Home > Research > Publications & Outputs > Risk-Based Safety Scoping of Adversary-Centric ...

Electronic data

Links

Text available via DOI:

View graph of relations

Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

Research output: Contribution to Journal/MagazineJournal articlepeer-review

E-pub ahead of print

Standard

Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology. / Staves, Alexander; Gouglidis, Antonios; Maesschalck, Sam et al.
In: Safety Science, Vol. 174, 106481, 30.06.2024.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Staves A, Gouglidis A, Maesschalck S, Hutchison D. Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology. Safety Science. 2024 Jun 30;174:106481. Epub 2024 Feb 29. doi: 10.1016/j.ssci.2024.106481

Author

Bibtex

@article{138cef8a594d484984e4b23f935d2e0a,
title = "Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology",
abstract = "Due to the recent increase in cyber attacks targeting Critical National Infrastructure, governments and organisations alike have invested considerably into improving the security of their underlying infrastructure, commonly known as Operational Technology (OT). The use of adversary-centric security tests such as vulnerability assessments, penetration tests and red team engagements has gained significant traction due to these engagements' goal to emulate threat actors in preparation for genuine cyber attacks. Challenges arise, however, when performing security tests on these as the nature of OT results in additional safety and operational risk needing to be considered. This paper proposes a framework for incorporating the assessment of safety and operational risks within an overall scoping methodology for adversary-centric security testing in OT environments. Within this framework, we also propose a hybrid testing model derived from the Purdue Enterprise Reference Architecture and the Defense in Depth model to identify and quantify safety and operational risk at a per-layer level, separating high and low-risk layers and being subsequently used for defining rules of engagement. As a result, this framework can aid vendors and clients in appropriately scoping adversary-centric security tests so that depth-of-testing is maximised while minimising the risk to safety and to the operational process. The framework is then evaluated through a qualitative study involving industry experts, confirming the framework's validity for implementation in practice.",
author = "Alexander Staves and Antonios Gouglidis and Sam Maesschalck and David Hutchison",
year = "2024",
month = feb,
day = "29",
doi = "10.1016/j.ssci.2024.106481",
language = "English",
volume = "174",
journal = "Safety Science",
issn = "0925-7535",
publisher = "Elsevier",

}

RIS

TY - JOUR

T1 - Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

AU - Staves, Alexander

AU - Gouglidis, Antonios

AU - Maesschalck, Sam

AU - Hutchison, David

PY - 2024/2/29

Y1 - 2024/2/29

N2 - Due to the recent increase in cyber attacks targeting Critical National Infrastructure, governments and organisations alike have invested considerably into improving the security of their underlying infrastructure, commonly known as Operational Technology (OT). The use of adversary-centric security tests such as vulnerability assessments, penetration tests and red team engagements has gained significant traction due to these engagements' goal to emulate threat actors in preparation for genuine cyber attacks. Challenges arise, however, when performing security tests on these as the nature of OT results in additional safety and operational risk needing to be considered. This paper proposes a framework for incorporating the assessment of safety and operational risks within an overall scoping methodology for adversary-centric security testing in OT environments. Within this framework, we also propose a hybrid testing model derived from the Purdue Enterprise Reference Architecture and the Defense in Depth model to identify and quantify safety and operational risk at a per-layer level, separating high and low-risk layers and being subsequently used for defining rules of engagement. As a result, this framework can aid vendors and clients in appropriately scoping adversary-centric security tests so that depth-of-testing is maximised while minimising the risk to safety and to the operational process. The framework is then evaluated through a qualitative study involving industry experts, confirming the framework's validity for implementation in practice.

AB - Due to the recent increase in cyber attacks targeting Critical National Infrastructure, governments and organisations alike have invested considerably into improving the security of their underlying infrastructure, commonly known as Operational Technology (OT). The use of adversary-centric security tests such as vulnerability assessments, penetration tests and red team engagements has gained significant traction due to these engagements' goal to emulate threat actors in preparation for genuine cyber attacks. Challenges arise, however, when performing security tests on these as the nature of OT results in additional safety and operational risk needing to be considered. This paper proposes a framework for incorporating the assessment of safety and operational risks within an overall scoping methodology for adversary-centric security testing in OT environments. Within this framework, we also propose a hybrid testing model derived from the Purdue Enterprise Reference Architecture and the Defense in Depth model to identify and quantify safety and operational risk at a per-layer level, separating high and low-risk layers and being subsequently used for defining rules of engagement. As a result, this framework can aid vendors and clients in appropriately scoping adversary-centric security tests so that depth-of-testing is maximised while minimising the risk to safety and to the operational process. The framework is then evaluated through a qualitative study involving industry experts, confirming the framework's validity for implementation in practice.

U2 - 10.1016/j.ssci.2024.106481

DO - 10.1016/j.ssci.2024.106481

M3 - Journal article

VL - 174

JO - Safety Science

JF - Safety Science

SN - 0925-7535

M1 - 106481

ER -