Cybersecurity Supply Chain Risk Management Checklist #
The actions listed below reflect the guidance from throughout this handbook. They have been re-organized and streamlined. Note, the activities below are not necessarily performed in order from top-to-bottom; some may need to happen concurrently. That said, governance considerations are typically needed at the outset to set scope and ensure leadership buy-in.
Governance, Policies, Planning, and Risk Management #
- Create a charter that outlines the governance mission, purpose, responsibilities, scope, and guidelines with respect to supply chain cybersecurity
- Identify stakeholders from across the utility, and key suppliers, that could be affected by changes in third-party risk management (e.g., centralized procurement processes)
- Use an outcome-oriented change management model to implement new processes and policies
- Perform risk assessment at an organizational level and on critical operational segments
- Identify vendors for systems and services in critical operations
- Identify severity and impact for individual risks and individual vendors
- Implement risk treatments for identified risks
- Develop policies and procedures to manage existing supplier relationships and onboard new suppliers:
- Adopt one or more international standards as source(s) for policy requirements (e.g., NIST Cybersecurity Framework version 2.0, ISO/IEC 27001, ISO/IEC 62443)
- Tailor requirements in standards to organizational needs
- Centralize procurement processes as appropriate
- Develop RFP processes that define cybersecurity requirements for vendors and/or pre-qualify vendors
- Include cybersecurity requirements and expectations in contractual terms and conditions, including clean consequences for failure to comply with these terms
- Apply internal mitigation measures
- Develop and maintain an Incident Response Plan
- Include key elements addressing roles and responsibilities, detection, containment, eradication, recovery, and communication plans
- Consider threat scenarios that could impact critical systems/operations
- Develop playbooks to respond to potential threats/incidents
- Conduct tabletop exercises to test incident response plan and playbooks
- Update incident response plan with lessons learned
Asset Management #
- Understand business processes and identify critical systems/operations
- Identify operational and business constraints
- Identify internal capabilities and gaps in capabilities needed to implement desired level of cyber security program
- Implement Defensible Architecture. Some key characteristics include:
- Segmentation between IT and OT (Purdue Levels 5 and 4)
- Multiple DMZs as appropriate to separate traffic between IT and OT (within Level 4)
- Segmentation of all processes (in Level 2) from the site-wide supervisory (Level 3)
- Segmentation between processes within OT environments (in Level 2)
- Separate management services (e.g., AD) for IT and OT
- Implement Secure Remote Access / Cloud Access
- Separate DMZs for remote access and cloud access as appropriate
- 2-step authentication for humans
- Monitor OT network and physical power system
- Monitor OT networks, especially gateways/bottlenecks for anomalous user activity
- Monitor physical power systems as essential data source for anomalous activity
- Periodic review of critical systems and security practices
- Assess which systems are critical as the utility grows or evolves
- Reconfigure network architecture to align with risk and capabilities
Procurement Processes: Vendor Risk Management from Cradle to Grave #
- Vendor Risk Assessment Components:
- Evaluate the vendor’s cybersecurity strategy, awareness, and controls (note: an established questionnaire like the NATF Energy Sector Supply Chain Risk Questionnaire may be a useful starting point)
- Assess the geographical location of developers and operations personnel to identify potential risks
- Conduct checks to ensure there are no international sanctions or known vulnerabilities
- Assess financial stability to ensure the vendor can perform as required
- Evaluate operational risks, including the vendor’s business continuity and disaster recovery plans
- Consider strategic risks, such as alignment with business goals
- Assess transaction risks, including the vendor’s capacity to perform due to technological failure or human error
- Cybersecurity Risk Mitigation Measures for Individual Systems
- Implement access controls, restrict access to authorized personnel, and enforce role-based access controls
- Ensure sensitive information is encrypted using secure protocols
- Conduct regular backups and store them securely
- Keep all software and firmware updated with the latest security patches
- Use next-generation firewalls and intrusion detection/prevention systems
- Segment the network to limit the impact of potential attacks
- Employ advanced threat detection and response solutions like EDR or XDR
- Continuously monitor the infrastructure for potential threats using SIEM systems and other tools.
- Steps to Take Post-Implementation:
- Update asset and systems inventories to reflect the new hardware and software
- Review and update business continuity plans and incident response processes
- Conduct annual risk audits with the vendor to maintain ongoing security and compliance
- Ensure all critical data and system configurations are backed up and tested regularly
- Offboarding Considerations:
- Understand the uninstallation process for the vendor’s software and hardware
- Ensure all data is deleted according to retention policies and vendor site data destruction procedures
- Update all inventories to reflect the removal of the vendor’s systems
- Ensure a smooth transition to new vendors, if applicable