oil and gas – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 25 Nov 2025 07:47:01 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png oil and gas – Waterfall Security Solutions https://waterfall-security.com 32 32 Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis https://waterfall-security.com/ot-insights-center/oil-gas/upstream-midstream-downstream-cyber-attacks-dependency-analysis/ Tue, 09 Jul 2024 06:31:40 +0000 https://waterfall-security.com/?p=24779 It turns out that there are really only three ways that ransomware can shut down OT networks and physical operations: "abundance of caution" shutdowns, OT dependencies on IT systems and services, and ransomware impacting OT networks and systems directly.

The post Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis appeared first on Waterfall Security Solutions.

]]>

Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis

It turns out that there are really only three ways that ransomware can shut down OT networks and physical operations: "abundance of caution" shutdowns, OT dependencies on IT systems and services, and ransomware impacting OT networks and systems directly.
Picture of Andrew Ginter

Andrew Ginter

Oil and Gas protection against ransomware

“…there is little benefit in having the world’s strongest OT security program if we must shut down our operation every time the IT network is compromised…”

The Waterfall / ICS Strive 2024 Threat Report lists a handful of serious cyber attacks impacting the performance of oil & gas infrastructure in the last several years, including the Colonial Pipeline shutdown and halted shipments at three ports / oil terminals. Most of these incidents were due to ransomware, and most of that ransomware impacted the IT network. It turns out that there are really only three ways that ransomware can shut down OT networks and physical operations: “abundance of caution” shutdowns, OT dependencies on IT systems and services, and ransomware impacting OT networks and systems directly.

In today’s article we look at dependencies. In short, there is little benefit in having the world’s strongest OT security program if we must shut down our operation every time the IT network is compromised with ransomware, because our operations depend on IT services. For example:

  • Upstream production might depend on a functioning IT-based royalty reporting system,

     

  • Midstream operations might depend on a functioning IT custody transfer system, and

     

  • Downstream refining might depend on a functioning IT-based emissions reporting system.

     

These kinds of dependencies are called out explicitly in the US TSA Security Directive 2021-02D for pipeline operators. In particular, the directives establish requirements for the nation’s most important pipelines. For critical OT systems, owners and operators must:

  • Implement segmentation designed to prevent operational disruption to OT systems if IT systems are compromised,

     

  • In support of that goal, identify all OT dependencies on IT services,

     

  • Design OT networks so that they can be isolated from IT networks during incident response procedures.

     

While not stated explicitly in the security directives, the ability to separate OT and IT networks in an emergency can enable OT systems to continue operating through an IT emergency, but only if OT dependencies on IT networks and OT trusts of crippled IT domains do not impair that very desirable ability to operate independently.

If we wish to operate our OT systems through an IT security incident, then while it can be very difficult to eliminate all OT dependencies on IT systems, we cannot simply ignore those dependencies that remain. Instead, we must recognize that IT systems that are essential to continued physical operations are in fact reliability-critical components. These reliability-critical systems may be hosted on what we think of as the IT network instead of the OT network but must be managed and secured as if they were OT systems. For example:

  • If a pipeline depends on a custody transfer and billing system in IT, we could modify our customer contracts so that if we must declare force majeure, custody transfer billing enters an “approximation” mode. The OT system continues operating the pipeline, caching all billing-relevant data in a historian or other repository until the billing system recovers and can reconcile accounts.

     

  • If an upstream producer depends on a royalty reporting system in IT, we could (hopefully, beforehand) negotiate with the royalty administrator so that, again, if we must declare force majeure, royalty payments could enter an approximation mode, with manual payments authorized every day or two based on approximate data. The OT systems again cache all royalty-relevant data in a historian until the payment system recovers.

     

  • For refining emissions data we do the same, but there are no payments or monies to track, simply emissions data to track in a force majeure condition.

     

In all three cases, what we are seeing here is not only two kinds of network criticality, a safety-critical OT network and a business-critical IT network, but three networks. The third is a reliability-critical network that is often mixed up with other IT assets. In the examples above, we might be able to redesign our systems so that custody transfer, royalty payments and emissions reporting can, in an emergency, be seen as non-critical. More generally, such redesign may not be possible. In this case, what we need to do is recognize that we are dealing with three network criticalities and start applying some of the TSA approach to managing the OT-critical components in the IT network.

Oil pipesFor example – consider the upstream royalty payment system. To be effective in managing the royalty system as reliability-critical, we need to put the royalty system in its own network/DMZ and apply the TSA approach to that network as well – be wary of allowing the royalty network to rely on IT resources that may be compromised, be wary of sharing trusts between the reliability-critical DMZ and the IT network, and so on. It does no good to restore the reliability-critical systems to an uncompromised state if they, in turn, still depend on Active Directory or other IT services that are still crippled by the ransomware attack.

The word “resilience” is often used when looking at these dependencies between safety-critical and reliability-critical networks. In the royalty example, we might deploy unidirectional gateways at the IT/OT interfaces in the offshore platforms or oil fields to prevent any online attack from migrating from a compromised IT network into the safety-critical OT networks. If the IT network is compromised though, we must still shut down the production of hydrocarbons when the royalty system fails. But – if we can bring the royalty reporting system back within hours of failure, and we can bring the field back into full production an hour or two after that, then the result might be regarded as an acceptable worst-case outage of only a few hours.

This kind of network engineering is an example of enabling resilience – production “springs back” into operation after a brief outage, even while the bulk of the IT network is still compromised. Be aware though – while this kind of reliability-critical dependency analysis can result in improved resilience, it is not always a “silver bullet.” A petrochemical refinery for example, can take days or longer to go from an emergency stop condition back to 100% of capacity. Any IT dependency that triggers even a five-minute complete shutdown of such a facility incurs this start-up cost of losing days or more of production. Applying network engineering principles to reliability-critical IT sub-networks can save us a lot of downtime in some cases, but we must still consider the realities of the physical process. 

Further reading:

This example is a small part of Chapter 5 of the author’s new book Engineering-Grade OT Security – A manager’s guide. If you found value in this article, you can request your own free copy of the book here, courtesy of Waterfall Security Solutions.

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis appeared first on Waterfall Security Solutions.

]]>
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations https://waterfall-security.com/ot-insights-center/oil-gas/recorded-webinar-cyber-informed-engineering-transforms-it-ot-convergence-in-oil-gas-operations/ Mon, 04 Mar 2024 10:42:38 +0000 https://waterfall-security.com/?p=20490 Webinar recording of Kevin Rittie, Andrew Ginter, and Alan Acquatella introducing a new approach for solving the long standing challenge of safely and securely converging IT and OT networks in an Oil & Gas operation.

The post Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations appeared first on Waterfall Security Solutions.

]]>

Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Webinar recording of Kevin Rittie, Andrew Ginter, and Alan Acquatella introducing a new approach for solving the long standing challenge of safely and securely converging IT and OT networks in an Oil & Gas operation.

Picture of Waterfall team

Waterfall team

Webinar Recording OT/IT with CIE

Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than just vital data, they also move malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over. 

However, understanding what “more” means has been the challenge.

Cyber-Informed Engineering (CIE) is a new approach to securing IT/OT convergence – an approach and a perspective that highlights important opportunities. For example, in CIE, worst-case consequences define security requirements for industrial networks, and consequence boundaries define unique spheres of expertise and approaches, including safety engineering, process engineering, the NIST Cybersecurity Framework and leveraging industrial data in the cloud.

 

In this webinar Kevin Rittie, Andrew Ginter, and Alan Acquatella covered some important points:

arrow red right The challenges facing OT engineering as it strives to build secure bridges between operations, corporate, and the cloud in order to satisfy the ever growing need for operational data that drives strategic business growth.

arrow red right CIE and how this approach of secure-by-design engineering can improve the security and operational integrity of both brownfield and greenfield installations.

arrow red right Practical examples of cyber-informed engineering and unidirectional networks combining to build safe and secure production environments.

Towards the end of the webinar, we answered some of the listeners questions and provided a list of some tangible next steps that you can take on your continuous cybersecurity journey.

Watch Now:

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations appeared first on Waterfall Security Solutions.

]]>
Adding Industrial Connectivity Without Adding Cyber Risk https://waterfall-security.com/ot-insights-center/oil-gas/adding-industrial-connectivity-without-adding-cyber-risk/ Mon, 19 Feb 2024 12:47:32 +0000 https://waterfall-security.com/?p=19847 The post Adding Industrial Connectivity Without Adding Cyber Risk appeared first on Waterfall Security Solutions.

]]>

Adding Industrial Connectivity Without Adding Cyber Risk

Unidirectional gateways are used to secure connectivity to industrial networks that serve as the lifeblood for analytics data used to optimize Oil & Gas production operations.
Picture of Kevin J. Rittie

Kevin J. Rittie

Industrial Connectivity without cyber risk

Analyzing data followed by optimizing a process with the goal of increasing efficiency is an accepted formula that can be applied to nearly any industry. When it comes to large industrial processes, the collection of such data (for analysis) has grown significantly–and continues to grow–while the drive for increased optimization and higher efficiencies is ever more desired.   

With the recent advent of IIoT, Industry 4.0, Cloud-based analytical services, and 3rd party vendors, all of which use the internet and corporate intranets to transmit and export data, new attack vectors are continuously arising. The common architectural IP-based pathway at the core of all integration presents a most attractive attack surface to those with less than good intentions. Many IIoT are configured in a way that directly violates the Purdue model’s “defense in depth”. However, the data provided by these devices and their sensors is critical to the economic viability of the operations.  Therefore, securing them is not just an option to be considered, but a requirement. 

“Many IIoT are configured in a way that directly violates the Purdue model’s “defense in depth”. However, the data provided by these devices and their sensors is critical to the economic viability of the operations.” 

Must-have Connectivity

Despite the risks that these devices and their connectivity pose, most of this integration is vital in making the operation economically feasible. If solutions and networks can be maintained to run for 25 years, created with connected devices that alert for preventative maintenance, then having the machines break down after 10 years while running in isolation and not taking advantage of efficiencies that extend operational lives is no longer an acceptable business option. As connected operations deliver higher efficiencies through better maintenance of production machinery, the more the demand for connectivity will grow. 

The Risk of Ransomware

While the benefits of these connected sensors and devices have a clear upside, there is a risky downside. One glaringly common threat is that of ransomware. The fear is that someone may: 

  • Exploit the integration and knowledge gains made possible by connected devices to establish a foothold in the industrial network…

     

  • From there, move laterally, escalate privileges, and eventually encrypt the contents of the entire industrial network…

     

  • Thereby impacting operations and possibly causing significant societal impacts.  

 

The attackers then contact the owners and offer the encryption key for a ransom. Usually millions of dollars. And there is no guarantee that the encryption key ransomed will actually unlock your data. There is no ransomware support to contact if everything doesn’t go back to normal after the ransom payment—you effectively start over with backups and fresh systems. 

There are dozens of other cyber threats besides ransomware. Protecting against all of them is as important as protecting against only one of them. 

Protecting OT Connectivity

When it comes to protecting IT networks, the main concern is that someone will exfiltrate sensitive information. When it comes to protecting OT networks, the main concern is that someone will insert malicious code into the network or a device, which will cause it to simply stop working, or worse, violently stop working in a way that endangers the lives of the surrounding workers. As such, while IT security is heavily focused on protecting anything from leaking OUT, OT security is heavily focused on making sure nothing gets IN. 

The Solution: Unidirectionality

The connectivity requirements for industrial systems help operational data travel to where it needs to go to be analyzed, be it the cloud, a third-party vendor’s servers, or the OEM of an IIoT device. While this connectivity is critical for operations and maintaining efficiency, it is mainly the incoming connectivity that poses all the risks, and the outbound connectivity that provides all the benefits. The Solution: Unidirectionality. Waterfall’s unidirectional gateways and other solutions replicate the OT system’s servers, updating them in real time using a unidirectional connection that lets the data flow outward. If anything tries to flow into the OT network, it can’t. The physical hardware is designed to literally be missing those components, making it impossible to breach the OT network, ensuring that it remains 100% unbreachable.  

When the analytical servers on the cloud, the third-party vendors, or the IIoT device needs to send a request for pulling the data, it sends the request to the replica of the OT system’s server that sits on the Waterfall unidirectional gateway. If a threat actor attempted to hack into the OT network, they would be hacking into an inert replica that only provides copies while not allowing for any access to any of the controls.  

Embracing the OT Digital Transformation

As industries embrace the era of digital transformation and rely more on interconnected systems for operational efficiency, the need for robust cybersecurity measures grows in importance. While the benefits of connected sensors and devices are undeniable, the looming threat of cyberattacks underscores the importance of safeguarding industrial networks. Unidirectional gateways offer a compelling solution by enabling outbound data flow for analysis while ensuring that no incoming connections compromise the integrity of the operational technology (OT) network. By implementing such measures, industries can strike a balance between connectivity and security, safeguarding their critical infrastructure and optimizing Oil & Gas production operations without adding additional cyber risks.  

About the author
Picture of Kevin J. Rittie

Kevin J. Rittie

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing. Kevin's innovative contributions include leading the design of a patented control visualization architecture and driving the development of energy management solutions, culminating in the establishment of his own business, RevelationSCS, focused on change management, software practices, and securing critical infrastructure.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Adding Industrial Connectivity Without Adding Cyber Risk appeared first on Waterfall Security Solutions.

]]>
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks https://waterfall-security.com/ot-insights-center/oil-gas/checklist-9-best-practices-to-safeguard-upstream-oil-gas-operations-from-cyber-attacks/ Wed, 14 Feb 2024 12:02:50 +0000 https://waterfall-security.com/?p=19269 Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations.

Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations.

The post Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks appeared first on Waterfall Security Solutions.

]]>

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations.

Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations.

Some highlights of what is covered:

arrow red right  CIE and IT Best Practices that apply to upstream and cyberattacks preparedness.

arrow red right  Onsite security, personnel security, and employe training that goes a long way.

arrow red right Protecting against remote threats without restricting outside connectivity

Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.

About the author
Picture of Kevin J. Rittie

Kevin J. Rittie

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing. Kevin's innovative contributions include leading the design of a patented control visualization architecture and driving the development of energy management solutions, culminating in the establishment of his own business, RevelationSCS, focused on change management, software practices, and securing critical infrastructure.
Share

Fill out the form and get it by email​

The post Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks appeared first on Waterfall Security Solutions.

]]>
How to Properly Cyber Secure an Upstream Oil & Gas Operation https://waterfall-security.com/ot-insights-center/oil-gas/how-to-properly-cyber-secure-an-upstream-oil-gas-operation/ Tue, 13 Feb 2024 10:27:02 +0000 https://waterfall-security.com/?p=19276 The Waterfall Unidirectional Security Gateway and how it has been applied at Oil & Gas production sites such as oil fields and offshore platforms.

The post How to Properly Cyber Secure an Upstream Oil & Gas Operation appeared first on Waterfall Security Solutions.

]]>

How to Properly Cyber Secure an Upstream Oil & Gas Operation

The Waterfall Unidirectional Security Gateway and how it has been applied at Oil & Gas production sites such as oil fields and offshore platforms.
Picture of Kevin J. Rittie

Kevin J. Rittie

How to Properly Cyber Secure an Upstream Oil & Gas Operation

Protecting an Upstream Oil & Gas operation from cyber threats can be significantly challenging. Unlike many other industrial processes, any disruption to Upstream production has a potentially broad ripple effect, possibly impacting Midstream, Downstream, and even the entire supply chain that uses those petroleum products to provide society with its goods, services, and of course, the fuel with which to deliver them. 

Emerging technologies are making the task even more complex, for example, the use of IIoT has grown significantly over the past half-decade, requiring many points of external cloud connectivity that completely bypass important boundaries put in place by the Purdue Model, a commonly followed OT security framework. As this outside connectivity is used to fine-tune and optimize operations, organizations become dependent on this data’s derivative value, making it a requirement and no longer a nice to have. While there are traditional methods to control the flow of data from this class of devices, a unidirectional configuration can provide you guaranteed secure exchange with low maintenance needs. The data that the IIoT device sends out may not be sensitive, but the machine from which it is collecting that information could be highly sensitive. Therefore, the main goal is protecting the sensitive machine, not the non-sensitive data.  

“The data that the IIoT device sends out may not be sensitive, but the machine from which it is collecting that information could be highly sensitive.”

TSA Directive for Midstream—Is an equivalent coming to Upstream?

When the Colonial Pipeline cyber incident occurred, there were no formal regulations or laws geared toward preventing such occurrences. Within less than a year, initial regulations were established with updates and refinements garnered from the industry and from acknowledged best practices in an effort to prevent a repeat. The Upstream sector is currently not cyber-regulated, as (knock on wood) there haven’t been any overtly public cyber incidents targeting an Upstream operation, that is, a bellwether event similar to Colonial Pipeline. 

However, if such an Upstream incident were to occur, it could rapidly change the regulatory landscape. Even sans a cyber event, regulators and critical infrastructure oversight agencies are keen to prevent the lurking menace of an attack that could happen due to a lack of assurances that regulations can provide. This is the reason it makes sense for Upstream operations to ensure that its cybersecurity processes demonstrably leverage industry best practices used across many diverse industries, not just oil and gas.  This proactive behavior could reduce the need for regulations as well as provide society and oversight agencies with assurance that the Upstream industry is doing all that it can do to ensure safe, secure, environmentally sound, and uninterrupted operations across the entire segment. 

No one likes the risk of new regulations, and there’s a concern that those imposing these regulations are not fully familiar with the systems they are tasked with protecting, nor do they fully understand the threats against that which they are protecting. Waterfall provides a very high level of security to protect operations. As a side benefit, most regulations and compliances are fully met by using Waterfall’s Unidirectional Gateways. There are even aspects of certain regulations that have network areas exempt from certain details of compliance if those network areas are behind a Waterfall Unidirectional Gateway. 

The Best of Best Practices

Because of the sensitive nature of all Oil & Gas operations, the best-of-the-best practices make the most sense for securing these operations. When it comes to the best practice of protecting an industrial network from external threats while still maintaining external connectivity, the best-of-the-best practice is to use a Waterfall Unidirectional Gateway. This provides a safe and secure way to connect the OT network(s) to the IT network, protecting the connectivity used for the flow of operational data that needs to be analyzed to ensure optimized operation, as well as for IIoT devices that need to connect with their vendors or to the cloud for advanced analytics. 

One Way - Do Not Enter

ONE WAY street signWaterfall’s Unidirectional Gateway (UDG) is like a one-way street or a one-way valve, but for data. The UDG flawlessly lets data flow out, but it doesn’t let even a “drop” flow back into the industrial network. The technical details are of course more complex than a valve or a one-way street sign, but the concept is fundamentally the same, thereby providing a physical barrier that prevents data from ever flowing back in, no matter how capable the threat actor.  
 
Unlike IT security where our concern is that information will leak out, the threat with industrial connectivity is that a malicious payload will get INTO the system and cause damage or disruptions. By physically ensuring that nothing can remotely enter the system, unidirectional gateways protect against all such threats and risks. 

Industrial Connectivity with a Chance of Cloud

Many of the leading analytical products used to optimize industrial operations are based “in the cloud” and require uninterrupted connectivity from the industrial asset to the cloud. Leading cloud providers such as AWS recommend deploying unidirectional gateways to secure such cloud connectivity. By restricting the directionality of the data flow, we can establish secure connections to external and untrusted networks, including those that provide cloud-based services. If that cloud-based service or the cloud infrastructure itself was to be cyber compromised, the industrial network that is protected by a unidirectional gateway would remain physically unreachable and unbreachable.  

Protecting Upstream Oil & Gas Operations

Safeguarding upstream Oil & Gas operations against cyber threats requires proactive measures and the adoption of robust security solutions. As the industry grapples with the challenges posed by emerging technologies like IIoT and external cloud connectivity, the Waterfall Unidirectional Gateway emerges as a best-of-the-best practice for securing industrial networks. By providing a physical barrier that allows data to flow out but preventing any return flow, this solution not only aligns with industry compliance requirements, but also safeguards the network ensuring continuous operations while protecting against potential disruptions. As the threat landscape evolves, proactive implementation of such measures not only enhances security and complies with potential future regulations, but also demonstrates a commitment to safety and the resilience we’ve grown to expect as a society from critical infrastructure. 

About the author
Picture of Kevin J. Rittie

Kevin J. Rittie

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing. Kevin's innovative contributions include leading the design of a patented control visualization architecture and driving the development of energy management solutions, culminating in the establishment of his own business, RevelationSCS, focused on change management, software practices, and securing critical infrastructure.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post How to Properly Cyber Secure an Upstream Oil & Gas Operation appeared first on Waterfall Security Solutions.

]]>
Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations https://waterfall-security.com/ot-insights-center/oil-gas/cyber-informed-engineering-transforms-it-ot-convergence-in-oil-gas-operations/ Thu, 01 Feb 2024 08:17:43 +0000 https://waterfall-security.com/?p=18459 IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over.

The post Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations appeared first on Waterfall Security Solutions.

]]>

Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Join our webinar for an in-depth look at how CIE (Cyber-Informed Engineering) can help in converging IT and OT security for Oil & Gas operations.

Join us on February 28th or 29th 2024.
There will be 2 live streams of the webinar, please pick the date and time that works best for you.

Oil & Gas Webinar

On this webinar, we'll take you through:

IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over. 

However, understanding what “more” means has been the challenge.

Cyber-Informed Engineering (CIE) is a new approach to securing IT/OT convergence – an approach and a perspective that highlights important opportunities. For example, in CIE, worst-case consequences define security requirements for industrial networks, and consequence boundaries define unique spheres of expertise and approaches, including safety engineering, process engineering, the NIST Cybersecurity Framework and leveraging industrial data in the cloud.

Join Kevin Rittie, Andrew Ginter, and Alan Acquatella in this webinar as they introduce a new approach to solving long standing challenges by:

arrow red right Identifying the challenges facing OT engineering as it strives to build secure bridges between operations, corporate, and the cloud in order to satisfy the ever growing need for operational data that drives strategic business growth.  

arrow red right Introducing CIE in a way that it is clear how this approach to secure-by-design engineering can improve the security and operational integrity of both brownfield and greenfield installations.

arrow red right Looking at some practical examples that make tangible how cyber-informed engineering and unidirectional network engineering combine to build safe and secure production environments.

arrow red right Listing some tangible next steps on your continuous cybersecurity journey.

Picture of Kevin Rittie, a Critical Infrastructure Technology Consultant

Kevin Rittie, a Critical Infrastructure Technology Consultant

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing.

Picture of Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter is the most widely-read author in the industrial security space, with over 20,000 copies of his first two books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.

Picture of Alan Acquatella, Industry Expert at Schneider Electric

Alan Acquatella, Industry Expert at Schneider Electric

Alan Acquatella heads the Pipeline & New Energies Infrastructure Segment for Schneider Electric. He brings domain expertise about industry and customer requirements and provides thought leadership and knowledge on valuable technologies and services customers can use to improve their operations and sustainability efforts.

Share

Register Now

The post Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations appeared first on Waterfall Security Solutions.

]]>
Keeping the Flow:  Cyber-Proofing Oil & Gas Production https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/keeping-the-flow-cyber-proofing-oil-gas-production/ Thu, 25 Jan 2024 10:22:48 +0000 https://waterfall-security.com/?p=18194 In our everything-goes-digital era, the upstream Oil & Gas (O&G) industry finds itself at the crossroads of innovation and vulnerability. Securing O&G operations goes beyond the frameworks commonly addressed in IT security.

The post Keeping the Flow:  Cyber-Proofing Oil & Gas Production appeared first on Waterfall Security Solutions.

]]>
Need to “cyber proof” Oil & Gas production operations? Imagine safely keeping production running, even during an ongoing cyberattack. This article explains how.

Keeping the Flow:  Cyber-Proofing Oil & Gas Production

Picture of Kevin J. Rittie

Kevin J. Rittie

Cyberproofing Oil and Gas Production

In our everything-goes-digital era, the upstream Oil & Gas industry finds itself at the crossroads of innovation and vulnerability. Securing upstream Oil & Gas operations goes beyond the frameworks commonly addressed in IT security. This blog post begins to peel back the layers of OT security in Oil & Gas, unveiling the approach needed to maintain production, even during an ongoing cyberattack on the IT network. 

Something, Something, Cyber Kill Chain

While Lockheed Martin’s Cyber Kill Chain is commonly (over) used to understand the anatomy of an IT cyberattack, it is important to note that the goals of such attacks differ greatly when compared to OT cyberattacks. While generic IT attacks involve tactics such as data exfiltration or ransomware, attacks on OT and industrial operations generally target the functionality of the operation itself, with the goal of causing a disruption that makes headlines, as well as having a noticeable impact as it ripples through society. Unfortunately, the attacker’s objectives are becoming more dangerous, as some attacks are designed to cause bodily harm to workers at the site, negating the elaborate safety protocols designed to prevent such incidents, or to cause harm at a community level such as seen in recent water system attacks. 

The stakes of the game are much higher when dealing with OT security, thus, preventing cyberattacks from successfully traversing the cyber kill chain becomes a matter of life and death. We are no longer just protecting information; we are protecting physical assets and human lives. 

“The stakes of the game are much higher when dealing with OT security, thus, preventing cyberattacks from successfully traversing the cyber kill chain becomes a matter of life and death.”

The Shutdown Showdown

Within the context of cyber resilience, Unidirectional Gateways have proven to be an instrumental component. Unidirectional Gateways inherent unbreachability allows for continued operation even during an ongoing IT cyberattack.  This ensures that production continues as IT responds to identify and contain the attack and how to best respond.  

Now, realistically, production may still need to be stopped since commercial support systems, for example, billing, typically reside within the IT networks.  The unavailability of these support systems might negate the ideal situation of keeping operations up and running.  Fortunately, Unidirectional Gateways remove the urgency to abruptly shut down operations, providing time to calmly consider the next steps in incident response versus a crisis system shutdown.  Following the proper triage of the incident, if no system shutdown is warranted, operations can securely remain running, or an operationally sound shutdown and restart process can be executed, reducing safety and commercial risks. 

Compliance throughout other industry sectors

Before the infamous Colonial pipeline shutdown, the Midstream sector was fundamentally self-regulated with regard to cybersecurity, with little to no regulations from authorities. Once the Colonial incident happened, the regulations and compliances began rolling out, with many in the industry frustrated that IT concepts were being improperly applied to OT

Unidirectional Gateways offer such a high level of OT security, that when regulations start rolling out, many of the compliance points are already met. In some cases, some of the details for compliance with the regulation are explicitly not required when there is an Unidirectional Gateway.

Cloud and IT connectivity.

An expanding desire for O&G companies is the ability to leverage their industrial data in order to perform complex analysis as they seek to find new values, reduce costs, or achieve operational efficiencies.  These analysis tools are often cloud-based, meaning that information from the isolated/segmented OT environment must be made available to these tools, therefore, a secure means of transferring information across network boundaries is a must, keeping OT networks isolated from the internet as a means of reducing the risk of cyber attacks.  Firewalls mitigate but do not remove these risks, thus, the deployment of a UDG for these operations can ensure safe exchanges of data to corporate and the cloud.   

Unidirectional Gateways are the safest way to connect industrial systems to The Cloud and the internet, facilitating the flow of data from OT to the desired analytics environments, without letting any information flow back into the industrial system. This allows OT to be “connected” to The Cloud with a secure intermediary that reduces the attack surface while expanding functionality. 

The journey to cyber-proofing O&G production operations requires a multifaceted approach. By prioritizing OT security, leveraging Unidirectional Security Gateways, and staying ahead of regulatory developments, the industry can navigate the challenges posed by cyber threats while embracing the opportunities presented by digital innovation. In doing so, Oil & Gas companies can not only safeguard their operations but also pave the way for a resilient and connected future. 

About the author
Picture of Kevin J. Rittie

Kevin J. Rittie

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing. Kevin's innovative contributions include leading the design of a patented control visualization architecture and driving the development of energy management solutions, culminating in the establishment of his own business, RevelationSCS, focused on change management, software practices, and securing critical infrastructure.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Keeping the Flow:  Cyber-Proofing Oil & Gas Production appeared first on Waterfall Security Solutions.

]]>