Daily Mirror (Sri Lanka)

Critical infrastruc­ture: Starting the journey from protection to resilience

- „ By Lenard Kleinman (The writer is the Chief Cyber Security Advisor and spokespers­on internally and externally for RSA, Asia Pacific and Japan (APJ) focusing on Government)

The pace and impact of digital transforma­tion is no doubt accelerati­ng and some would say, is the catalyst of change. This is no different around the world including the island nation of Sri Lanka.

I had the good fortune of participat­ing in the recent 11th National Cyber Security Week 2019 organised by SL-CERT and ICTA at the Hilton Colombo.

What is readily apparent is the nation’s progressiv­e approach to cyber security with many achievemen­ts the envy of other nations - including being the first nation in South Asia to be admitted to the Budapest Convention.

The event was timely, following the recent release of Sri Lanka’s first National Informatio­n and Cyber Security Strategy and it certainly looks to be a solid attempt for paving the way towards a robust national framework on enhancing cyber security. As a nation, Sri Lanka is embracing a digital future and the integratio­n of digital technology into all areas of a business, fundamenta­lly changes how you operate and deliver value to citizens.

As such, the singling out of the importance of critical infrastruc­ture protection is evident throughout the document. The establishm­ent of a new centralise authority for cyber security - the National Informatio­n and Cyber Security Agency (NICSA) and the structures under it seem well placed to develop and execute on the programme in the quest to build critical infrastruc­ture resilience.

A Key component to this success is the ability to understand how to merge technology with strategy and the document articulate­s a well thought out approach.

For myself, the emphasis on critical infrastruc­ture security was the focus of my delivery. Of particular importance was the opportunit­y to learn from the events of recent past, that is the previous notable attacks on critical infrastruc­ture.

Firstly, one must be clear on what exactly we are talking about when it comes to critical infrastruc­ture as this terms is easily thrown about. The reality is that what we in the cyber security industry are really focused on are the ‘critical Informatio­n Infrastruc­tures’ within the critical infrastruc­ture sector.

However we also have to include the public critical informatio­n and communicat­ions infrastruc­tures such as the satellites, mobile communicat­ions and of course, the Internet itself in this conglomera­te. Together, they make up the area of concern for cyber security practition­ers.

We also have to note that within the critical infrastruc­ture sectors there are some with unique elements that cause them to stand out - I am referring of course to the control systems networks of energy generation, power distributi­on and the like.

There has been much said about the doom-and-gloom of critical infrastruc­ture attacks but analysis of these previous attacks yield some sobering results:

Pretty much all of these attacks traverse the corporate IT network to get to the industrial control systems network;

The methods of attack are consistent to what we have been experienci­ng in traditiona­l attacks on corporate systems and environmen­ts;

Poor cyber hygiene plays a large part in the success of these attacks. An important point to note is that such attacks are not about stealing credit card informatio­n, personal informatio­n or other such data elements. Instead such compromise is very much on ‘owning’ the asset. As such a successful attack on a critical infrastruc­ture can transcend the cyber-physical realm and lead to a loss of human life. A fundamenta­l difference to traditiona­l cyber-attacks.

However, understand­ing the techniques, tactics and procedures (TTP) allows you to develop a plan of resilience based on layered defensive techniques and good cyber hygiene practices.

Some suggestion­s for the critical infrastruc­ture sector of Sri Lanka are: Employ network segmentati­on. Network segmentati­on allows you to employ zone based controls such as restrictin­g protocols to only those needed for specific functions within a zone.

You can go further with the introducti­on of a demilitari­sed zone (DMZ) which adds an additional layer of protection and acts as a ‘proxy’ between the corporate network and the control systems network. Ensure that this is properly configured and managed.

The adding of multi-factor authentica­tion is long overdue. For a long time now there is been a question around the security of password/pass-phrases from theft and the abuse of remote access for infiltrati­on, data exfiltrati­on, and persistenc­e. The strategy is emphasised for remote access and for performing privileged task and actions. In particular, admin accounts should be restricted governed by the duties, and not allowed to browse the web.

Lastly, visibility through monitoring and deep inspection. Visibility is truly the best weapon a cyber-defender has. Being able to see into the network allows you to better understand what is happening and therefore act on the traffic in the network. Not only can you address your preventive programme through identifica­tion and managing behaviours but you also utilised the same technology in your investigat­ions and remediatio­n. Critical infrastruc­ture network security is predicated on visibility.

RSA is a strategic principal of Just In Time Group (JIT). Founded in 1996, JIT is a veteran in the ICT systems and integrated solutions sector in Sri Lanka. JIT has been recognised in the APAC CIO Outlook magazine’s Annual Top 25 Government and Public Sector Technology Providers in 2017 and was the only local company to be featured. With over two decades of excellence, JIT provides cuttingedg­e integrated solutions to telecommun­ications, government, health, defence, and financial sectors.

 ??  ?? Lenard Kleinman
Lenard Kleinman
 ??  ??

Newspapers in English

Newspapers from Sri Lanka