Topic outline

  • Critical Infrastructure Resilience Platform - CIRP-RAT



    Critical Infrastructure Resilience Platform - CIRP-RAT in 7SHIELD Architecture 

    • Outline

      1. Short Description

      2. Main Purpose and Benefits

      3. Main Functions

      4. Integrations with other Tools

      5. Infrastructure Requirements 

      6. Operation Manual


      • Content

        1. Short Description

        In the framework of 7SHIELD, a set of tools will be offered to end-users, in order to support CI owners and operators, their security managers and risk management teams, assess their infrastructure against cyber-physical risks, identify their vulnerabilities and take appropriate decisions on security measures that will enhance their preparedness against potential incidents. This set of tools consists of:

        • the CIRP-RAT, that will focus on natural, man-made and technological threats, and
        • the DiVA tool that will focus on cyber threat assessment

        This manual focuses on the CIRP-RAT tool, designed to estimate risk following a systematic procedure that incorporates, among other steps: threat identification, asset identification, scenarios definition, vulnerability assessment and consequences assessment. Risk is related mainly to three variables according to the following formula:

        Risk = (Likelihood) x (Consequences), where Likelihood = (Threat) x (Vulnerability)

         

        Risk = Threat x Vulnerability x Consequence (1


        2. Main Purpose and Benefits

        The CIRP-RAT, is a web-based tool, offering through a user-friendly interface the capability to conduct several what-if scenarios (assessments), in order to calculate the risk. It is a question-driven approach, based mainly on threat characteristics, the vulnerability of the assets, security measures in place and impact analysis leading to the risk identification and measurement.

        The tool can be used and adapted to each 7SHIELD CI’s characteristics, assets, measures and needs, so that each end-user can easily repeat the risk assessment procedure, concluding with a detailed risk assessment report, assess what-if scenarios and evaluate potential decisions of the management on security measures. This way the end user will be able to identify the risks that are acceptable (for which no or some additional security measures need to be implemented) or unacceptable (for which new security measures should be implemented or the already established should be updated/enhanced) for the CI.

        Through the combination of CIRP-RAT with the DiVA tool, the user will be able to conduct a holistic risk assessment of the CI, identifying the most important cyber-physical risks and vulnerabilities.

        In general, the benefits offered to the end-user through CIRP-RAT are linked, but are not limited, to the following aspects:

        • Risk awareness and informed decision-making on security measures
        • Organized and holistic security plan
        • Improved allocation of resources
        • Preparedness and anticipation of threats
        • Incident response capacity and mitigation of incident damage

        3. Main Functions

        The main function of the CIRP-RAT tool is that of calculating the risk per threat and the overall risk of an infrastructure. The methodological approach of CIRP-RAT is based on the following parameters:

        • Threat identification and scenarios definition
        • Asset identification and characterization
        • Existing security measures identification
        • Impact identification
        • Impact analysis
        • Threat, Vulnerability and Consequence analysis
        • Risk estimation and prioritization
        • Risk evaluation & mitigation

        The main components of the tool regards threat, assets’ vulnerabilities, security measures, impact and risk, as described below in more detail.

        Threat is defined as any indication, circumstance or event with the potential to cause the loss of, or damage to, an asset or population. Threat is summarized as the probability of the event to occur, as well as the level of intensity.

        Vulnerability is defined as a weakness of an asset that could potentially be exploited by one or more threats. Vulnerability also refers to the characteristics and circumstances of an asset that make it susceptible to the damaging effects of a threat.

        Measures to avoid and/or address existing and new threats and risks, categorized in operational, procedureal, technical, etc.                             

        Impact refers to the result and consequence that a threat would have on the assets under study and can be categorised as Operational, Reputational, Legal, Environmental, Financial, Societal.

        Risk refers to the potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. Risk depends on the likelihood of the event occurring and consequences.

        Following the risk assessment, the risk index will be produced indicating to the user the level of criticality for each respective threat, categorized as follows:

        Figure 3.1 - Risk acceptance level

        Based on the above assessment and the comparative results for each scenario, the CI operator will be able to identify the most important and necessary risk mitigation/control measures that should be implemented, considering 4 high-level categories (Organizational, People, Physical, Technological).

        4. Integration with other tools of 7SHIELD 

        As depicted in Figure 4.1- 7SHIELD contains services used by the experts to prevent the threats associated with cyber-physical attacks in the Satellite Ground Segment domain, covering the respective macro-stage of crisis management, namely pre-crisis, like the risk assessment, the resilience assessment, the analysis of the interdependencies and cascading effects, and so on


        Figure 4.1 - 7SHIELD Concept

        More specifically the risk assessment framework, is related to the prevention and preparedness activities (pre-crisis phase), providing support to the Ground Segment Operators through the following tools:

        • the Secure Authentication Mechanism, i.e., the Single Sign On (SSO) technology developed by SERCO;
        • the Model-Based Design and Assessment (MBDA) tool, developed by RESIL;
        • Risk assessment tools, composed of the Critical Infrastructure Resilience Platform – Risk Assessment Tool (CIRP - RAT) by STWS that is responsible for risk evaluation related to natural and physical threats and by the Digital Vulnerability Assessment (DiVA) delivered by ENG, responsible for the risk assessment of cyber threats;
        • the Cyber and Physical Threat Intelligence (CPTI) tool, developed by ENG.

        The Single Sign On (SSO) provides the authentication of 7SHIELD users. Once users are authenticated through the 7SHIELD SSO, they can access all the tools that are integrated with it.

        The first element of the risk assessment toolchain is the MBDA, and the user can access it after a successful authentication through the 7SHIELD SSO. The MBDA has also the responsibility to evaluate the cascading effects related to complex threats.

        The Risk assessment tools receive input from the MBDA model of a pilot. The CIRP-RAT is a platform that performs the evaluation of the impact and severity of natural and physical threats on the physical assets contained in the pilot model.

        The DiVA evaluates the risk of cyber threats and the impact on the cyber and also on the physical assets included in the model, estimating a value connected to them.

        Furthermore, the Cyber Physical Threat Intelligence tool in the prevention phase gives an alert if there is a probability that a hazardous event happens (both cyber and physical).

        Finally, the tools included in the framework (i.e., the MBDA, the CIRP-RAT and the DiVa) are included in the 7SHIELD dashboard, i.e., in the CPTMD. This is to help the operators to have all the tools reachable in a common environment and to have a clear picture of the risk that a specific threat that is occurring can cause.

        5. Infrastructure Requirements

        The CIRP-RAT, is a web-based tool, deployed as a Docker container (more information in section 6.1). The back-end services require at least 2 GB of RAM and a disk capacity of 20 GB, at least for the first tests and demonstrations in the framework of the project.

        6. Operational Manual

        Figure 62 – Log in through the SSO authentication mechanism

        6.3 Nominal Operations

        6.3.1 User Inputs

        In brief, the end-user should initially configure the tool, based on CI’s internal information (e.g., assets involved in the CI and respective vulnerabilities, threats of interest, security measures in place, etc.). After or skipping this step, the user can begin with the risk assessment, selecting the scenario to be analysed and defining the respective threat (defining also probability and level of intensity). The assets involved in the scenario will be selected, indicating the vulnerability level for the specific scenario, followed by the efficiency level of security measures in place for this scenario. Finally, an estimation of the impacts that may be caused within the scenario under study, should be provided.

        6.3.2 User Output

        Following the above steps, the tool will elaborate all the above information provided, leading to the risk calculation.  Repeating the above steps for more scenarios will finally produce a concrete risk assessment report, including several diagrams and prioritizing the risks, based on a risk index. This way the end user will be able to identify the risks that are acceptable (for which no or some additional security measures need to be implemented) or unacceptable (for which new security measures should be implemented or the already established should be updated/enhanced) for the CI.


        7. User Interface

        The functionalities provided by the CIRP-RAT, are available to the users through a user-friendly graphical user interface. Through that UI, users can be authenticated and design and execute various what-if scenarios. Using these what-if scenarios, the CIRP-RAT will calculate the risk indexes of the infrastructure on specific threats.

        Initially, the user logs in (Figure 6‑2) to the platform through an authentication mechanism (SSO), driving the user to the main dashboard of the tool (Figure 7‑3). Due to the user identification, information of the CI that (s)he belongs to is presented in the upper part, while previous scenarios and assessments, along with key results, are depicted in the history space.


        Figure 73 - CIRP-RAT user's main dashboard

        The first step that the user should implement is of configuring the content of the platform, by clicking the  button, and adapting the parameters to the specific CIs. This step can be repeated in case changes to the CI occur, e.g., after the implementation of new security measures, or the addition of new assets.

        The next step indicates the kick-off of the risk assessment process, by clicking the button which is related to threat identification and further analysis. When picking the new risk assessment option, a new window that guides him/her through the process pops-up, in order to define threat parameters, assets’ vulnerabilities, security measures’ levels, etc.

        When all the above steps are completed, the final step of the risk assessment process is activated. In this last step, the user can see a summary of the values defined in the previous steps and check if they are correct. If yes, the risk for the respective threat is calculated and a set of results/diagrams is presented.

        After repeating the above steps, the user will be able to calculate the risk for several threats of interest. When completing several risk assessments, then the user is able to create a new scenario by clicking the  button, and then in the landing page click the new scenario button. This will correlate the data for several threats providing comperative results through diagrams. Respective diagrams are created providing information on the scenario e.g. threat level, probability, assets’ vulnerability level, risk level, etc. as depicted in Figure 7‑4.









        Figure 74 – Scenario creation and overall assessment

        The user is able to check on previous scenarios through the history list depicted in the bottom left part of the home screen (Figure 7‑3). 


        • Acronyms

          CI                                        Critical Infrastructure

          CIP                                     Critical Infrastructure Protection

          CIRP-RAT                        Critical Infrastructure Resilience Platform-Risk Assessment Tool

          CPTI                                   Cyber and Physical Threat Intelligence

          C/P                                     Cyber/Physical

          DiVA                                  Digital Vulnerability Assessment

          EC                                       European Commission

          EU                                      European Union

          MBDA                               Model-Based Design and Assessment

          SGS                                   Satellite Ground Station

          SSO                                   Single Sign On