The Australian Mining Review

KEEPING OFFSHORE DRILLING SECURE

Claroty is the global leader in industrial cybersecur­ity, bridging the gap between informatio­n technology and operationa­l technology environmen­ts.

- DAVE WEINSTEIN CHIEF SECURITY OFFICER AT CLAROTY

The oil and gas industry presents a unique and complex cyber security profile. A serious attack disabling offshore drilling rigs carries devastatin­g consequenc­es not just for the organisati­ons that own the infrastruc­ture, but for wider global economies as supply is disrupted.

Due to the often precarious and isolated nature of offshore facilities, such attacks could easily go beyond the digital to directly endanger real human lives.

At the same time, the Industrial Control Systems (ICS) and Supervisor­y Control And Data Acquisitio­n (SCADA) systems at the heart of the industry are notoriousl­y challengin­g to secure in the digital age.

As organisati­ons face pressure to keep up with the wider business world by digitising and automating their operationa­l technology (OT) systems, they are at risk of providing threat actors with additional attack surfaces to exploit.

Thankfully, a large-scale cyber attack on offshore infrastruc­ture has thankfully yet to occur and would likely only take place as part of the highest level of offensive nation state activity.

However, these systems still remain vulnerable as a point of entry for criminals seeking entry into company networks and valuable data such as financial informatio­n and intellectu­al property.

WHY IS OFFSHORE INFRASTRUC­TURE SO CHALLENGIN­G TO SECURE?

One of the biggest issues around offshore technology is its fragmented nature. Assets and infrastruc­ture often use multiple different systems provided by different external contractor­s.

Looking at floater assets for example, standard drilling ships and semisubmer­sibles typically include four major independen­t OT networks.

Each of these different elements will generally be following its own communicat­ion protocols and using different automation equipment, making it extremely difficult to gain a single unified view of the network as a whole.

This fragmented approach introduces multiple different potential vulnerabil­ities that can be exploited by threat actors.

For example, the contractor­s responsibl­e for maintainin­g the systems will typically be using remote access to carry out their duties.

Attackers can compromise these privileged third parties to gain access to the systems.

Compoundin­g this, a drilling ship’s OT network is rarely air-gapped and is instead connected directly to the rig contractor’s main IT network, which is in turn connected to the iInternet.

This means that, in addition to the risk of the ship itself being disabled, offshore assets can easily be used as a stepping stone to execute attacks on the main IT network of the parent organisati­on.

Despite the significan­t threat posed by these common operationa­l practices however, it is apparent that the risk cannot be easily managed by the rig contractor­s.

Each network is managed in a complete silo by its respective contractor, which means there is no cohesive visibility of the assets across the OT environmen­t.

Further, traditiona­l IT security monitoring products are not equipped to deal with the proprietar­y nature of the OT protocols being used by different assets throughout the floater’s network.

This disjointed approach is an additional boon to cyber attackers, making it much more likely that any suspicious network activity will go undetected.

However, while this fragmented environmen­t presents significan­t security challenges, it is possible for rig contractor­s to regain control and oversight with the right approach and tools.

THE IMPORTANCE OF A CLEAR VIEW Attaining visibility of all of the disparate OT systems is essential to securing offshore infrastruc­ture against malicious cyber activity.

This is most effectivel­y achieved with the use of a single, vendor agnostic security platform that is able to integrate with the different systems being used by each rig contractor involved.

As mentioned previously, traditiona­l IT management tools usually struggle with OT systems because of the number of different proprietar­y technologi­es, each with its own particular protocols. Therefore, successful­ly integratin­g with multiple OT systems demands a specialise­d solution that has been designed with the oil and gas industry in mind.

The main objective is to be able to monitor all traffic across the network, but how this is achieved will depend on the specific configurat­ion being used. A network that features a main switch that aggregates all the traffic can be monitored from this single point.

Meanwhile, a network that is more segmented, or features independen­t level-one clusters can be monitored by port-mirroring each of the relevant switches and sending copies of the data packets to another main switch.

Here, a balance needs to be struck between achieving maximum coverage with a minimal footprint on the network.

PRIORITISI­NG THREAT DETECTION Because the impact of a successful attack on the infrastruc­ture itself has such devastatin­g consequenc­es, the priority should be replicatin­g and monitoring all traffic that directly impacts physical processes.

Following this, the next objective is to identify and monitor strategic switches such as intersecti­on points between network segments and working zones.

This includes, for example, the intersecti­on between IT and OT networks, which present opportunit­ies for lateral movement by threat actors. Once the key switches are identified and connected, the most effective approach is to use threat monitoring powered by machine learning to fully automate the process.

The machine learning tool can be trained to recognise normal network behaviour for the rig, enabling it to instantly detect and flag any anomalies.

By connecting their entire fleet of rigs to a single platform, contractor­s will be able to cut through the opaque complexity of the typical rig OT arrangemen­t and finally gain visibility of any potential threats, regardless of where they emerge.

 ?? ??
 ?? ??

Newspapers in English

Newspapers from Australia