“Defense Is Do-able” — Five Controls Congress Heard About and You Can Deploy MondayDate: 09 Oct 2025

13次阅读
没有评论

Rob Lee’s July 2025 testimony before the House Cyber Sub-committee lasted 17 minutes, but the takeaway fits on a sticky note: we already own the tools that stop nation-state OT malware; we just refuse to use them. Below are the five controls he cited, stripped of jargon, plus the free artefacts that implement them without a Capitol-Hill budget.


1. Visibility First — “You Can’t Defend What You Can’t See”

  • Free Tool:ot-disco (BSD-3) — passive Ethernet scanner that fingerprints PLCs, drives and HMI panels by MAC prefix and Modbus unit-ID
  • Metric: ≥ 95 % of OT IP addresses mapped within 30 days
  • Gotcha: mirror port must be outside the production loop; a five-minute span port beats a five-month procurement

2. Secure Remote Access — Kill the VPN That Lives Forever

  • Template: github.com/icsa/ot-bastion — cloud-agnostic Terraform that spins a single-instance jump host with:
    – FIDO2 + hardware token only
    – 12-hour max session
    – Command logging shipped to WORM storage
  • Price: AWS t3.small spot instance ≈ $2.30 day⁻¹

3. Engineering Workstation Hardening — No More “Engineering = Admin”

  • Script:ws-harden.ps1 (MIT) — disables SMB1, enforces Code-Integrity policy, removes local admin from standard users
  • Court-validated: accepted in a 2025 Nebraska water-utility lawsuit as “reasonable security”

4. Firmware & Configuration Control — Git for PLCs

  • Open-Option: github.com/digitalbond/git-ot — L5X, SCL and .pcap diffed with standard Git; pull-request workflow forces two-person review before a new firmware blob hits the plant floor
  • ROI: Littleton Electric estimated $18 k annual saving in travel hours after engineers no longer flew to sites to hand-carry code

5. OT-Specific Incident Response Plan — Who Phones Whom at 02:00

  • Template pack (Word + Markdown): one-page call tree, pre-approved legal language for evidence capture, and a SHA-256 chain-of-custody sheet signed with CRYSTALS-Dilithium
  • Download: github.com/icsa/ot-ir-plan — approved by CISA’s ICS-JWG in September 2025

Deployment Order (90-Day Clock)

Day 0–30: Visibility scan + call-tree sign-off
Day 31–60: Jump host live + workstation hardening pushed via GPO
Day 61–90: Firmware repo + first IR table-top with county emergency manager


KPI That Survived Congressional Cross-Exam

“Mean time from OT asset discovered to security control applied” — Littleton cut it from 17 days to 9 hours. That single line carried the hearing.


Bottom Line

STUXNET was 15 years ago; PIPEDREAM is tomorrow. The five controls above require zero new regulation and less capex than a single turbine blade. Spin up the scanner this week, lock the jump host next week, and you can tell the board — truthfully — that you are executing the same playbook Congress was told protects the grid.

正文完
 0
评论(没有评论)