The New Urgency of Supply Chain Resilience

Read article

Index Insider: How Provider Ecosystems Will Evolve in 2025

Read article

Divestiture: Serious Considerations for IT Separation

Read article

What the Energy Industry Needs to Know about the DOE’s Cyber-Informed Engineering

Share: Print

In June of this year, the U.S. Department of Energy released a conceptual framework for protecting the nation’s critical infrastructure. It’s called the National Cyber-Informed Engineering Strategy. The release arose from the U.S. government’s need to protect the country’s critical infrastructure from growing cybersecurity risks. Though the principles proposed in the framework are not new, they should be taken seriously.

In short, “security by design” is the driving message, and rightly so. Many organizations have critical infrastructure in their operational technology environments that were designed to operate functionally but that lack awareness and accounting for cybersecurity risks. For example, in the oil and gas sector, a variety of equipment and systems from the wellhead to interstate pipelines, new and old, were not designed with security in mind. It is important for companies across the energy industry to identify and prioritize the assets at highest risk and implement cybersecurity protections via a framework like Cyber-Informed Engineering.

Six Core Principles for Cyber-Informed Engineering

The Cyber-Informed Engineering framework includes six core principles. The concepts are not surprising or new, but incorporating them into practice is paramount.

  1. Consequence-focused design: ensure the design of critical infrastructure systems takes into account the possibility of the components being manipulated and the likelihood and impacts of those manipulations.
  2. Engineered controls: include safeguard and countermeasure controls in the upfront design phases of the systems to address and reduce the risks to acceptable levels.
  3. Secure information architecture: architect the data and information storage and flow of the systems to ensure confidentiality, integrity and availability.
  4. Design simplification: avoid making the systems and components unnecessarily complex.
  5. Resilient layered defenses: make sure the system has layers of controls that defend its security posture and that the layers are independent of each other (not co-dependent) and cannot be sidestepped.
  6. Active defense: design the defenses to provide “active” alerting and detection capabilities.
Cyber-Informed-Engineering-Principles 

Figure 1: Cyber-Informed Engineering Principles

The figure above shows how the six Cyber-Informed Engineering principles can be overlayed onto the standard security-by-design process. The good news is that organizations can use the principles to achieve the right outcomes in each phase of the cycle. This is a strong framework to adopt for go-forward critical infrastructure systems design.

Organizations can also adapt this framework to account for systems that were not implemented with security by design principles. Depending on the risk levels, there may be a need to redesign various components or replace the systems all together.

The Department of Energy’s Cyber-Informed Engineering framework and strategic plan can be found here. ISG helps companies across industries understand and apply best security practices to keep their critical infrastructure safe. Contact us to find out how we can help. 

Share:

About the author

Jason Stading

Jason Stading

Jason is a Consulting Manager on ISG’s Cybersecurity team, where he leads client cybersecurity assessments, supports transformation efforts and advises on systems architecture and design. Jason has extensive experience and recognized certifications in cybersecurity, cloud and Technology Business Management (TBM).

ISG Podcasts


ISG-Smartalks-Podcast-Art

Technology and sourcing insights from the thought leaders at ISG

2020-Podcast-Art-The-Digital-Dish-Cover

Exploring the latest news, issues and debates involving the role of women in technology today

2020-Podcast-Art---Bots-and-Beyond---Cover

Exploring the power, promise and peril of automation

Listen to ISG Podcasts