3D illustration of server room in data center full of telecommunication equipment,concept of big data storage and cloud computing technology.

Cybersecurity, a strategic aspect in digital transformation

FULL VERSION
It is increasingly evident that we have assimilated cybersecurity as an important part of our personal and working life. If we had been told a year ago that we would throw up our hands in dismay knowing that the youngest members of the household will be taught with insecure video conferencing tools, many of us would have not give credit. In the article Long-term cybersecurity published in issue 400 of Nuclear España, we talk about how the nuclear industry is especially alert against events known as “Black Swans”, events with low probability and great impact. When we use information technology to mitigate the impact of these Black Swans, that transform the paradigm, as in the case of remote work during the COVID-19 pandemic, cybersecurity is an essential strategic aspect.

Digitizing is “just” a change…

Digital transformation is labeled as a new Industrial Revolution and it seems that if you do not digitize your plant you are out of date. The market is going to stretch us more than we need, but we have to be true to our vision and be conservative. As the great cybersecurity guru Patrick Miller says, “before you set an alarm, you close the windows.” One of the first “windows” that we have to close is to ensure that we all take cybersecurity into account on a day-to-day basis. It is a difficult change to implement, because we will all accept a change to “digital” that provides benefits, but if that change to “digital” is associated with annoying considerations, cybersecurity becomes the less friendly face of digitization.

Analog is safer…

A failure in a digital system has the same impacts in your bussiness as that failure in its analog counterpart and also the same nature of threats. However, a digital system has a set of vulnerabilities that “cyberattacks” exploit. But basically, the safest system will be the one in which your Security is managed most effectively. In our plants we have something differentiating: 95% of the assets of a plant are analog, and these are concentrated in Non-Important to Safety Systems. So we have the “nuclear analogue paradox”, the classic analogue nuclear design gives us an advantage over modern plants. For this reason, it is important to maintain the “core” of Important Safety Systems in their analog design.

Cybersecurity by design

For a digitization project to be successful, it is essential to design with the Cybersecurity by default. In Spanish plants there is a complete digital isolation of nuclear security and physical security systems, as a requirement of the CSN in 2012. In the field of monitoring and control systems, we have more volume of digital assets to protect. An effective method is to include a second isolation with corporate networks, where we emphasize the protection of personal data and the external border, without using cloud services that we need in case we isolate ourselves from the internet.

Maintenance of cybersecurity

When implementing a new system or digital assets, it is essential to generate its maintenance procedures in parallel, including, among others, insider mitigation rounds and log extraction. Joining efforts we managed to generate the appropriate designs that facilitate the execution of the precise maintenance tasks, so that the system is prepared to undertake a complete cybersecurity audit and have tools for detection and response to incidents.

Incident response and creative nuclear professionals.

It is a requirement of the Law that we have mechanisms to detect, respond and report cybersecurity incidents. We report in a format according to the casuistry of the incident. It is more difficult to detect, because we need data to analyze and the bad guys will try not to leave a trace. And the most complicated thing is to respond. The big problem with cybersecurity is that it is not possible to process all defense actions, because we do not know what new weapons attackers will use, nor are unpublished rulings known.

To respond to an incident, we must be able to find solutions to unknown problems, but also other approaches to known problems.

EN LA MISMA SECCIÓN
Concepto de la defensa en profundidad y ejemplo específico de aplicación en las centrales nucleares españolas