Skip to content

Missing Incident Detection/Reaction Capabilities

The longer an attacker is able to penetrate the network unnoticed, the higher is the probability that the attacker compromises OT. This also applies if incident reaction is slow or technically inadequate. Without logging and monitoring, breaches cannot be detected. An OT cybersecurity report analysing trends in 2024 shows that 45% of service engagements have a lack of visibility across OT networks, making detections, triage, and response incredibly difficult at scale.

Notable Common Weakness Enumerations (CWEs) included are CWE-223: Omission of Security-relevant Information, CWE-532: Insertion of Sensitive Information into Log File, and CWE-778: Insufficient Logging. Notable MITRE ATT&CK items included are DS0015: Application Log, DS0029: Network Traffic, and M0931: Network Intrusion Prevention.

Description

Incident detection and reaction capabilities provide security countermeasures applied when proactive countermeasures did not prevent an attack. The following items introduce vulnerabilities in this category:

  • Auditable events, such as logins, failed logins, and executed commands or scripts, are not logged.
  • Warnings and errors generate no, inadequate, or unclear log messages.
  • Logs of Firmware, OS, applications, and APIs are not monitored for suspicious activity.
  • Logs are only stored locally.
  • Appropriate alerting thresholds and response escalation processes are not in place or effective.
  • Technical security tests (e.g., penetration tests, vulnerability scans, and manual security testing) do not trigger alerts.
  • The application cannot detect, escalate, or alert for active attacks in a reasonable short time frame.

Rationale

Without logging and monitoring, breaches cannot be detected. An OT cybersecurity report analysing trends in 2024 shows that 45% of service engagements have a lack of visibility across OT networks, making detections, triage, and response incredibly difficult at scale.

Known Attacks

How-To Test (have to discuss)

  • Perform regular incident detection and response exercises where both technical and organizational aspects are tested.
  • Example of testing technical aspects: Generate harmless test-malware and place it at an asset on the system under consideration (SUC). Verify, if the upload on that asset is already blocked or at least alarmed. If not, execute the test-malware and place it somewhere else in the SUC. If the uplaod to the asset is already blocked, encrypt or encode the malware (with several iterations, if needed) and upload it to the asset again to test if host-based detection is also working besides network-based detection.
  • Example of testing organizational apsects: Perform a table top exercise simulating an incident or emergency. Test especially communication flows, responsabilities of the staff, coordination of conducting incident response, and the on-demand acquiration of forensic knowledge (if not in-house) during the exercise.

Mitigation/Countermeasures

Design and Implementation

  • Ensure all login, access control, and server-side input validation failures can be logged with sufficient user context to identify suspicious or malicious accounts and held for enough time to allow delayed forensic analysis.
  • Ensure that logs are generated in a format that log management solutions can easily consume.
  • Ensure log data is encoded correctly to prevent injections or attacks on the logging or monitoring systems.

Operational

  • Ensure that the generated logs are anlayzed and alerts are triggerd, if an event seems suspicious.
  • The implementation of intrusion detection signatures at network boundaries is imperative for the effective prevention of unauthorised access. In the context of industrial control environments, the configuration of network intrusion prevention should be configured in a way that it does not disrupt the protocols and communications that are essential for real-time functions related to control or safety.
  • DevSecOps teams should establish effective monitoring and alerting such that suspicious activities are detected and responded to quickly.
  • Establish or adopt an incident response and recovery plan, such as National Institute of Standards and Technology (NIST) 800-61r2 or later.

References

Standards

Background information

Tooling