A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN
Abstract
:1. Introduction
1.1. Existing Limitations
1.2. Contributions
- A new risk assessment approach is introduced based on NIST CSF and ISA/IEC 62443 standards. The proposed risk-scoring approach allows for predicting risk based on security standard requirements and present vulnerabilities.
- A program has been implemented to automate the scrutinization of eight different WAN technologies against SD-WAN to understand the possible gaps of an OT WAN infrastructure and highlight the security advantages of using SD-WAN to secure such infrastructure. The selected technologies are Satellite WAN, LoRaWAN, Private LTE/5G Networks, MPLS (Multiprotocol Label Switching), Leased Line, DMVPN (Dynamic Multipoint Virtual Private Network), IPSec VPN (Internet Protocol Security Virtual Private Network), and VPLS (Virtual Private LAN Service).
- The suitability of all studied WAN technologies in terms of risks and mitigations related to DoC, DoV, and DoS attacks is highlighted.
- Two designs of an OT-WAN-based network using SD-WAN and following the PURDUE model are introduced.
1.3. Paper Organization
2. Related Works
2.1. SDN-Related Research
2.1.1. SDN Non-Security Related
2.1.2. SDN Security Related
2.2. SD-WAN-Related Research
2.2.1. SD-WAN Non-Security Related
2.2.2. SD-WAN Security Related
2.3. Analysis
2.4. Existing Risk-Scoring Techniques
3. Background
3.1. OT Risk Management Frameworks
3.2. OT WAN Device Risk Identification and Mitigation
4. Proposed Risk-Assessment Approach
4.1. OT Risks and Mitigations Prioritization and Priority Weighting
4.2. Risk and Mitigation Values per Selected Technology
4.3. RS Derivation from NIST
- Vulnerability refers to the risks associated with using a WAN device to extend OT infrastructure and the likelihood of its mitigation features successfully addressing DoV, DoC, and DoS. In other words, it is equal to the probability of risk and probability of mitigation to succeed
- Impact is represented by a weight that prioritizes the OT infrastructure, ranking the risks and mitigations based on their current relevance to the specific OT environment. Precisely, the impact equals the weight of risk and the weight of mitigation.
5. Implementation, Results, and Analysis
5.1. Automation
5.2. Testing and Discussion
5.3. SD-WAN Design Based on the Proposed OT WAN Risk Assessment
6. Conclusions and Future Directions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Matt, D.T.; Modrák, V.; Zsifkovits, H. (Eds.) Industry 4.0 for SMEs: Challenges, Opportunities and Requirements; Springer Nature: Cham, Switzerland, 2020; p. i-412. [Google Scholar] [CrossRef]
- Villa, A.; Taurino, T. SME Innovation and Development in the Context of Industry 4.0. Procedia Manuf. 2019, 39, 1415–1420. [Google Scholar] [CrossRef]
- Rikalovic, A.; Suzic, N.; Bajic, B.; Piuri, V. Industry 4.0 implementation challenges and opportunities: A technological perspective. IEEE Syst. J. 2022, 16, 2797–2810. [Google Scholar] [CrossRef]
- Deloitte. Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production. Deloitte Insights. 2018. Available online: https://www2.deloitte.com/content/dam/insights/us/articles/3749_Industry4-0_cybersecurity/DUP_Industry4-0_cybersecurity.pdf (accessed on 24 August 2024).
- ISAGCA (International Society of Automation Global Cybersecurity Alliance). Security Lifecycles Whitepaper. 2020. Available online: https://anapur.de/wp-content/uploads/2020/10/ISAGCA-Security-Lifecycles-whitepaper-FINAL.pdf (accessed on 24 August 2024).
- ISA. ISA/IEC 62443 Series of Standards. 2024. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 24 August 2024).
- Hahn, A.; Ashok, A.; Sridhar, S.; Govindarasu, M. Cyber-Physical Systems Security. 2019. Available online: https://www.cybok.org/media/downloads/Cyber-Physical_Systems_Security_issue_1.0.pdf (accessed on 24 August 2024).
- MITRE. MITRE ATT&CK for ICS. 2024. Available online: https://attack.mitre.org/techniques/ics/ (accessed on 24 August 2024).
- MITRE. Mitigations ICS. 2024. Available online: https://attack.mitre.org/mitigations/ics/ (accessed on 5 July 2024).
- MITRE. Network Segmentation (M0930). 2024. Available online: https://attack.mitre.org/mitigations/M0930/ (accessed on 24 August 2024).
- Assante, M.J.; Lee, R.M. The Industrial Control System Cyber Kill Chain. SANS Institute. 2015. Available online: https://sansorg.egnyte.com/dl/HHa9fCekmc (accessed on 24 August 2024).
- Macaulay, T.; Assante, M.J.; Lee, R.M. RIoT Control: Understanding and Managing Risks and the Internet of Things. In Security and Privacy in the Internet of Things; Gupta, M., Walrand, B., Eds.; Morgan Kaufmann: Cambridge, UK, 2015; p. 249. Available online: https://books.google.co.uk/books/about/RIoT_Control.html?id=oXIYBAAAQBAJ&redir_esc=y (accessed on 24 August 2024).
- Cybersecurity and Infrastructure Security Agency (CISA). ICS Alert (ICS-ALERT-17-102-01A): BrickerBot Permanent Denial-of-Service Attack. 2017. Available online: https://www.cisa.gov/news-events/ics-alerts/ics-alert-17-102-01a (accessed on 24 August 2024).
- Cybersecurity and Infrastructure Security Agency (CISA). Advisory (ICSA-15-202-01): Siemens SIPROTEC Denial-of-Service Vulnerability. 2018. Available online: https://www.cisa.gov/news-events/ics-advisories/icsa-15-202-01 (accessed on 24 August 2024).
- National Institute of Standards and Technology (NIST). Manufacturing Sector: Cybersecurity Recovery Framework Project. NIST NCCoE. 2022. Available online: https://www.nccoe.nist.gov/sites/default/files/2022-12/mfg-recovery-project-description-final-r1.pdf (accessed on 24 August 2024).
- Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. Guide to Industrial Control Systems (ICS) Security (NIST Special Publication 800-82 Revision 3). National Institute of Standards and Technology. 2022. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf (accessed on 24 August 2024).
- National Institute of Standards and Technology (NIST). Framework for Improving Critical Infrastructure Cybersecurity. 2018. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (accessed on 24 August 2024).
- Maurushat, A.; Nguyen, K. The legal obligation to provide timely security patching and automatic updates. Int. Cybersecur. Law Rev. 2022, 3, 437–465. [Google Scholar] [CrossRef] [PubMed]
- National Institute of Standards and Technology (NIST). The NIST Cybersecurity Framework (CSF) 2.0; NIST Cybersecurity White Paper; Department of Commerce: Gaithersburg, MD, USA, 2024. [CrossRef]
- Cisco. Secure Access Service Edge (SASE); Cisco Systems, Inc.: San Jose, CA, USA, 2020; Available online: https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/sd-wan/nb-06-sd-wan-secur-aag-cte-en.pdf (accessed on 24 August 2024).
- Cisco. Harness the Power of Networking to Secure Industrial Operations. Cisco White Paper. 2023. Available online: https://www.cisco.com/c/en/us/products/collateral/security/industrial-security/harness-power-networking-secure-industrial-operations-wp.html (accessed on 6 August 2024).
- Cisco. Security Overview. 2024. Available online: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/ios-xe-17/security-book-xe/m-security-overview.html (accessed on 24 August 2024).
- Palo Alto Networks. Network Segmentation Solution Brief. Palo Alto Networks White Paper. 2023. Available online: https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/techbriefs/network-segmentation-solution-brief (accessed on 24 August 2024).
- Palo Alto Networks. Prisma SD-WAN. 2024. Available online: https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/prisma-sd-wan-aag (accessed on 24 August 2024).
- North American Electric Reliability Corporation (NERC). Zero Trust Architecture for Electric Operational Technology (OT). NERC White Paper. 2023. Available online: https://www.nerc.com/comm/RSTC_Reliability_Guidelines/White_Paper_Zero_Trust_For_Electric_OT.pdf (accessed on 24 August 2024).
- Scarfone, K.; Mell, P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication. 2020. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-94.pdf (accessed on 24 August 2024).
- Garcia-Teodoro, P.; Diaz-Verdejo, J.; Macia-Fernandez, G.; Vazquez, E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 2021, 28, 18–28. [Google Scholar] [CrossRef]
- Hu, V.C.; Ferraiolo, D.F.; Kuhn, D.R. Assessment of Access Control Systems. NIST Special Publication. 2020. Available online: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926756 (accessed on 24 August 2024).
- Dasgupta, D.; Roy, A.; Nag, A. Multi-Factor Authentication. In Advances in User Authentication; Springer Publication: Berlin/Heidelberg, Germany, 2021; pp. 185–233. Available online: https://link.springer.com/book/10.1007/978-3-319-58808-7 (accessed on 24 August 2024).
- CyBOK. Introduction to the Cyber Security Body of Knowledge (CyBOK). 2019. Available online: https://www.cybok.org/media/downloads/Introduction_to_CyBOK.pdf (accessed on 24 August 2024).
- Siponen, M.; Pahnila, S.; Mahmood, A. Employees’ Adherence to Information Security Policies: An Empirical Study. In New Approaches for Security, Privacy and Trust in Complex Environments; Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., Eds.; Springer: Boston, MA, USA, 2007; pp. 133–144. [Google Scholar] [CrossRef]
- Kruger, H.A.; Kearney, W.D. A prototype for assessing information security awareness. Comput. Secur. 2021, 25, 289–296. [Google Scholar] [CrossRef]
- Rong, C.; Nguyen, S.T.; Jaatun, M.G. Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 2013, 39, 47–54. [Google Scholar] [CrossRef]
- Mavoungou, S.; Kaddoum, G.; Taha, M.; Matar, G. Survey on threats and attacks on mobile networks. IEEE Access 2016, 4, 4543–4572. [Google Scholar] [CrossRef]
- Jin, H.; Jiang, H.; Zhou, K. Dynamic and Public Auditing with Fair Arbitration for Cloud Data. IEEE Trans. Cloud Comput. 2018, 6, 680–693. [Google Scholar] [CrossRef]
- Bustamante, J.R.; Avila-Pesantez, D. Comparative analysis of Cybersecurity mechanisms in SD-WAN architectures: A preliminary results. In Proceedings of the 2021 IEEE Engineering International Research Conference (EIRCON), Lima, Peru, 27–29 October 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Hama Amin, R.; Ahmed, D. Comparative Analysis of Flexiwan, OPNSense, and pfSense Cybersecurity Mechanisms in MPLS/SD-WAN Architectures. Passer J. Basic Appl. Sci. 2023, 6, 27–32. [Google Scholar] [CrossRef]
- Ozgur Yurekten, O.; Demirci, M. SDN-based cyber defense: A survey. Future Gener. Comput. Syst. 2021, 115, 126–149. [Google Scholar] [CrossRef]
- Yang, Z.; Cui, Y.; Li, B.; Liu, Y.; Xu, Y. Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and Opportunities. In Proceedings of the 2019 28th International Conference on Computer Communication and Networks (ICCCN), Valencia, Spain, 29 July–1 August 2019; IEEE: Valencia, Spain, 2019; pp. 1–9. [Google Scholar] [CrossRef]
- Borgianni, L.; Troia, S.; Adami, D.; Maier, G.; Giordano, S. From MPLS to SD-WAN to ensure QoS and QoE in cloud-based applications. In Proceedings of the 2023 IEEE 9th International Conference on Network Softwarization (NetSoft), Madrid, Spain, 19–23 June 2023; pp. 366–369. [Google Scholar] [CrossRef]
- Kreutz, D.; Ramos, F.M.V.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-Defined Networking: A Comprehensive Survey. Proc. IEEE 2015, 103, 14–76. [Google Scholar] [CrossRef]
- Etxezarreta, X.; Garitano, I.; Iturbe, M.; Zurutuza, U. Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey. Int. J. Crit. Infrastruct. Prot. 2023, 42, 100615. [Google Scholar] [CrossRef]
- Fortinet. Fortinet Secure SD-WAN. 2023. Available online: https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortinet_secure_sdwan.pdf (accessed on 24 August 2024).
- Fressancourt, A.; Gagnaire, M. A SDN-based network architecture for cloud resiliency. In Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2015; IEEE: Las Vegas, NV, USA, 2015; pp. 479–484. [Google Scholar] [CrossRef]
- Izumi, S.; Edo, A.; Abe, T.; Suganuma, T. An Adaptive Multipath Routing Scheme Based on SDN for Disaster-Resistant Storage Systems. In Proceedings of the 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Kraków, Poland, 4–6 November 2015; IEEE: Krakow, Poland, 2015; pp. 478–483. [Google Scholar] [CrossRef]
- Aydeger, A.; Akkaya, K.; Cintuglu, M.H.; Uluagac, A.S.; Mohammed, O. Software defined networking for resilient communications in Smart Grid active distribution networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; IEEE: Kuala Lumpur, Malaysia, 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Foschini, L.; Mignardi, V.; Montanari, R.; Scotece, D. An SDN-enabled architecture for IT/OT converged networks: A proposal and qualitative analysis under DDoS attacks. Future Internet 2021, 13, 258. [Google Scholar] [CrossRef]
- Umar, R.; Kusuma, R.S. Recovery System using SDN Technology for Cyber Attack Solution. In Proceedings of the 2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Jakarta, Indonesia, 28–30 November 2015; IEEE: Semarang, Indonesia, 2021; pp. 241–246. [Google Scholar] [CrossRef]
- Zhang, Y.; Xu, C.; Muntean, G. A Novel Distributed Data Backup and Recovery Method for Software Defined-WAN Controllers. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; IEEE: Madrid, Spain, 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Attia, A.; Khalifa, N.E.; Kotb, A. Data Backup Approach using Software-defined Wide Area Network. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 309–316. [Google Scholar] [CrossRef]
- Wen, Z.; Garg, S.; Aujla, G.S.; Alwasel, K.; Puthal, D.; Dustdar, S.; Zomaya, A.Y.; Rajan, R. Running Industrial Workflow Applications in a Software-Defined Multicloud Environment Using Green Energy Aware Scheduling Algorithm. IEEE Trans. Ind. Inform. 2021, 17, 5645–5656. [Google Scholar] [CrossRef]
- Saxena, M.C.; Bajaj, P. A Novel Method of End-to-End Data Security using Symmetric Key-based Data Encryption and SDWAN Networking. In Proceedings of the 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Noida, India, 14–16 December 2022; IEEE: Noida, India, 2022; pp. 1981–1986. [Google Scholar] [CrossRef]
- Babeshko, I.; Giandomenico, F.D. Safety and cybersecurity assessment techniques for critical industries: A mapping study. IEEE Access 2023, 11, 83781–83793. [Google Scholar] [CrossRef]
- Domínguez, R.; Gomez, C.; Cerezo, O. Risk Analysis Based on ETA, FTA and Bowtie Methodologies for the Bulk Coal Discharge Process. In Advances in Safety Management and Human Performance; AHFE 2021. Lecture Notes in Networks and Systems; Arezes, P.M., Boring, R.L., Eds.; Springer: Cham, Switzerland, 2021; Volume 262. [Google Scholar] [CrossRef]
- Park, C.; Kontovas, C.; Yang, Z.; Chang, C.-H. A BN driven FMEA approach to assess maritime cybersecurity risks. Ocean. Coast. Manag. 2023, 235, 106480. [Google Scholar] [CrossRef]
- Edu, A.S.; Agoyi, M.; Agozie, D. Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. PeerJ Comput. Sci. 2021, 7, e658. [Google Scholar] [CrossRef]
- Goerlandt, F.; Khakzad, N.; Reniers, G. Validity and validation of safety-related quantitative risk analysis: A review. Saf. Sci. 2017, 99, 127–139. [Google Scholar] [CrossRef]
- Ushakov, R.; Doynikova, E.; Novikova, E.; Kotenko, I. CPE and CVE based Technique for Software Security Risk Assessment. In Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, 22–25 September 2021; pp. 353–356. [Google Scholar] [CrossRef]
- Falco, G.; Caldera, C.; Shrobe, H. IIoT Cybersecurity Risk Modeling for SCADA Systems. IEEE Internet Things J. 2018, 5, 4486–4495. [Google Scholar] [CrossRef]
- Zografopoulos, I.; Ospina, J.; Liu, X.; Konstantinou, C. Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies. IEEE Access 2021, 9, 29775–29818. [Google Scholar] [CrossRef]
- Dallat, C.; Salmon, P.M.; Goode, N. Risky systems versus risky people: To what extent do risk assessment methods consider the systems approach to accident causation? A review of the literature. Saf. Sci. 2019, 119, 266–279. [Google Scholar] [CrossRef]
- Fares, B. An Integrated Risk Analysis Framework for Safety and Cybersecurity of Industrial SCADA Systems; University of Stavanger: Stavanger, Norway, 2021. [Google Scholar]
- Progoulakis, I.; Rohmeyer, P.; Nikitakos, N. Cyber physical systems security for maritime assets. J. Mar. Sci. Eng. 2021, 9, 1384. [Google Scholar] [CrossRef]
- Gourisetti, S.N.G.; Lee, A.; Reddi, R.; Isirova, K.; Touhiduzzaman, M.; Sebastian-Cardenas, D.J.; Lambert, K.; Cali, Ü.; Mylrea, M.; Rahimi, F.; et al. Assessing Cybersecurity Resilience of Distributed Ledger Technology in Energy Sector Using the MITRE ATT&CK® ICS Framework. In Proceedings of the 2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain), Irvine, CA, USA, 7–11 November 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Ekisa, C.; Ó Briain, D.; Kavanagh, Y. Leveraging the MITRE ATT&CK Framework for Threat Identification and Evaluation in Industrial Control System Simulations. In Proceedings of the 2024 35th Irish Signals and Systems Conference (ISSC), Belfast, UK, 13–14 June 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; Meskin, N. Cybersecurity for industrial control systems: A survey. Comput. Secur. 2020, 89, 101677. [Google Scholar] [CrossRef]
- Kriaa, S.; Bouissou, M.; Pietre-Cambacedes, L. Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments. Int. J. Crit. Infrastruct. Prot. 2015, 10, 59–72. [Google Scholar] [CrossRef]
- Cybersecurity and Infrastructure Security Agency (CISA). Commercial Facilities Sector Cybersecurity Framework Implementation Guidance. CISA. 2021. Available online: https://www.cisa.gov/sites/default/files/publications/Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf (accessed on 24 August 2024).
- International Organization for Standardization (ISO). ISO/IEC 27001:2022 Information Technology—Security Techniques—Information Security Management Systems—Requirements. 2022. Available online: https://ia600500.us.archive.org/6/items/iso27001/iso27001.pdf (accessed on 24 August 2024).
- Heinl, M.P.; Pursche, M.; Puch, N.; Peters, S.N. From standard to practice: Towards ISA/IEC 62443-conform public key infrastructures. In Computer Safety, Reliability, and Security; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar] [CrossRef]
- Francia, G. Mapping of the NERC-CIP Standards with the NIST CSF. Presented at the 2022 CAE in Cybersecurity Symposium. 2022. Available online: https://www.caecommunity.org/sites/default/files/Copy%20of%2002%20Francia_NERC-CIP_Presentation.pdf (accessed on 24 August 2024).
- US Department of the Army. Risk Management. ATP 5-19. 2014. Available online: https://www.armyresilience.army.mil/ard/images/pdf/Policy/ATP%205-19%20Risk%20Management.pdf (accessed on 24 August 2024).
- National Institute of Standards and Technology (NIST). Guide for Conducting Risk Assessments. Special Publication 800-30 Revision 1. 2012. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf (accessed on 24 August 2024).
- Yan, Y.; Han, G.; Xu, H. A survey on secure routing protocols for satellite network. J. Netw. Comput. Appl. 2019, 145, 102415. [Google Scholar] [CrossRef]
- Wu, X.; Du, Y.; Fan, T.; Guo, J.; Ren, J.; Wu, R. Threat analysis for space information network based on network security attributes: A review. Complex Intell. Syst. 2023, 9, 3429–3468. [Google Scholar] [CrossRef]
- Pospisil, O.; Fujdiak, R.; Mikhaylov, K.; Ruotsalainen, H.; Fujdiak, R. Testbed for LoRaWAN security: Design and validation through man-in-the-middle attacks study. Appl. Sci. 2021, 11, 7642. [Google Scholar] [CrossRef]
- Qadir, J.; Cabus, J.E.U.; Butun, I.; Lagerström, R.; Gastaldo, P.; Caviglia, D.D. Analysis of LPWAN: Cyber-security vulnerabilities and privacy issues in LoRaWAN, Sigfox, and NB-IoT. In Low-Power Wide-Area Networks: Opportunities, Challenges, Risks and Threats; Butun, I., Akyildiz, I.F., Eds.; Springer: Cham, Switzerlnad, 2023; pp. 139–170. [Google Scholar] [CrossRef]
- Suomalainen, J.; Julku, J.; Vehkaperä, M.; Posti, H. Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Paper Directions. IEEE Open J. Commun. Soc. 2021, 2, 1590–1615. [Google Scholar] [CrossRef]
- Nguyen, V.-L.; Lin, P.-C.; Cheng, B.-C.; Hwang, R.-H.; Lin, Y.-D. Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges. IEEE Commun. Surv. Tutor. 2021, 23, 2384–2428. [Google Scholar] [CrossRef]
- Alouneh, S.; En-Nouaary, A.; Agarwal, A. MPLS security: An approach for unicast and multicast environments. Ann. Telecommun. 2009, 64, 391–400. [Google Scholar] [CrossRef]
- Alouneh, S.; Al-Hawari, F.; Hababeh, I.; Ghinea, G. An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. Secur. Commun. Netw. 2018, 2018, 8028960. [Google Scholar] [CrossRef]
- Zhipeng, Z.; Chandel, S.; Jingyao, S.; Shilin, Y.; Yunnan, Y.; Jingji, Z. VPN: A Boon or Trap?: A Comparative Study of MPLS, IPSec, and SSL Virtual Private Networks. In Proceedings of the 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 22–23 February 2018; pp. 510–515. [Google Scholar] [CrossRef]
- Sllame, M. Performance Evaluation of Multimedia over MPLS VPN and IPSec Networks. In Proceedings of the 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), Sabratha, Libya, 23–25 May 2022; pp. 32–37. [Google Scholar] [CrossRef]
- Cisco Systems, Inc. Dynamic Multipoint VPN (DMVPN). 2024. Available online: https://www.cisco.com/c/en/us/products/collateral/security/dynamic-multipoint-vpn-dmvpn/data_sheet_c78-468520.html (accessed on 24 August 2024).
- Marah, H.M.; Khalil, J.R.; Elarabi, A.; Ilyas, M. DMVPN Network Performance Based on Dynamic Routing Protocols and Basic IPsec Encryption. In Proceedings of the 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Kuala Lumpur, Malaysia, 12–13 June 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Frankel, S.; Kent, K.; Lewkowski, R.; Orebaugh, A.D. Guide to IPsec VPNs. NIST Special Publication 800-77. 2005. Available online: https://csrc.nist.rip/library/NIST%20SP%20800-077%20Guide%20to%20IPsec%20VPNs,%202005-12-01%20(Final).pdf (accessed on 24 August 2024).
- Xu, Z.; Ni, J. Paper on network security of VPN technology. In Proceedings of the 2020 International Conference on Information Science and Education (ICISE-IE), Sanya, China, 4–6 December 2020; pp. 539–542. [Google Scholar] [CrossRef]
- Pudelko, M.; Emmerich, P.; Gallenmüller, S.; Carle, G. Performance Analysis of VPN Gateways. In Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Virtual, 9–12 November 2020; pp. 1–8. Available online: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=andarnumber=9142755 (accessed on 24 August 2024).
- Liyanage, M.; Ylianttila, M.; Gurtov, A. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks. IEEE Access 2015, 3, 967–984. [Google Scholar] [CrossRef]
- Gaur, K.; Kalla, A.; Grover, J.; Borhani, M.; Gurtov, A.; Liyanage, M. A Survey of Virtual Private LAN Services (VPLS): Past, Present and Future. Comput. Netw. 2021, 196, 108245. [Google Scholar] [CrossRef]
- Rathwell, G.A.; Williams, T.J. Use of the Purdue Enterprise Reference Architecture and Methodology in industry (the Fluor Daniel example). In Modelling and Methodologies for Enterprise Integration; IFIP—The International Federation for Information Processing; Bernus, P., Nemes, L., Eds.; Springer: Boston, MA, USA, 1996; pp. 12–44. [Google Scholar] [CrossRef]
Technique | Advantages | Disadvantages | Application in OT | Formula Granularity and Approach | Risk Score Scaling | Includes Risk and Mitigation Scoring | Per Asset Assessment | Predictive Risk Score Analysis |
---|---|---|---|---|---|---|---|---|
Proposed Risk Scoring (OT WAN Risk Scoring) | Provides comprehensive and granular approach in identifying risk severity and mitigation effectiveness present per WAN device when used in OT. | Focus only on the OT WAN devices. | Efficiently calculate the risks in WAN technologies when used in OT. | Yes— (Detailed in the next sections). | Yes | Yes | Yes | Yes |
FTA/ETA | Identifies root causes and potential failure sequences which is good for incident prediction and risk reduction. | Requires detailed knowledge of failure probabilities, which may be hard to quantify. | Applied in OT for predictive analysis of failures and to model cascading impacts on operations. | No— Probability of Top Event = Product of probabilities of all contributing events | Yes | Yes | Yes | Yes |
FMEA | Structured, systematic approach; helps prioritize risks based on severity, occurrence, and detectability; useful for identifying critical failure modes. | Can be subjective; requires detailed analysis; time-consuming to implement across large systems. | Used in OT to assess potential failure modes of equipment and processes. | Yes— RPN = Severity × Occurrence × Detectability. | Yes | No | Yes | No |
QRA | Provides numerical results that support cost–benefit analysis and decision-making; useful in high-risk industries for precise risk quantification. | Requires substantial data and statistical expertise; can be time-consuming and resource intensive. | Applied in safety-critical OT environments such as oil and gas, chemical, and nuclear sectors. | Yes— Probability of Occurrence × Impact; uses statistical models and probabilistic analysis. | Yes | No | No | Yes |
CVE-Based Scoring (CVSS) | Widely recognized; standardized scoring; adaptable for OT with environmental modifications. | May not fully capture OT-specific risks like physical safety or operational impact without modification. | Used to evaluate vulnerabilities with environmental modifications to better reflect OT-specific impacts. | No— CVSS Score = Base Score × Temporal Score × Environmental Score | Yes | No | Yes | Yes |
Threat Likelihood and Impact Matrix (Risk Matrix) | Simple visualization of risk; easily understood; allows for prioritization. | Can oversimplify risk; subjective scoring may lead to inconsistencies in results. | Commonly used in OT for its straightforward approach to evaluating and prioritizing risks. | Yes— Risk Score = Likelihood × Impact | Yes | No | No | Yes |
HAZOP | Identifies potential hazards and operability issues systematically; highly detailed and structured; widely recognized in process industries. | Requires expert knowledge; can be labor-intensive; qualitative, making numerical comparisons hard. | Commonly used in chemical, oil and gas, and other process industries for hazard analysis. | No— Uses guide words to identify deviations; no direct scoring formula. | No | Yes | No | No |
Bow-Tie Analysis | Provides clear visualization of threats and mitigation paths; focuses on prevention and mitigation measures. | Time-consuming to create and interpret; lacks numerical scoring, making comparisons difficult. | Useful in OT for visually mapping cause-effect relationships and mitigation measures in critical systems. | No— Scoring based on risk scenario analysis with predefined preventive and mitigative measures (No direct formula) | No. | Yes | No | No |
MITRE ATT&CK for ICS Framework | Maps specific OT attack vectors; highly granular; assists in identifying targeted threats. | No standard numerical scoring; qualitative; requires expert knowledge to interpret results. | Highly specific to OT, providing detailed insights into attack vectors and security control gaps. | No— Scoring based on observed tactics, techniques, and procedures (TTPs) using a scoring rubric. | No | No | No | No |
Feature | NIST CSF | ISO/IEC 27001 | ISA/IEC 62443 | NERC CIP |
---|---|---|---|---|
Focus | Broad, includes IT and OT | Primarily IT, with some OT applications | Specific to ICS and OT | Specific to the energy sector |
Core Components | Five Functions: Identify, Protect, Detect, Respond, Recover | Plan-Do-Check-Act (PDCA) cycle | Various parts for different aspects of ICS security | CIP Standards |
Industry Adoption | Widely adopted across multiple industries | Widely adopted, especially in IT | Increasing adoption in industrial sectors | Mandated for North American electric utilities |
Flexibility | High, adaptable to various industries and organizations | Moderate, less tailored for OT | Moderate, tailored for ICS but can be complex | Low, highly specific to the energy sector |
Regulatory Alignment | Aligns with various regulations and standards | Aligns with ISO standards and some regulations | Aligns with IEC standards and some regulations | Aligns with energy sector regulations |
Implementation Complexity | Moderate, with clear guidelines and best practices | Moderate to high, requires significant documentation | High, detailed and technical | High, detailed and sector-specific |
Support for ICS/OT | Strong, with NIST SP 800-82 providing specific guidance | Limited, more IT-focused | Strong, specifically designed for ICS/OT | Strong, but specific to the energy sector |
Continuous Improvement | Emphasizes continuous improvement through core functions | Emphasizes continuous improvement through PDCA | Supports continuous improvement through lifecycle approach | Emphasizes compliance and periodic review |
Documentation and Resources | Extensive, including detailed guidelines and case studies | Extensive, but often more general | Extensive, technical focus | Extensive, but very specific |
Global Recognition | High, especially in the U.S. and globally | High, globally recognized | Growing, recognized in industrial sectors | High, but limited to the energy sector |
Category | Risks/Mitigations | NIST CSF | ISA/IEC 62443 |
---|---|---|---|
OT WAN Device Risk | Vulnerability Risks | ID.RA-1 | 3-3 SR 7.7 |
Attack Surface Risks | ID.AM-2 | 3-3 SR 7.3 | |
Zero Day Existing Risks | DE.CM-4 | 4-1 SR 1.4 | |
Incident Risk Impact when Down | ID.BE-5 | 2-1 SR 2.6 | |
Third-Party Dependencies | ID.SC-1 | 2-4 SR 1.1 | |
Hardware Failure Risks | PR.DS-4 | 3-3 SR 7.4 | |
Environmental Risks | PR.PT-5 | 3-3 SR 5.1 | |
Human Error Risks | PR.IP-9 | 2-4 SR 3.1 | |
Software Update Risks | PR.IP-12 | 3-3 SR 7.5 | |
Access Control Risks | PR.AC-1 | 3-3 SR 1.1 | |
Communication Network Risks | PR.PT-3 | 3-3 SR 3.2 | |
OT WAN Risk Mitigation | Security Measures within the Device | PR.IP-3 | 3-3 SR 3.1 |
Network Configuration Fault Tolerance | PR.DS-4 | 3-3 SR 5.2 | |
Policy Management and Configuration Management | PR.IP-1 | 3-3 SR 1.8 | |
Capability for Threat Intelligence and Updates | DE.DP-4 | 4-1 SR 1.8 | |
Security Awareness | PR.AT-1 | 2-4 SR 3.1 | |
Resource Budget | ID.GV-2 | 2-1 SR 2.3 | |
Regulatory Environment Compliance | ID.GV-3 | 4-2 SR 1.1 | |
Business Continuity | PR.IP-4 | 3-3 SR 5.3 | |
Detection of Attack Attempts | DE.CM-1 | 4-2 SR 2.7 | |
Backup and Recovery Solutions | PR.IP-4 | 3-3 SR 5.5 | |
Access Control Policies | PR.AC-3 | 3-3 SR 1.6 | |
Encryption and Data Protection Measures | PR.DS-1 | 3-3 SR 4.3 | |
Patch Management Processes | PR.IP-12 | 3-3 SR 7.5 | |
Compatibility with SIEM Systems | DE.DP-4 | 4-2 SR 2.7 | |
Network Segmentation | PR.AC-5 | 3-3 SR 3.1 | |
Redundancy and Failover Mechanisms | PR.DS-4 | 3-3 SR 5.2 | |
Third-Party Vendor Risk Management | ID.SC-1 | 2-4 SR 1.1 |
Priority Level | Risks | Combined Score | Weight (WRn) | Description | |||
---|---|---|---|---|---|---|---|
High Priority | Access Control Risks | 5 | 5 | 4 | 100 | 0.1484 | Crucial in preventing the unauthorized access to systems and devices, which can make way for serious security breaches. |
High Priority | Communication Network Risks | 5 | 5 | 5 | 125 | 0.1855 | It is necessary to provide safe and reliable paths for communication in OT settings. |
High Priority | Vulnerability Risks | 5 | 4 | 5 | 100 | 0.1484 | The top responsibility is the identification and addressing of known vulnerabilities that attackers can exploit. |
High Priority | Zero Day Existing Risks | 4 | 4 | 4 | 64 | 0.095 | There could be unknown vulnerabilities that may be exploited by new attacks, which are unexpected; this unverified vulnerability is in urgent need of fixing. |
High Priority | Incident Risk Impact when Down | 4 | 4 | 5 | 80 | 0.1187 | Ensuring minimal disruption and quick recovery during incidents to maintain operational continuity. |
Medium Priority | Software Update Risks | 4 | 5 | 2 | 40 | 0.0593 | This is important for the management of risks associated with applying software updates, which can add new vulnerabilities or incompatibility issues. |
Medium Priority | Hardware Failure Risks | 2 | 5 | 5 | 50 | 0.0742 | Addressing potential failures in hardware that could disrupt operations or compromise security. |
Medium Priority | Attack Surface Risks | 4 | 4 | 3 | 48 | 0.0712 | Reducing the number of potential entries points that attackers can exploit. |
Medium Priority | Third-Party Dependencies | 3 | 3 | 3 | 27 | 0.0401 | Managing risks associated with reliance on external vendors and service providers. |
Medium Priority | Human Error Risks | 4 | 4 | 2 | 32 | 0.0475 | Mitigating risks arising from human mistakes that can lead to security incidents. |
Low Priority | Environmental Risks | 2 | 2 | 2 | 8 | 0.0119 | Consideration to environmental factors that may affect the physical and operational integrity of OT systems. |
674 | 1 |
Priority Level | Mitigations | Combined Score | Weight (WMm) | Description | |||
---|---|---|---|---|---|---|---|
High Priority | Business Continuity | 5 | 5 | 5 | 125 | 0.1394 | Capability to support continuity plans of the business during and after security-related incidents. |
High Priority | Access Control Policies | 5 | 5 | 4 | 100 | 0.1115 | It is critical for preventing unauthorized access to critical systems. |
High Priority | Network Segmentation | 4 | 4 | 5 | 80 | 0.0892 | It helps contain breaches, hence limiting the spread of cyber incidents within the network. |
High Priority | Security Measures within the Device | 4 | 4 | 5 | 80 | 0.0892 | It ensures the integrity of devices operating within the OT environment. |
High Priority | Patch Management Processes | 4 | 4 | 4 | 64 | 0.0713 | Ensures that systems are up to date and able to validate the latest security patches to mitigate vulnerabilities. |
High Priority | Encryption and Data Protection Measures | 5 | 5 | 4 | 100 | 0.1115 | Critical for maintaining the confidentiality and integrity of data in transit and at rest. |
Medium Priority | Detection of Attack Attempts | 3 | 3 | 4 | 64 | 0.0713 | Implementing mechanisms to detect and respond to security incidents. |
Medium Priority | Backup and Recovery Solutions | 3 | 4 | 5 | 60 | 0.0669 | This ensure that data and system states can be restored in the case of an event. |
Medium Priority | Network Configuration Fault Tolerance | 3 | 3 | 5 | 45 | 0.0502 | It enhances the network’s fault tolerance, therefore enabling it to sustain and recover from faults quickly. |
Medium Priority | Redundancy and Failover Mechanisms | 3 | 4 | 5 | 60 | 0.0669 | Ensures continuity of operations in the event of system failures. |
Medium Priority | Capability for Threat Intelligence and Updates | 4 | 4 | 3 | 48 | 0.0535 | Keeping the system updated with the newest threat intelligence to help prevent an attack. |
Low Priority | Policy Management and Configuration Management | 3 | 4 | 1 | 12 | 0.0134 | Manages the security policies and configuration enforcement. |
Low Priority | Security Awareness | 4 | 4 | 1 | 16 | 0.0178 | Training difficulty (adaptability) to employees to identify and respond to potential security threats. |
Low Priority | Third-Party Vendor Risk Management | 3 | 3 | 2 | 18 | 0.0201 | Manages the risk positioned by third-party vendors; escalates so that they do not turn into a weak link in the process. |
Low Priority | Regulatory Environment Compliance | 2 | 2 | 2 | 8 | 0.0089 | Ensuring that operations are operating in accordance with relevant regulations and standards. |
Low Priority | Compatibility with SIEM Systems | 3 | 3 | 1 | 9 | 0.01 | Ensures integration with Security Information and Event Management (SIEM) tools for better monitoring and analysis. |
Low Priority | Resource Budget | 2 | 2 | 2 | 8 | 0.0089 | Cost allocation of appropriate budget to support the security measures. |
897 | 1 |
Technology | Access Control Risks | Communication Network Risks | Vulnerability Risks | Zero Day Existing Risks | Incident Risk Impact when Down | Software Update Risks | Hardware Failure Risks | Attack Surface Risks | Third-Party Dependencies | Human Error Risks | Environmental Risks | References |
---|---|---|---|---|---|---|---|---|---|---|---|---|
SD-WAN | 2 | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 2 | 2 | Proposed work |
Satellite WAN | 3 | 4 | 3 | 3 | 5 | 3 | 4 | 4 | 5 | 3 | 5 | [74,75] |
LoRaWAN | 3 | 4 | 4 | 3 | 4 | 3 | 3 | 4 | 4 | 3 | 4 | [76,77] |
Private LTE/5G Networks | 3 | 4 | 3 | 3 | 5 | 3 | 3 | 5 | 3 | 3 | 5 | [78,79] |
MPLS | 2 | 2 | 2 | 2 | 4 | 2 | 3 | 2 | 3 | 2 | 2 | [80,81,82,83] |
Leased Line | 2 | 2 | 2 | 2 | 5 | 1 | 3 | 2 | 3 | 2 | 2 | |
DMVPN | 3 | 2 | 3 | 3 | 4 | 3 | 3 | 3 | 3 | 4 | 2 | [84,85] |
IPSec VPN | 3 | 2 | 3 | 3 | 4 | 3 | 4 | 3 | 3 | 4 | 2 | [86,87,88] |
VPLS | 3 | 3 | 3 | 2 | 4 | 2 | 3 | 2 | 4 | 3 | 2 | [89,90] |
Technology | Access Control Policies | Network Segmentation | Security Measures within the Device | Patch Management Processes | Encryption and Data Protection Measures | Detection of Attack Attempts | Backup and Recovery Solutions | Network Configuration Fault Tolerance | Redundancy and Failover Mechanisms | Capability for Threat Intelligence and Updates | Policy Management and Configuration Management | Security Awareness | Third-Party Vendor Risk Management | Regulatory Environment Compliance | Business Continuity | Compatibility with SIEM Systems | Resource Budget | References |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
SD-WAN | 4 | 4 | 4 | 4 | 5 | 4 | 4 | 4 | 4 | 4 | 4 | 3 | 4 | 4 | 4 | 4 | 3 | Proposed work |
Satellite WAN | 3 | 3 | 3 | 2 | 3 | 3 | 2 | 2 | 3 | 3 | 3 | 2 | 3 | 3 | 3 | 3 | 2 | [74,75] |
LoRaWAN | 3 | 3 | 3 | 2 | 4 | 3 | 2 | 2 | 2 | 2 | 3 | 2 | 3 | 3 | 2 | 2 | 2 | [76,77] |
Private LTE/5G Networks | 3 | 4 | 3 | 3 | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 2 | [78,79] |
MPLS | 4 | 5 | 4 | 4 | 3 | 3 | 3 | 4 | 4 | 3 | 3 | 3 | 4 | 4 | 4 | 3 | 2 | [80,81,82,83] |
Leased Line | 4 | 5 | 4 | 4 | 3 | 3 | 3 | 4 | 4 | 3 | 3 | 3 | 4 | 4 | 4 | 3 | 2 | |
DMVPN | 4 | 4 | 3 | 3 | 5 | 2 | 3 | 3 | 3 | 2 | 3 | 3 | 4 | 4 | 4 | 3 | 4 | [84,85] |
IPSec VPN | 4 | 4 | 3 | 3 | 5 | 2 | 2 | 2 | 2 | 2 | 3 | 3 | 4 | 4 | 2 | 4 | 5 | [86,87,88] |
VPLS | 4 | 5 | 4 | 3 | 4 | 2 | 3 | 3 | 4 | 2 | 3 | 3 | 4 | 4 | 4 | 3 | 3 | [89,90] |
Metric Scaling | Mm/5 and Rn/5 Values | ||
---|---|---|---|
1 | Very Low | RS < 0.2 | Very Low |
2 | Low | RS < 0.4 | Low |
3 | Moderate | RS < 0.6 | Moderate |
4 | High | RS < 0.8 | High |
5 | Very High | RS ≥ 0.8 | Very High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abergos, V.J.; Medjek, F. A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN. J. Cybersecur. Priv. 2024, 4, 910-937. https://doi.org/10.3390/jcp4040042
Abergos VJ, Medjek F. A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN. Journal of Cybersecurity and Privacy. 2024; 4(4):910-937. https://doi.org/10.3390/jcp4040042
Chicago/Turabian StyleAbergos, Van Joshua, and Faiza Medjek. 2024. "A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN" Journal of Cybersecurity and Privacy 4, no. 4: 910-937. https://doi.org/10.3390/jcp4040042
APA StyleAbergos, V. J., & Medjek, F. (2024). A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN. Journal of Cybersecurity and Privacy, 4(4), 910-937. https://doi.org/10.3390/jcp4040042