Supply Solutions

Project Consulting, Design, Engineering and Implementation

Operational Technology (OT) is increasingly exposed to both cyber and traditional threats; both likely to impact availability. Whether the actor is a nation state or a disgruntled employee it has never been easier to disrupt a critical system and never harder to detect the source.  Goverements across the world have recognised this and passed major laws (NIS) to drive change.  They have provided both carrot (Secure by Design guidance from the NCSC) and stick (fines to £17.5M or 4% of turnover).  Industry has collaborated to create frameworks to assist with design (IEC 62443, NIST, etc).  Neither address the lack of on site skills, experience or competence faced by industry to manage change.  This is where IT4A can help.

  1. Outsource to an OT Network Specialist
  2. Out Source to an OT Generalist System Integrator
  3. Retain Skills In House
Tender writers beware: Be careful what you ask for…..

1) Outsource to an OT Network Specialist

A OT network engineering specialist will lead you through the design process.  We will interpret the context you provide and provide a proportionate solution that is a good fit for your organisation. 

Hardware will be selected that is reliable, mid life, and supportable by local teams.  Critical hardware will be mainteinance friendly (fast restart) with minimal impact to operation during routine maintenance activity.  

OT systems and infrastructure needs to be patched periodically to address vulnerability.  Switches that can restart in seconds compared to others that can take 10 minutes are going to be preferred in operational environments – a characteristic often overlooked. 

IT4A bring the lessons learned from 25 years of OT network design, implementation and support to bear on every project.  Our full time team of network, infrastructure and cyber engineers and service desk analysts design for an easy life – high availability and seamless recovery. 

The IT4A Solution

Early Engagement

  • IT4A will capture your local context, determine the need and the challenges, discuss threat, and assess risk and appetite within the organisation.   This is great place to start – we learn what you want to achive, why you want to achieve it, the barriers to success and what a good outcome looks like.  
  • A design will evolve that mitigates intolerable risk early on, and helps set an expectation for budget costs, outcome and timeframe.  
  • Our understanding of context will allow design to consider local resources providing lifetime support through to obligations to achieve any formal compliance.  

Collaboration

  • Following Early engagement come collaboration. Secure by Design demands a close co-operation between Application provider – the IACS System Integrator and the Network Designer / Provider – IT4A.
  • We have developed Zero Trust Tools, and private networks to make collaboration seamless. 

Design for Operational Outcome

  • Where compliance is based upon process such as the case of CE+ and CAF, it is important that we design to achieve a sustainable outcome that will grow in maturity and survive personal changes..     

Be careful of what you ask for .....

OT System and Network Design is, and will be for some time be, a major challenge for the entire supply chain.  From the ultimate system user, through local technical support, procurement, supply chain and beyond individuals are learning and gaining new experiences.  Whereas IT has had 30 years to evolve, OT has been dropped into a world where a single misconfiguration on a firewall has the potential to shut down an entire system.  It is not ladder logic that will prevent this, it is competent network engineering that will aim to make occurrence extremely unlikely; and this is probably the best we can hope for.

Despite the emergence of standards and reference models for IACS system design (IEC 62443, NIST, CISA & NCSC) there is no quick fix; although some believe otherwise.  Simply adding standards and accnonyms into a tender as mandatory requirements without explaining what they are, why they are there and any detail that would allow them to be incorporated into a costed design is extremely high risk for all involved.  The most likely outcome is significant compromise from both parties with neither client or contractor feeling good about it.  The best scenario is the contractor challenges the requirement from the outset and askes for clarification.  This process is likely to introduce significant delay as the answers are probably largely unknown.

IEC 62443

This is the big one.  The System design framework developed by IEC for Industrial Automation Control Systems – it sounds perfect for SCADA and many other OT systems.  The PROS: 62443 is a very broad, robust and tightly defined standard.  It leverages strong technical principles and the standard is well structured and sufficiently prescriptive to drive a design process by experienced IACS engineers with a good knowledge of IT principles.  The CONS: There is a significant amount of consultative design and documentation / evidence collection that is unlikely to be referenced again out side of the 62443 Audit process.  This may be ideal for some tightly controlled industries but possibly alignment to the standard rather compliance to the standard is a more achievable (pragmatic) approach for others.  Even alignment will carry significant project and operational overheads and time penalties.

If use of the IEC 62443 within a tender is attempting to protect the client from a contractor’s inability to deliver the solution then the client should not select the contractor.  Unfortunately the contractors that allow for the time and cost of engineering to the 62443 standard will be higher and success rate lower.  If procurement preference is given by the least cost bidder that is prepared to sign up to the contract terms – beware dissatisfaction all round will be the most likely outcome.

CAF

Within the UK it is not the design framework used that achieves NIS 2018 compliance, it is the successful assessment against the NCSC’s Cyber Assessment Framework – CAF.  CAF is not prescriptive, it is proportionate to risk and generally process driven.  If the client has no process to monitor and assess, the quality of the monitoring system is irrelevant – the CAF audit outcome will therefore be a fail.  Network features exist within products to mitigate or control a risk, the tender should therefore describe the threats and risks a design should consider.  CAF is a better bar to set and manage expectation – is not however for the contractor to comply but to enable compliance if the necessary processes are in place and exercised by the client in operation.  A subtle but important difference.

2) Outsource Network Scope to a Generalist

Ask your IACS System Integrator to take responsibility for Network, Infrastructure and Cyber Security and Compliance. Whilst IACS integrators are specialists in their areas of primary responsibility, this rarely extends to network, cyber and related infrastructure.  They will of course do their best to support you but they may lack the skills to design for compliance.  Some checks to help gain confidence:

  • Is the SI familiar with reference network design frameworks such as IEC 62443, NIST, NCSC Secure by Design or other Guidance? 
  • What methodology will they adopt for your project, and why?
  • What products will be selected, and why?
  • Does the SI retain specialists for the project duration or are they subcontracted on a day rate? 
  • Have prior project outcomes been sucessfully assessed against the NCSC CAF or Cyber Essentials +
  • What specific network & infrastructure project design & test documentation will be provided?   Expect: Basis of Design, Detailed Design, Low Level Design, As Builts, FAT & SAT plans and O&M as deliverables. 
  • Will a monthly report template be provided that captures and communicates insight into availability security posture, obsolescence, incidents, vulnerability and readiness to recover from any disaster. 
  • Are procurement teams given responsibility to select tendor submissions without deferring design to a subject matter expert that is familiar with the project context. 

A context aware, trusted subject matter expert is critical from the outset if optimal outcomes are to be achieved.  Failure to do this will likely store up problems that are costly and time consuming to remedy.  

3) Retain Skills in House

1. Employing and retaining skilled resources, a great solution if you can find them and have the resources to fund them.  Maintaining a team of motivated OT network engineers, OT infrastructure specialists and OT cyber specialist is a big ask for any organisation.  For sufficiently experienced resources in just these 3 roles you are looking at an overhead of £250-£500K per year. Who will manage and direct them? 

2. Pass responsibility to IT. This can work, but experience tells us that IT and OT culture and context is very different.  In practice you will end up with IT systems and practices running your OT, OT has now lost control of its mission. 

3. Do nothing and rely on non-specialist to get by.  Sounds crazy but probably the most common approach seen. 

Need a Solution?

Contact us today to turn your vision into reality.