17 Steps to Securing Your Operational Technology and Supporting IT Infrastructure
Building Cyber Security & SAME Cyber IGE Enterprise Security Checklist
The Society of American Military Engineers (SAME) chartered a Cyber Industry/Government Engagement to offer industry best practices for the protection of smart building technologies. The resulting Enterprise Security Checklist was derived from the work of the non-profit, Buildingcybersecurity.org, which is committed to enhancing human safety in the built environment. The SAME Cyber IGE has developed a simple checklist of questions to assess the basic level of cybersecurity effectiveness to compliment federal guidance and initiate a discussion at the installation level about preparedness and readiness to respond to a cyber incident.
The checklist is based on NIST standards and the ISA 62443 series. It covers a variety of topics, including governance, roles, risk assessment, service provider management, system/network access control, physical and logical network architecture, jump kits and change management.
The IGE recommends that the checklist be incorporated into federal guidance for facility managers. This will help them to gauge the readiness of their units to respond to a cyberattack on operational technologies.
AREA | DESCRIPTION | POTENTIAL ARTIFACT | |
---|---|---|---|
1 Security Program (Governance, Policy, Roles) | Ensure that the security program has support and sponsorship from senior leadership. Ensure that the security program includes governance, policy and role descriptions for both OT and IT. |
– Directly addresses OT systems – Includes IT/OT RACI – Event action plan | Do we have a building control system cybersecurity program at the installation level (governance, policies, roles & responsibilities)? |
2
System Asset Inventory
(Hardware and Software) | A system asset inventory must be actively managed to keep information current. This applies to both hardware and software for all system components. The information included should be at a minimum of the following:
|
| Are all the devices and software that run building(s) accounted for in an up-to-date asset inventory program? Do we maintain active jump kits per DOD guidance? |
3 Risk Assessment with Identification of Essential Functions | Documentation that shows how, when and what was assessed. The risk assessment results must also include a risk rating that identifies critical systems or devices that would affect the operations of the building. |
| Have we identified critical building systems in mission essential facilities assessed for cyber risk? |
4 Service Provider Management | Provide a list of service providers. With the following information:
|
– Services provided – Include RACI – Customer’s responsibility – Software/firmware/OS admin responsibilities
| Do we have a complete, up-to-date list of each service provider that supports the systems within buildings? |
5 System/Network Access Control (remote and local) | Documents that outline how, who and when anyone connects to the BACS system and/or network.
|
| Who controls access to building control networks locally and remotely? |
6 Physical and Logical Network Architecture Drawing | Actively managed drawings that include:
|
| Are all building control networks documented? |
7 System Backup/Restore | BACS backup documentation identifies:
|
– Provide system log showing when backups were taken – Provide change control log show when backups were tested. | Are all building control systems, including the devices throughout the building, accurately and consistently backed up? Do we maintain active jump kits per DOD guidance? |
8 Physical Access Control | Documented physical access control establishes guidelines for asset owner-employees and service providers. At a minimum, these guidelines identify:
|
| Do we control physical access to building systems in my facility? |
9 System Account Management | Processes for identifying users, adding and removing accounts, assigning permissions, and periodic review of accounts and permissions. Include any additional policies and procedures for privileged accounts (e.g., administrator accounts) |
– List of active users and rights assigned – Policy for changing a user’s level of permissions – Audit and update policy | Does someone positively control access to accounts used to login to building systems in my facility? |
10 Network Infrastructure Management | Documented network infrastructure management deals with the oversight of key OT infrastructure elements that are required to deliver building control and monitoring. These can include networking components, but the primary focus of network infrastructure management also includes physical components such as networking. |
– Responsibility and frequency for management tasks
| Do you know how all building systems networks are connected to each other? |
11 Remote and External Access | Do I control remote and external access to building systems? | ||
12 Change Management | Documentation that describes the practices designed to ensure successful prioritizing, approval, scheduling, and execution of changes to a BACS. |
| Do you have change management for building systems with the appropriate level of approval? |
13 Updated As-builts System Documentation | As-built system documentation must reflect the system as it is configured currently. |
| Are our As-built documentation for all building systems kept up to date? |
14 System Security Verification | This documentation shows that the systems have been commissioned/ reviewed to ensure that cybersecurity measures have been implemented. This documentation must also show ongoing reviews to ensure that the implemented cybersecurity measures have not been altered or removed. |
| Do you periodically verify that your security measures are configured correctly and operational? |
15 Incident Response and Recovery | Incident response or what happens when an event occurs documentation must include:
|
| Do you have an incident response and recovery plan for your building systems that include cybersecurity incidents, and do you periodically test it per DOD guidance?
Do we know how to report a cyber incident in accordance with DOD policies? |
16 Security Awareness and Skills Training | Security awareness and training documentation must show:
|
| Do you have building system security awareness and training programs that are appropriate for each role? |
17 Data Protection | Data protection policy and procedure documentation that includes:
|
| Do you have a comprehensive approach to protect data at rest or in motion? |