Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

New Edition of Pipeline Cybersecurity Standard Covers All Control Systems

The American Petroleum Institute (API) this month published the third edition of its pipeline cybersecurity standard, which focuses on managing cyber risks associated with industrial automation and control environments.

The American Petroleum Institute (API) this month published the third edition of its pipeline cybersecurity standard, which focuses on managing cyber risks associated with industrial automation and control environments.

The third edition of Standard 1164, Pipeline Control Systems Cybersecurity, has been in the works since 2017, and it’s based on input from over 70 organizations. The standard is based on NIST’s Cybersecurity Framework and the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards.

According to the API, which is the largest trade association for the oil and natural gas industry, this edition covers all control systems, rather than just SCADA systems as the previous edition did.

The new standard describes requirements for hardening pipeline assets against ransomware and other threats. It includes recommendations for protections at critical connection points in the supply chain (i.e. terminals, pipelines and refineries), risk assessment guidance, a model for implementing pipeline security, and a framework for an industrial automation and control security program.

API says the new edition, which can be purchased for $200, can be paired with other standards, such as its Standard 780, which focuses on security risk assessments, and its recommended practices for pipeline safety management systems.

“This standard will help protect the nation’s critical pipeline infrastructure by enhancing safeguards for both digital and operational control systems, improving safety and preventing disruptions along the entire pipeline supply chain,” said Debra Phillips, senior VP of API Global Industry Services. “What sets this framework apart is its adaptive risk assessment model that provides operators with an appropriate degree of flexibility to proactively mitigate against the rapidly evolving cyber threat matrix.”

The new edition of the pipeline cybersecurity standard was published in the wake of the cyberattack that targeted Colonial Pipeline. The ransomware attack that came to light in May caused significant disruption and it prompted the reintroduction of the Pipeline Security Act, a TSA directive ordering pipelines to increase defenses, the DHS requiring pipeline operators to bolster cybersecurity, and other initiatives focusing on critical infrastructure security.

“Industry standards and best practices are paramount in ensuring critical infrastructures and their operations are secured against malicious threats and other vulnerabilities,” cybersecurity firm Trend Micro said on Monday in a blog post commenting on the new edition of the API standard. “With threat actors becoming more sophisticated, government agencies and private enterprises must future-proof their control systems and cybersecurity frameworks to minimize the risk of cyber attacks that could cause them millions of dollars and disruptions.”

Advertisement. Scroll to continue reading.

Related: US Takes Steps to Protect Electric System From Cyberattacks

Related: Hack Prompts New Security Regulations for US Pipelines

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...