Operational Technology Cybersecurity
A multi-sector, interdisciplinary approach to securing digital systems and critical functions.
INL’s cyber and controls expertise guided by intel-informed threat analysis provides unique products and capabilities. U.S. critical infrastructure that provides electrical power, clean water and other vital services to ensure our national security, lifeline services and economic prosperity are vulnerable to cyberattacks. All critical infrastructure relies on industrial control systems to serve as the command center for these vital assets.
To achieve mission success, INL combines seasoned cybersecurity analysts, experienced power engineers, cyber researchers, and control systems experts to perform cutting-edge analysis, research and development. This supports national security initiatives that strengthen the security and resilience of critical infrastructure against cyberattacks.
Capabilities
- OpDefender – INL-developed a hardware and software device that filters out dangerous control systems commands, preventing hackers from taking over industrial facilities.
Cybersecurity researchers perform vulnerability assessments that illuminate and alert both the manufacturers and end users to equipment weaknesses, need for added protections, mitigation research or patch development.
Analysts combine traditional all-source threat analysis with the technical acumen of understanding engineering and systems documentation, OT networks, programming languages, and foreign language skills to produce technically sound analytic products.
INL’s uses a multi-phase methodology based on critical function assurance (CFA) approach to identify, prioritize and mitigate the risk inherent in delivering critical functions that depend on digital technology.
- Cyber-Informed Engineering (CIE) – A framework and tools for a change in philosophy and engineering practices for building secure system designs.
- Consequence-Driven Cyber-informed Engineering (CCE) – Providing critical infrastructure owners and operators a four-phase process for safeguarding their critical operations.
The Controls Resource Laboratory is an environment for government and private industry partners to experience the possible effects of kinetic cyber-physical attacks. The laboratory allows users to perform security research on industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. This includes multiple platforms sponsored by the Cybersecurity and Infrastructure Security Agency (CISA) Controls Environment Laboratory Resource (CELR) program.
The What: Cyber-Informed Engineering (CIE)
A framework and tools for a change in philosophy and engineering practices for building secure system designs for existing infrastructure and to withstand the modern and future cyber-adversary.
The How: Consequence-Driven Cyber-informed Engineering (CCE)
Providing critical infrastructure owners and operators a four-phase process for safeguarding their critical operations.
Dedicated Research and Testing Facilities
Cybercore Integration Center – INL, in partnership with the state of Idaho, has invested in this facility to advance the cybersecurity of vital cyber-physical systems through leadership, federal partnerships, and research and development. The Center offers 80,000-square-foot, state-of-the-art facility equipped with secure office space, conference rooms and configurable laboratories.
Additional facilities include:
- Over 150,000 square feet of laboratory space dedicated to OT cybersecurity, grid and wireless security, and infrastructure resiliency.
- An 890 square mile desert Site with scaleable test ranges and an unmanned aerial runway.
- A supervisory control and data acquisition (SCADA) systems laboratory with remote industry and academic access for security research.
- Electric vehicle and battery security research and testing.
Cybersecurity Training and Workforce Development
INL provides innovative training and development opportunities to meet emerging threats and workforce demands aimed at securing industrial control systems (ICS) across sectors.
ICS Cybersecurity Training
A collaboration with Cybersecurity Infrastructure Security Agency
Cybersecurity
Internships
Full-time paid internships offered.
U.S. Air Force Fellowship
Two distinguished USAF members selected annually.
STEM Cyber Summer Camps
Offered annually in eastern Idaho.
Related Energy Programs and Resources
Cyber Testing Resilience for Industrial Control Systems
(CyTRICS)
Cybersecurity Operational Technology Environment (CyOTE)
Liberty Eclipse
OT Defender Fellowship
CyberStrike Training
Software Bill of Materials
Supply Chain Cybersecurity Principles
Cyber SHIELD
Additional Cybersecurity Tools
- Cyber-CHAMP – A cyber workforce development evaluation process and assessment framework.
- Cyber Security Evaluation Tool (CSET) – A desktop or web-based tool for asset owners to evaluate control system and IT security practices against industry standards.
- Malcolm Tool Suite – a powerful open-source network traffic analysis tool.
- All Hazards Analysis Tool (AHA) – a data modeling resource for interconnectedness and interdependencies.
- CIRRUS – A Cloud Assessment Software – allows small business and utilities of all sizes to quickly assess their cyber hygiene.