New Cybersecurity Order Issued for US Pipeline Operators

It has been reported that the Department of Homeland Security has announced new requirements for U.S. pipeline operators to bolster cybersecurity following Colonial Pipeline ransomware attack. In a statement, DHS said it would require operators of federally designated critical pipelines to implement “specific mitigation measures” to prevent ransomware attacks and other cyber intrusions. Operators must also implement contingency plans and conduct what the department calls a “cybersecurity architecture design review.

Experts Comments

July 21, 2021
Michael Fabian
Principal Security Consultant
Synopsys Software Integrity Group

In the case of Colonial Pipeline, the pipeline operations were halted due to the inability for the operator to bill customers. While this particular attack didn’t affect OT systems, Colonial Pipeline reportedly did fear that the attackers gained information allowing them to potentially attack OT areas of their operations. In the OT/IT evaluations that I’ve conducted over the past 12+ years, I have observed many violations of basic security concepts. This is particularly the case in

.....Read More

In the case of Colonial Pipeline, the pipeline operations were halted due to the inability for the operator to bill customers. While this particular attack didn’t affect OT systems, Colonial Pipeline reportedly did fear that the attackers gained information allowing them to potentially attack OT areas of their operations. In the OT/IT evaluations that I’ve conducted over the past 12+ years, I have observed many violations of basic security concepts. This is particularly the case in industries largely free of directed regulation (unlike the financial industry, for instance). Some of the standard security controls include asset inventories, secure configurations, network segmentation, incident response and disaster response planning, technical solutions around backup and recovery, network and host protection technology (e.g., NIDS, AV, DLP). Security hygiene practices around incident response and disaster response are key when it comes to ransomware attack potential in terms of business continuity and damage control. If a system is impacted by an attack, with a strategy in place, organisations are better positioned to minimise the effects of finding themselves helpless to the demands of the ransomware attackers.

  Read Less
July 21, 2021
Roger A. Grimes
Data-Driven Defense Evangelist
KnowBe4

This is good news. Anything that gets us better secured is a good thing. It will also likely not work. Why? Because it is hard to be perfect and every organisation is already trying to do computer security perfectly. Adding another requirement on top of all the other requirements and regulations overtop of what they already know they should be doing is likely not going to result in being significantly more resilient to cyber attacks. It cannot hurt...but it is not likely to be the final nail in

.....Read More

This is good news. Anything that gets us better secured is a good thing. It will also likely not work. Why? Because it is hard to be perfect and every organisation is already trying to do computer security perfectly. Adding another requirement on top of all the other requirements and regulations overtop of what they already know they should be doing is likely not going to result in being significantly more resilient to cyber attacks. It cannot hurt...but it is not likely to be the final nail in the coffin that defeats all malicious hackers and malware. Well, what then will it take? For one, we need to make it harder for malicious hackers and malware to hide. Hackers hack and spread malware because they either cannot be traced or cannot be arrested and punished when caught. A malicious hacker is more likely to be struck by lightning, twice, than to get arrested for hacking.

We need to significantly secure the internet itself, to make it more secure by default. We will stop more bank robbers when we stop allowing so many banks to be robbed and for all the bankrobbers to get away. There are ways to make the internet significantly more secure. I have written on this topic for decades and recently re-submitted plans for how to do so to CISA and other internet security groups. We have the technology. We do not have to re-invent the wheel. We just need the right people in the same room and a true willingness to solve the problem. I do not want to undersell how hard it is to get people to agree on anything, much less how to fix the internet. But it is not a technical problem. It is a sociological problem...it is a human problem. One day, some digital 9/11-type event will happen to the internet, and when it does, enough enemies and competitors will come together against a common foe that we actually get the support to push the new technology. The technology is there. We are just waiting for agreement. Until we get a far more secure internet and global agreement on digital crimes, we will fight malicious hackers and malware. One more regulation on an industry is not going to change the problem. How do I know? Because we have had three decades of increased regulation and the problem is only getting worse each year."

  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.