vigilant Itmay be harder to detect the
motivation behind designing and deploying Security alone is not enough. Itmust be misappropriation or alteration of
controls for physical production processes. accompanied by vigilance, or continuous commercially sensitive data relating to well
Whilethis motivation is still there to keep monitoring, to determine whether asystem performance, flow rates, or asset utilization
processes in asafe and operational state, is still secure or has been compromised. in processing or refining environments.
the landscape of potential disruptions now Worthwhileefforts to be vigilant start Therefore,it is even more important to
encompasses the cyber domain. Thisnow with agood idea of what one needs to build safeguards into the design of these
requires aunified program to address defend against. Thereare discernable data management systems.
cyber security systematically across the threat trends in the oil and gas industry,
business and operations. Althoughbuilding which provide agood starting point for Even if security controls fail and acyber
and implementing aprogram of this nature understanding the types of attacks being attack goes undetected, the ability to
is amultiyear, transformational effort, launched against ICS. Thesetrends, mount astrong response can help to
each phase of the initiative should have however, need to be supplemented by an contain production losses as well as
the same objective in mind, moving up the understanding of the organizations specific financial, environmental, and brand
maturity scale to create an ICS environment business risks in order to anticipate what damage. Theresponse and recovery
that is secure, resilient, and vigilant. might occur and design detection systems phases will need to include not only
accordingly. immediate remediation of compromised
Secure equipment and systems but also
Being secure is about preventing system Resilient indepth analysis of where and how
breaches or compromises through A resilient organization should ensure it cyber attacks occurred, what system
effective, automated controls and has the plans and procedures in place vulnerabilities allowed them to happen,
monitoring. However,its not feasible to to identify acyber attack, contain or and what mitigation measures should be
secure everything equally. Criticalassets neutralize it, and rapidly restore normal implemented to prevent further risks.
and infrastructure, and their associated operations. Wecan refer to these steps
ICS, would obviously be at the top of as detect, respond, and recover, and the Critically, its not sufficient to just
the list, but its important to remember protocols for ensuring successful outcomes put playbooks and policies in place.
that theyre not isolated components. will depend on the type of cyber issue Likeafamiliar fire drill, they should be
Theyre part of larger supply chains; so, identified. rehearsed periodically through cyber
its essential to shore up weaknesses wargaming and simulations that bring
throughout endtoend processes. Thiscan At any level of the oil and gas value together business and technology teams.
involve many layers and types of controls, chain, whether it be upstream wellhead
ranging from hardening sensors on operations, midstream processing
processing facilities to installing software plants and pipelines, or downstream
Althoughbuilding and
firewalls. Systemsneed to be designed refining and delivery logistics, continuous implementing aprogram of
to consider that the entity operating an automated monitoring of equipment
asset may not be the only organization should allow realtime detection of
this nature is amultiyear,
with rights to data. Serviceand supply anomalies. Thisincludes continually transformational effort,
companies and equipment vendors may knowing the status of pumps, valves,
also be given visibility into operational and compressors, or process units, including
each phase of the initiative
equipment performance data in order flow rates and patterns of fluids and should have the same
to improve the services they can offer. gasses. Ongoingvisibility into these metrics
Unlessproperly structured, this might should facilitate rapid reaction to eliminate
objective in mind, moving
provide an opportunity for unforeseen environmental and safety hazards up the maturity scale to
data leakage or system weaknesses, which stemming from outofcontrol operations,
could be exploited by third parties. Itis up to and including shutting down where
create an ICS environment
essential to build control and monitoring necessary. that is secure, resilient,
systems with clearly defined data access
rights and the ability to identify when these
andvigilant.
are contravened.

8
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Implement key controls


While risk appetite and maturity levels will Network security: Access to wired
vary, there are afew pillars for cyber risk and wireless networks within the ICS
transformation in an ICS environment that environment is limited and secured in
nearly every oil and gas company should accordance with leading identity and
have in place. Implementingthese key access management practices, including
controls can provide astarting point for dynamic provisioning and authentication,
acustomized program aimed at achieving 24/7monitoring, and end point security.
security, vigilance, and resiliency.
Portable media: Use of portable media
Awareness training: Cyber security within the ICS environment is restricted
awareness needs to be promoted among and scanned for malicious software.
professionals at different roles in the
organization, along with training to give Incident response: Incident management
them the necessary skills to interact with policies and procedures are developed
systems safely, securely, and responsibly. and periodically tested.

Access control: ICS components,


including hardware, applications, and
While risk appetite and maturity levels will vary, there
networks, are both physically and are afew pillars for cyber risk transformation in an ICS
logically secured, with access only being
granted after formal authentication and
environment that nearly every oil and gas company
authorization. should have inplace.

Figure 4: Key controls

GOVERNANCE SECURE VIGILANT RESILIENT


Management
Information Protection

Threat

Rick Management Information Lifecycle Cyber Attack


Security Incident Response
Management

& Compliance Management Readiness Testing


Cyber Security Management

Incident
Analytics
Security

Business Continuity
Policies & Standards Encryption Security Event Monitoring
Management

Training & Awareness Authentication


Identity & Access
Management

Roles & Rights


Vendor Management
Management

Identify Lifecycle
Management

Network Security
Infrastructure Protection

Physical Security

System Security

Patch & Vulnerability

Malware Protection

9
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Embrace good governance


Clear ownership of ICS security is crucial, Implementing acyber security program Implementing acyber
and roles and responsibilities should be within the ICS domain additionally
clearly defined for everyone involved, from poses some distinct talent management security program within
managers to process operators to third challenges. Thejob profile often requires the ICS domain additionally
parties. Ultimately,there must be asingle people to be stationed at sites for
line of accountability. Withoutone, it is anumber of years. Withoutproviding them poses some distinct talent
challenging not only to define requirements with aclear career path, two things could management challenges.
that apply to the whole organization but happen:
also to identify where centralized versus
local solutions are appropriate. 1. IT professionals who are forced into
an ICS security role will consider the
In the past, the manufacturing and program as merely asideline activity
engineering discipline owned the and will not actively contribute.
production environment, including ICS and
related security mechanisms. Today,ICS 2. Security savvy professionals will quickly
security is increasingly becoming apart of reach their peak at asite and then will
the corporate organization, falling under search for another organization.
the auspices of the Chief Information
Security Officer (CISO). Yet,this isnt about Ideally, the organization should develop
IT stepping in and running the oil field or an awareness program to bridge the
the refinery. Evenwith CISO accountability, gap between IT and ICS professionals,
the engineering organization is still as well as acareer development path for
responsible for developing the right those wishing to specialize in ICS security.
solutions and deploying them at the sites. Thispath often starts with an entrylevel
site analyst position and progresses
to aglobal security role within the
organization.

10
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Conclusion
In the past few years, the oil and gas Theplace to start is assessing the maturity Thecall to bridge the
industry has seen the traditional of the cyber security controls environment.
boundaries between corporate IT and ICS Goingbeyond traditional operational safety cyberreadiness gap has
largely disappear. Today,the evolution considerations to implement asecure, never been louder, with
continues with the digitization of the oil vigilant, and resilient program is not only
and gas field. Asthis interconnectedness essential for enhancing an oil and gas growing public awareness
marches on, so does the frequency companys ability to protect operational of cyber crime and the
and sophistication of cyber attacks. integrity amid agrowing range of cyber
However,most companies have not kept threats, but also to achieve operational potentially disastrous
pace in terms of their preparedness. excellence by taking advantage of the impact it can have on
productivity benefits offered by adigitized,
fully integrated ICS environment. critical infrastructure.

11
An integrated approach to combat cyber risk| Securing industrial operations inoil and gas

Contact us
Deloitte can assist you in conducting acyber security maturity assessment.
Formore information, contact one of our risk management professionals below:

Authors
Paul Zonneveld Andrew Slaughter
Global Energy & Resources Executive Director
RiskAdvisoryLeader Deloitte Center for Energy Solutions
Deloitte Canada Deloitte US
+14035031356 +17139823526
pzonneveld@deloitte.ca anslaughter@deloitte.com

Global contacts

Anton Botes Rajeev Chopra


Global Leader Oil & Gas Global Leader Energy & Resources
Deloitte Touche Tohmatsu Limited Deloitte Touche Tohmatsu Limited
+27118065197 +442070072933
abotes@deloitte.co.za rchopra@deloitte.co.uk

Paul Zonneveld Steve Livingston


Global Energy & Resources National Power & Utilities
RiskAdvisoryLeader Risk Advisory Leader
Deloitte Canada Deloitte US
+14035031356 +12067167539
pzonneveld@deloitte.ca slivingston@deloitte.com

Dina Kamal Ramsey Hajj


National Energy & Resources Risk Advisory
Risk Advisory Leader Senior Manager
Deloitte Canada Deloitte US
+14167757414 +15619627843
dkamal@deloitte.ca rhajj@deloitte.com

Amir Belkhelladi Marko Van Zwam


Risk Advisory Partner Risk Advisory Partner
Deloitte Canada Deloitte Netherlands
+15143937035 +31 88 288 0890
abelkhelladi@deloitte.ca MvanZwam@deloitte.nl

Tiaan van Schalkwyk Charles Hosner


Risk Advisory Associate Director Risk Advisory Partner
Deloitte Africa Deloitte UK
+27118065167 +44 20 7007 2827
tvanschalkwyk@deloitte.co.za chosner@deloitte.co.uk

Rob Hayes
Risk Advisory Director
Deloitte UK
+44 20 7007 2606
rjhayes@deloitte.co.uk

12
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK
private company limited by guarantee (DTTL), its network of member firms,
and their related entities. DTTL and each of its member firms are legally
separate and independent entities. DTTL (also referred to as Deloitte Global)
does not provide services to clients. Please see www.deloitte.com/about for a
more detailed description of DTTL and its member firms.

Deloitte provides audit, tax, consulting, and financial advisory services


to public and private clients spanning multiple industries. With a globally
connected network of member firms in more than 150 countries and
territories, Deloitte brings world-class capabilities and high-quality service
to clients, delivering the insights they need to address their most complex
business challenges. Deloittes more than 200,000 professionals are committed
to becoming the standard of excellence.

2017. For information, contact Deloitte Touche Tohmatsu Limited.

Designed and produced by The Creative Studio at Deloitte, London. J11747

You might also like