ENISA Report - Railway Cybersecurity - Good Practices in Cyber Risk Management
ENISA Report - Railway Cybersecurity - Good Practices in Cyber Risk Management
CYBERSECURITY
Good practices in cyber risk management
NOVEMBER 2021
0
RAILWAY CYBERSECURITY
November 2021
ABOUT ENISA
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common
level of cybersecurity across Europe. Established in 2004 and strengthened by the EU Cybersecurity Act, the
European Union Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT
products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU
bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through knowledge sharing, capacity
building and awareness raising, the Agency works together with its key stakeholders to strengthen trust in the
connected economy, to boost resilience of the Union’s infrastructure, and, ultimately, to keep Europe’s society and
citizens digitally secure. More information about ENISA and its work can be found here: www.enisa.europa.eu.
CONTACT
To contact the authors, please use [email protected]
For media enquiries about this paper, please use [email protected].
AUTHORS
Theocharidou Marianthi, Stanic Zoran, ENISA
ACKNOWLEDGEMENTS
We would like to warmly thank all the experts that took part in our workshops and provided comments. Their
contributions and inputs were essential for the creation of this report.
ENISA would like to thank the European Railway Agency (ERA), the European Railway Information Sharing and
Analysis Centre (ER- ISAC) and UNIFE's cybersecurity working group for their support.
1
RAILWAY CYBERSECURITY
November 2021
Ooms-Geugies Klaasjan, NS
Pizzi Giorgio, Ministero Infrastrutture e Trasporti
Paulsen Christian, Siemens
Pouet Nicolas, SNCF Reseau
Remberg Tom, Banenor
Rodrigues Susano Ana Beatriz, Infraestruturas de Portugal
Thesse Eddy, Alstom group
Van den Bossche Peter, Infrabel
Van Zantvliet Dimitri, NS
LEGAL NOTICE
This publication represents the views and interpretations of ENISA, unless stated otherwise. It does not endorse a
regulatory obligation of ENISA or of ENISA bodies pursuant to the Regulation (EU) No 2019/881.
ENISA has the right to alter, update or remove the publication or any of its contents. It is intended for information
purposes only and it must be accessible free of charge. All references to it or its use as a whole or partially must
contain ENISA as its source.
Third-party sources are quoted as appropriate. ENISA is not responsible or liable for the content of the external
sources including external websites referenced in this publication.
Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information
contained in this publication.
COPYRIGHT NOTICE
© European Union Agency for Cybersecurity (ENISA), 2021
Reproduction is authorised provided the source is acknowledged.
For any use or reproduction of photos or other material that is not under the ENISA copyright, permission must be
sought directly from the copyright holders.
2
RAILWAY CYBERSECURITY
November 2021
TABLE OF CONTENTS
1. INTRODUCTION 6
1.1 OBJECTIVES, SCOPE AND AUDIENCE 6
1.2 METHODOLOGY 7
4. CYBER-RELATED THREATS 18
4.1 TAXONOMY 18
5. CYBERSECURITY MEASURES 28
5.1 APPLYING CYBERSECURITY MEASURES 30
6. CONCLUSIONS 33
7. BIBLIOGRAPHY 34
A ANNEX: ASSET DESCRIPTIONS 35
B ANNEX: THREATS DESCRIPTION 42
C ANNEX: SECURITY MEASURES 45
3
RAILWAY CYBERSECURITY
November 2021
EXECUTIVE SUMMARY
European railway undertakings and infrastructure managers systematically address cyber risks
as part of their security risk management processes, especially after the Network and
Information Security (NIS) Directive came into force in 2016. Addressing cyber risks in the
railway sector can raise entirely new challenges for railway companies who often lack the
internal expertise, organisational structure, processes or the resources to effectively assess and
mitigate them.
This report aims to be a reference point for current good practices for cyber risk management
approaches that are applicable to the railway sector. It offers a guide for railway undertakings
and infrastructure managers to select, combine or adjust cyber risk management methods to the
needs of their organisation. It builds upon the 2020 ENISA report on cybersecurity in the railway
sector (ENISA, 2020), which assessed the level of implementation of cybersecurity measures in
the railway sector.
This report provides actionable guidelines, lists common challenges associated with the
performance of the relevant activities, and outlines good practices that can be readily adopted
and tailored by individual organisations. Additionally, a list of useful reference material is
available, together with practical examples and applicable standards.
4
RAILWAY CYBERSECURITY
November 2021
ABBREVIATIONS
5
RAILWAY CYBERSECURITY
November 2021
1. INTRODUCTION
Directive 2016/1148 (NIS Directive) is the first legislative document focusing on cybersecurity in the EU. It identifies
Operators of Essential Services (OES) in the railway sector as:
Infrastructure managers (IM), as defined in point (2) of Article 3 of Directive 2012/34/EU, include: “any person or
firm responsible in particular for establishing, managing and maintaining railway infrastructure, including traffic
management and control-command and signalling. The functions of the infrastructure manager on a network or part
of a network may be allocated to different bodies or firms”.
Railway undertakings (RU), as defined in point (1) of Article 3 of Directive 2012/34/EU, include: “any public or
private undertaking licensed according to this Directive, the principal business of which is to provide services for the
transport of goods and/or passengers by rail with a requirement that the undertaking ensures traction. This also
includes undertakings which provide traction only”. This also includes operators of service facilities as defined in point
(12) of Article 3 of Directive 2012/34/EU as “any public or private entity responsible for managing one or more service
facilities or supplying one or more services to railway undertakings”.
The NIS Directive requires IMs and RUs to conduct risk assessments that “cover all operations including the security
and resilience of network and information systems”. According to the NIS Directive, these risk assessments, along
with the implementation of appropriate mitigation measures, should promote “a culture of risk management” to be
developed through “appropriate regulatory requirements and voluntary industry practices”. This need for cyber risk
management in the European railway sector was also identified as a key priority by the participants of the ENISA-
ERA conference “Cybersecurity in Railways”, which took place online on 16-17 March 2021 and brought together
more than 600 experts from railway organisations, policy, industry, research, standardisation, and certification.
While some EU Member States (MS) have issued relevant national guidance to OESs on how to conduct cyber risk
assessments, most railway operators choose to adopt one of the different methodologies introduced by industry
standards. Indeed, there are currently varying approaches to tackle risk in the railway sector and for now, there is no
single approach that covers both information technology (IT) and operational technology (OT) cyber risks. This
document offers a guide to these different approaches, enabling railway operators to select, combine or adjust cyber
risk management methods to the needs of their organisation. It builds upon the 2020 ENISA report on cybersecurity
in the railway sector (ENISA, 2020), which assessed the level of implementation of cybersecurity measures in the
railway sector.
This report is concerned with the European railway sector, and it covers cyber risk management applicable to both
the IT and OT systems of railway organisations. Other railway stakeholders such as rolling stock manufacturers and
component vendors are not considered in the scope of this report.
The primary target audience of this study includes people responsible for cybersecurity (CISOs, CIOs, CTOs, etc.)
within RUs and IM networks. This report aims to provide them with the means to understand their cybersecurity
ecosystem, assess the risks to their assets or services and manage them via appropriate cybersecurity measures. In
addition, the National Competent Authorities, who may wish to develop guidance for railway operators in conducting
cyber risk management, may consult this document to understand the current practices in the sector and potential
challenges.
6
RAILWAY CYBERSECURITY
November 2021
1.2 METHODOLOGY
The report was created with cooperation of European IMs and RUs in an iterative process with multiple rounds of
validation as follows:
Step 1 - Definition of the project scope and identification of experts. The first step consisted of defining the
scope of the project and selecting subject matter experts whose input and insights could be considered for the
development of the report. The experts chosen are mainly RU and IM stakeholders in charge of cybersecurity, as well
as members of national and European agencies.
Step 2 - Desk research. During this step, extensive desk research for relevant documents in the context of the
project was conducted. The identified sources served as a reference to develop good practices, a list of assets and
threats, threat scenarios, and list of measures.
Step 3 - Series of workshops with selected subject matter experts. Four workshops were conducted to discuss
and validate the key findings of the study, namely the list of assets, list of threats, threats scenarios, and list of
measures. Additionally, the workshops were used as an opportunity to collect feedback on the challenges and good
practices of risk management in the railway sector. The 20 experts originated from 10 European railway companies
from Belgium, Germany, Italy, Luxembourg, Netherlands, Norway, Portugal, Spain, and Sweden. The European Rail
Information Sharing and Analysis Centre (ER-ISAC) was also represented in the experts’ pool.
Step 4 - Analysis of collected material and report development. The input collected from desk research and the
stakeholder workshops were analysed. Based on this analysis, the first draft of this report was developed.
Step 5 - Review and validation. The report was then validated by 24 experts (primarily RUs and IMs) from Belgium,
France, Germany, Italy, Luxembourg, Netherlands, Norway, Portugal, Spain, and Sweden, the ER-ISAC and the
UNIFE cybersecurity working group. The experts reviewed the report and provided comments and suggestions for
improvement. These were the basis for the final version of this document.
Chapter 2 describes cyber risk management concepts and the current approaches identified for the railway
sector. It can help railway stakeholders to choose a risk management methodology.
Chapter 3 contains a list of railway assets and services (definitions and taxonomy), along with guidelines on
how to identify those assets and services. Railway stakeholders can use this information to build their own
list of assets and services.
Chapter 4 focuses on cyber threats, with a list of threats, their definitions and a list of risk scenarios
applicable to the railway sector. Stakeholders can use those tools to identify the main risks to their assets
and evaluate what should be prioritised for protection. The list of threats would be useful to conduct risk
assessments, along with the abovementioned list of assets and services.
Chapter 5 examines current cybersecurity measures based on EU guidelines (NIS Directive) and
international standards. It can help stakeholders to define a risk management plan.
Chapter 6 offers some concluding remarks.
7
RAILWAY CYBERSECURITY
November 2021
2. CYBER RISK
MANAGEMENT
The purpose of this chapter is to outline the risk management approaches that were used in the study and are
applicable to the railway sector. Many definitions and concepts exist, thus making it difficult to choose one that is
most relevant to the individual’s case. To ensure a common risk management frame, this document proposes a set of
definitions and principles extracted from ISO 31000:2018 “Risk management – Principles and guidelines”, ISO-IEC
27005:2018 “Information security risk management” and the ISO-IEC 62443 series.
The information security risk management process is the coordination of activities to direct and control an
organisation with regard to risk. It consists of context establishment, risk assessment, risk treatment, risk acceptance,
risk communication and risk monitoring and review. The information security risk management process can be
iterative for risk assessment and/or risk treatment activities. An iterative approach to conducting risk assessment can
increase the depth and detail of the assessment at each iteration. It also provides a good balance between
minimising the time and effort spent in identifying controls, while ensuring that strong risks are appropriately
assessed.
As mentioned in the ISO 31000 principles chapter, risk management is not a stand-alone activity that is separate from
the main activities and processes of the organisation. Risk management is part of the responsibilities of management
and an integral part of all organisational processes, including strategic planning and all project and change
management processes.
For terms and definitions, please consult ISO 31000:2018 “Risk management – Principles and guidelines”, ISO-IEC
27005:2018 “Information security risk management.
The first step of launching a risk management process is establishing the context, both external and internal. It
involves setting the basic criteria necessary for information security risk management (approach, risk evaluation
criteria, impact criteria and risk acceptance criteria), defining the scope and boundaries (ensuring that all relevant
8
RAILWAY CYBERSECURITY
November 2021
assets are taken into account in the risk assessment), and establishing an appropriate organisation to manage the
information security risk management.
The second step is launching a risk assessment, i.e., quantifying or qualitatively describing risks and enabling
managers to prioritise them according to their perceived seriousness or other established criteria. The risk
assessment consists of three distinct tasks:
Risk identification, to determine what could happen to cause a potential loss and to gain insight into how,
where, and why the loss could occur.
Risk analysis, to understand the nature of the risk and to determine the level of risk. A risk analysis
methodology may be qualitative, quantitative, or a combination of both depending on the circumstances.
Risk evaluation, to compare the level of risks against risk evaluation criteria and risk acceptance criteria.
The purpose is to produce a list of risks prioritised according to risk evaluation criteria in relation to the
incident scenarios that lead to those risks.
The third step is the risk treatment, which consists of defining a list of controls to reduce, retain, avoid, or share the
risks. Then, a risk treatment plan can be defined. The risk treatment plan description will be elaborated in chapter 5 of
this present document.
The fourth step is risk acceptance, i.e., the decision to accept the risks and responsibilities for the decision. Finally,
a list of accepted risks with justification for those that do not meet the organisation’s normal risk acceptance criteria is
established.
The fifth step is the risk communication. Information about risks should be exchanged and/or shared between the
decision-maker and other stakeholders.
The final step is risk monitoring and review. It consists of the monitoring and reviewing the risks and the various
factors (i.e., value of assets, impacts, threats, vulnerabilities, likelihood of occurrence) that help to identify any
changes in the context of the organisation at an early stage, and to maintain an overview of all risks.
Indeed, existing approaches are multiple and varying across the railway companies, but they may present different
scope and level of detail in terms of analysis. For the risk management of railway IT systems, the most cited
approaches were the requirements of NIS Directive at a national level, the ISO 2700x family of standards, and
the NIST cybersecurity framework. For OT systems, the frameworks cited were ISA/IEC 62443, CLC/TS 50701,
and the recommendations of the Shift2Rail project X2Rail-3, or the ones from the CYRail Project. Those standards
or approaches are often used in a complementary way to adequately address both IT and OT systems. While IT
systems are normally evaluated with broader and more generic methods (such as ISO 2700x or NIS Directive), OT
systems need specific methods and frameworks that have been designed for industrial train systems. For instance,
the ISA/IEC 62443 standards are the most cited frameworks used for specific OT assets and risk identification, while
many contributors to this report stated they intend to use the recently released CLC/TS50701 in the future.
9
RAILWAY CYBERSECURITY
November 2021
Stakeholders that participated in this study indicated that they use a combination of the abovementioned international
and European approaches to tackle risk management, which they then complement with national frameworks and
methodologies. Examples include the Dutch A&K analysis1, the German BSI Risk Management Standard 200-32 and
the French E-BIOS Risk Manager method3. Moreover, other stakeholders designed their own modified versions of
methodologies based on existing frameworks.
The difference between standards’ completeness can also be tackled by building a bridge between the high-level
company risk assessment, and the lower application, or asset risk, assessment level. The generic framework and
standards can be used at a high level and the more technical or precise ones can be used at the applications and
assets level. The risks and measures issued at the end of each process are consolidated in a global risk mapping
and risk treatment plan.
A multitude of different approaches and methods have been recommended by national and international authorities
regarding cyber risk management. This next section analyses a sample of European and international good practices.
ISO 27001, 27002 and 27005 standards. The ISO 2700x family are among the most used and cited standards for
information security. ISO 27001 is the standard dedicated to establishing, implementing, maintaining and continually
improving an information security management system within the context of the organisation. ISO 27001 and 27002
contain a list of requirements to consider when implementing a risk treatment plan and will be studied in more detail
in chapter 5 of the present document. ISO 27005 is focused on risk management. It is the one selected in the present
document as a reference for defining the risk management principles presented above. According to CLC/TS 50701
(see below), ISO27K series can be applied to the business part of railway infrastructure, which primarily includes IT
systems.
NIS Directive Cooperation Group guidelines. In 2018, the NIS cooperation group4 issued a “reference document”
which provides a summary of the Group’s main findings on cybersecurity measures for OESs (NIS Cooperation
Group, 2018). The reference document primarily covers the risk treatment phase of risk management. It does not
establish a new standard nor duplicate existing ones (e.g., ISO) but provides MS with a clear and structured picture of
their current and often common approaches to the security measures of OESs. Beyond OESs, this reference
document may be considered useful by other public or private actors looking to improve their cybersecurity. As it
focuses on security measures, it will be studied in more detail in chapter 5.
ISA/IEC 62443 standards. The ISA/IEC 62443 series of standards provides a framework to address and mitigate
security vulnerabilities in industrial automation and control systems (IACS). They described both technical and
process-related aspects of industrial cybersecurity and provide a risk management approach, especially for OT
systems, which can be applied to OT used in the railway sector. In particular, the ISA/IEC 62443-3-2, “Security Risk
Assessment, System Partitioning and Security Levels” standard defines a set of engineering measures to guide
organisations through the process of assessing the risk of a particular IACS and identifying and applying security
countermeasures to reduce that risk to tolerable levels. A key concept is the application of IACS security zones and
conduits, which were introduced in ISA/IEC 62443-1-1, Concepts and Models. The standard provides a basis for
1
The method Afhankelijkheids- en Kwetsbaarheidsanalyse (A&K analysis) was developed in draft form by the Dutch public company RCC. The Dutch
Ministry of Internal Affairs completed its development in 1996 and published a handbook describing the method. The method has not been updated
since that time. The A&K analysis is the unique and preferred method for risk analysis by Dutch government bodies since 1994. In addition to the
Dutch government, Dutch companies often use A&K analysis.
https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/risk-management-inventory/rm-ra-
methods/m_dutch_ak_analysis.html
2
With the BSI Standard 200-3, the BSI provides an easy-to-apply and recognised procedure which allows organisations adequate and targeted control
of their information security risks. The procedure is based on the elementary threats described in the IT-Grundschutz Compendium on the basis of
which the IT-Grundschutz-modules were drawn up.
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/International/bsi-standard-
2003_en_pdf.html;jsessionid=A26D9630FC3E530CDEECEACC00297837.internet461?nn=128620
3
EBIOS Risk Manager (EBIOS RM) is the method for assessing and treating digital risks, published by National Cybersecurity Agency of France
(ANSSI) with the support of Club EBIOS. It provides a toolbox that can be adapted, the use of which varies according to the objective of the project.
EBIOS Risk Manager is compatible with the reference standards in effect, in terms of risk management as well as in terms of cybersecurity.
https://www.ssi.gouv.fr/en/guide/ebios-risk-manager-the-method/
4
The NIS Cooperation Group is composed of representatives of Member States, the Commission, and ENISA, has been established under
the NIS Directive. It facilitates strategic cooperation between the Member States regarding the security of network and information systems.
https://digital-strategy.ec.europa.eu/en/policies/nis-cooperation-group
10
RAILWAY CYBERSECURITY
November 2021
specifying security countermeasures by aligning the identified target security level with the required security level
capabilities set forth in ISA/IEC 62443‑3‑3, System Security Requirements and Security Levels.
CLC/TS 50701. Following this standard, the Technical Specification 50701 was issued (CLC/TS 50701, 2021). This
European Technical Specification applies ISA/IEC 62443 to the railway sector. It applies to the communications,
signalling, processing, rolling stock and fixed installations domains. It provides references to models and concepts
from which requirements and recommendations can be derived and which are suitable to ensure that the residual risk
from security threats is identified, supervised, and managed to an acceptable level by the railway system duty holder.
CLC/TS 50701 can be used to define a list of OT components for the railway sector, and to build a list of OT-specific
security measures.
Shift2Rail Risk Assessment Methods (projects X2Rail-1 and X2Rail-3). Shift2Rail proposes a risk assessment
based on IEC 62443-3-2 (X2Rail-1, 2019; X2Rail-3, 2020). It proposes a common railway framework, which includes:
Based on this common approach, Shift2Rail performed a risk assessment of a generic railway signalling system
compliant with the IEC 62443 and proposed target security levels for the different identified zones. X2Rail-3 proposed
a Simplified Risk assessment approach in 2020 (X2Rail-3, 2020) which consists of the following workflow:
CYRail recommendations on cybersecurity of rail signalling and communication systems. The EU-funded
project CYRail7 issued a guide published in September 2018 (Cyrail, 2018). This guide provides an analysis of
threats targeting railway infrastructures, in addition to the development of attack detection and alerting techniques,
mitigation plans and Protection Profiles for railway control and signalling applications to ensure security by design of
new rail infrastructures. It relies on the IEC62443 standard. The security assessment consists of the following 5
steps:
5
The STRIDE model is a model of threats developed by Microsoft to identify computers security threats, as the first step in a proactive security
analysis process. The next steps in the process are identifying the vulnerabilities in the implementation and then taking measures to close security
gaps. STRIDE model defines a threat as any potential occurrence, malicious or otherwise, that can have an undesirable effect on the system
resources. STRIDE stands for 6 main threats: Spoofing of user identity, Tampering with data, Repudiability, Information disclosure (privacy breach),
Denial of Service (DoS) and Elevation of privilege. Vulnerability is an unfortunate characteristic that makes it possible for a threat to occur. An attack is
an action taken by a malicious intruder to exploit certain vulnerabilities to enact the threat. It was created to be applied to a specific system or during
the development of a product; therefore, it is less relevant at a company level, as it does not encompass the whole risk management process.
Nevertheless, it can be used with a more global methodology when defining the threats.
https://docs.microsoft.com/en-us/archive/msdn-magazine/2006/november/uncover-security-design-flaws-using-the-stride-approach
6
According to IEC62443, security capabilities are organised according to seven Foundational requirements (FR1 Identification and Authentication
Control, FR2 – Use Control, FR3 - System Integrity, FR4 – Data Confidentiality, FR5 – Restricted Data Flow, FR6 – Timely Response to Events, and
FR7 – Resource Availability.
7
https://cyrail.eu/about-cyrail-project-1
11
RAILWAY CYBERSECURITY
November 2021
cyber security risk, determine security level target, identify and evaluate existing countermeasures, revaluate
likelihood and impact, calculate residual risk, document and communicate results)
Documentation of the process
This guide is useful to conduct risk analysis within the railway sector, particularly on control and signalling
applications, using the IEC62443 standard.
EULYNX, RCA, and OCORA approach. EULYNX is a European initiative led by 13 IMs to standardise interfaces
and elements of signalling systems. EULYNX Reference Architecture defines the complete EULYNX system,
describing the overall architecture, cross-cutting architectural concepts, and all generic functions of the system.
Baseline Set 3 was completed in 20208.
RCA stands for Reference Control, Command & Signalling (CCS) Architecture. It is an initiative led by members of
the ERTMS Users Group (EUG) and EULYNX to define a harmonised architecture for the future railway CCS, with
the main goal of substantially increasing the performance/total cost of ownership (TCO) ratio of CCS. The RCA
Baseline Set 0 Release 1 was updated with the Cyber Security guidelines created by OCORA, RCA and EULYNX. It
defines a risk assessment process taking IEC 62443 and CLC/TS 50701 as security standards and gives an example
on how to apply it to trackside CCS. The following process is defined:
The focus of RCA is on the architecture of the CCS trackside. There is a similar initiative, named OCORA, which
addresses the architecture of the CCS on-board side9. It is a joint initiative by 5 European railway companies10 which
has been set up to define the architecture and interfaces for the next generation of on-board European Train Control
System (ETCS) systems.
UIC Guidelines for Cyber-Security in Railways. In 2018, the UIC ARGUS WG decided to produce an enforced
document to provide specific guidance to the ‘Railway’ (UIC, 2018). This guidance document is designed to support
the rail industry in reducing its vulnerability to cyber-attacks and to ensure availability, integrity, confidentiality of
railway systems and data at all times. The document has a particular but not exclusive focus on signalling and
telecommunication within railway. The document is based on the ISO 27001 and 27002 standards and offers
guidance specific to railway. It also describes common risk management steps such as: establishment of the security
context, assets identification (primary and supporting), impact analysis (supported by operational impact scenarios),
threat identification, selection of applicable threat scenarios, estimation of risk level for each applicable threat
scenario based on the likelihood and the impact of those threat scenario, selection of risk treatment options, and
selection of a list of additional controls.
8
https://www.eulynx.eu/index.php/documents/published-documents/open-availability/baseline-set-3/257-20200623-eulynx-documentation-plan-eu-doc-
11-v3-4-0-a/file
9
https://github.com/OCORA-Public
10
Deutsche Bahn (DB), Société nationale des chemins de fer français (SNCF), Nederlandse Spoorwegen (NS), Österreichische Bundesbahnen (ÖBB)
and Schweizerische Bundesbahnen (SBB
12
RAILWAY CYBERSECURITY
November 2021
3. RAILWAY ASSETS
AND SERVICES
For RUs and IMs to manage cyber risks, it is crucial that they identify their railway assets and services that need to
be protected. The railway sector is composed of multiple stakeholders who are responsible for their own
infrastructure, assets and services, but they are strongly interconnected and interact with one another to deliver
services. These interactions complicate risk assessment, because interdependencies between external stakeholders
or suppliers must be considered in the analysis. The list resulting from this identification of assets and services should
contain services the stakeholders have to deliver, and assets, such as devices, physical infrastructure, people and
data needed to support these services.
In addition, stakeholders may develop indicators to assess cyber risk impact on the availability, integrity and
confidentiality of these assets and services (e.g., number of users affected, economic impact, environmental impact,
recovery time objectives, etc.).
Eight essential high-level railway services have been considered during the 2020 ENISA study (ENISA, 2020):
Operating traffic on the network
Ensuring the safety and security of passengers and/or goods
Maintaining railway infrastructure and/or trains
Managing invoicing and finance (billing)
Planning operations and booking resources
Information for passengers and customers about operations
Carrying goods and/or passengers
Selling and distributing tickets.
Railway stakeholders can use various taxonomies as the basis to identify their key cyber-related assets and services
and adapt it to their own operational environment. Based on the desk research and information collected during the
workshops, the key point is to maintain an asset inventory for cyber-related assets. Assets should be identified and
registered in the asset inventory based on the system they relate to, the service they support and the information they
handle. As mentioned, interdependencies between systems and third-party hardware and software, vendors, or other
stakeholders must be considered. They should be identified in the specifications of technical interface (and/or data
exchange) requirements. Finally, the department/division responsible for cybersecurity should be included in
procurement contract review and implementation to ensure cybersecurity is addressed.
The identification of all interdependencies of the systems can be a real challenge. This is the case for external
dependencies, but also for internal dependencies. Specifically, IT and OT interdependencies are complex because
their boundaries are increasingly blurring, and OT and IT have different levels of maturity in terms of cybersecurity.
Maintaining an exhaustive inventory is complex as systems are evolving fast, and the digitalisation of all processes is
adding more and more systems that must be considered. This is exacerbated by the fact that the people responsible
for the inventory often are unaware knowledge of all the assets and rely on systems engineers or security experts of
the asset owner to maintain the inventory. Third-party-managed systems are also complicated to integrate in internal
inventories due to this mix of responsibilities. To support this inventory, automated tools for asset management
(identification, logging and monitoring) can be deployed, but the deployment of such tools requires strong interactions
with systems that don’t always support such interactions. For asset identification, IT/OT asset discovery tools can be
deployed, but care needs to be taken during their configuration so as not to affect the performance of systems.
13
RAILWAY CYBERSECURITY
November 2021
3.1 TAXONOMY
To help RUs and IMs choose which assets and services to include in their risk assessment, a comprehensive list has
been compiled. It is based on the systems’ list described in the ENISA Report - Railway Cybersecurity of 202011.
It has been constructed from existing literature, validated during interviews with railway stakeholders in 2020, and
enriched based on the feedback received during the 2021 workshops. It gives a robust and high-level overview of
railway assets, with relevant categories.
Other, more detailed taxonomies exist in the sector and have been reviewed in order to complement and align
(especially for the names and associated descriptions) this list with approaches on asset taxonomies, such as X2Rail
Deliverables12, RCA-OCORA-Eulynx Security Guideline13 and TS50701. Indeed, RCA, OCORA, and Eulynx have
created comprehensive asset architecture models specific to OT systems (on-board and trackside systems). They
present assets at a more detailed level – up to the component level – and can be used for the risk assessment of a
particular system, where such detail is required.
This list has been broken down to 5 areas; the services that stakeholders provide, the devices (technological
systems) that support these services, the physical equipment used to provide these services, the people that
maintain or use them, and the data used.
Fourteen service categories, together with sub-categories, are defined and depicted in Figure 2. For each service
listed on (ENISA, 2020), assets have been identified. These are based on the list of systems by (ENISA, 2020), desk
research, CLC/TS50701 and complemented with additions such as supply chain or freight assets. Supply chain
assets refer to the assets provided by suppliers; as this present list may not be exhaustive, suppliers’ threats can be
additionally covered by defining a list of suppliers and applying specific measures to them. Freight assets are
especially relevant as railways amount for a significant amount of EU freight transport. They can be targeted by
specific attacks that are more focused on financial gain rather than disruption or passenger safety.
In addition, each asset has been characterised according to the kind of resources the asset uses:
IT systems: refers to all components, devices and software used to store and process the information and
realise IT operations.
OT systems: refers to all components, devices and software used to conduct physical railway operations.
Network and communications systems: refers to all components and devices used to physically convey
information fluxes.
Supply chain: refers to the assets provided by suppliers.
These categories illustrate the systems to which the assets belong to and it is used to define the operation where the
asset will be used: passenger comfort, signalling, corporate operations, etc. (see figure 3)
Moreover, physical equipment can be found either on infrastructure and trackside (buildings,
tracks, etc.), or on-board (trains, wagon, lighting, etc.) (see Figure 4)
Finally, the different categories of people that are using these systems (clients or employees)
and the different categories of data used by those systems are listed (see Figure 5).
These taxonomies can be used for developing an initial ontology-knowledge representation for the railway domain.
For detailed descriptions of these five areas of assets, please consult Annex A.
11
See https://www.enisa.europa.eu/publications/railway-cybersecurity
12
See X2R3-T8_3-D-SMD-004-06_-_Deliverable_D8.2-3c_Protection_profile___On-board_components and X2R3-T8_3-D-SMD-009-06_-
_Deliverable_D8.2-3b_Protection_Profile_-_Trackside
13
See RCA Gamma published (eulynx.eu)
14
RAILWAY CYBERSECURITY
November 2021
15
RAILWAY CYBERSECURITY
November 2021
16
RAILWAY CYBERSECURITY
November 2021
17
RAILWAY CYBERSECURITY
November 2021
4. CYBER-RELATED
THREATS
In the railway sector, compromised OT systems can affect passengers’ safety, cause a train accident, or interrupt
traffic. OT systems are usually more vulnerable than IT systems, in part due to a lack of cybersecurity awareness in
OT personnel, in part because they were not designed with cybersecurity in mind (long lifecycles of 30 years,
presence of legacy systems) and because they are less controlled and decentralised compared to IT systems. While
in the past they remained less exposed, often isolated from internet and other IT networks, they are now more and
more interconnected with classic IT systems, which makes them even more vulnerable and exposed to cyber threats.
RUs and IMs need to identify which cyber threats are applicable to their assets and services. One of the common
questions is whether threats, such as disasters, physical attacks, or outages, should be included or considered as not
being specific to the “cyber” ecosystem. Most stakeholders include them, as they can affect information security. If
they are not included, they should be considered in other risk management or business continuity management
processes of the company, and this must be agreed on when the threat taxonomy is being developed.
Another challenge faced by the railway sector is assessing the likelihood of a threat scenario. One would need to
consider the level of capability required for an attack, the level of exposure of the targeted asset, and the intent of an
attacker, all of which are information that RUs and IMs may have difficulty in assessing accurately.
Several methods are proposed by the different cyber risk management frameworks. For example, X2Rail-314
proposes to rely on the Common Vulnerability Scoring System (CVSS). They have selected four CVSS Exploitability
metrics in CVSS: Attack Vector (System Exposure), Attack Complexity, Privileges Required and User Interaction.
Levels for these metrics have been defined, mathematically calculating the resulting likelihood. Other methods are
less quantitative, but also simpler to apply, such as ISO27005, which combines the likelihood of occurrence of the
threat (low, medium, high), the ease of exposure (low, medium, high) and the value of the asset (from 0 to 4) to
calculate the likelihood of an incident scenario15. It is also very difficult to maintain this information because it changes
through time as the threat landscape evolves.
Finally, the railway sector faces challenges associated with supply chains. Security risks related to suppliers (e.g.,
remote access to the railway networks/systems) are less covered because of the heterogeneous and broad nature of
the supplier landscape, but also because stakeholders do not have much control over the cybersecurity level of their
suppliers and the cyber risks they may introduce. This topic can be reinforced by making an inventory of all the
suppliers, categorising them in term of criticality (e.g., do they have access to a critical system, is there a strong
interconnection between systems, do they manipulate sensitive data, etc.) and assessing the cybersecurity maturity
of the most critical suppliers as a starting point.
4.1 TAXONOMY
RUs and IMs should decide on a list of threats to be used to perform their cyber risk analysis. There are several
threat taxonomies available, without a consolidated version being available. For a detailed mapping of railway threat
taxonomies, one can consult “Appendix to D8.2 Security Assessment: A mapping of threat landscapes” (X2Rail-1,
2019). This document maps various approaches to the proposed threat landscape by X2Rail-1 WP 8, which is based
upon the ISO 27005 threat landscape with some improvements for railways. The ISO 27005:2011 16, ENISA Threat
Taxonomy17 and BSI Threats Catalogues are mapped to the threats considered under the X2Rail-1 WP 8 Threat
landscape.
14
See X2Rail-3 Deliverable D8.1 Guidelines for railway cybersecurity
15
See ISO 27005, annex E, E.2 Detailed information security risk assessment
16
See ISO 27005, annex E, E.2 Detailed information security risk assessment
17
https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
18
RAILWAY CYBERSECURITY
November 2021
19
RAILWAY CYBERSECURITY
November 2021
To assist in this process, this report provides a comprehensive and tailored list of threats based on the 2016 ENISA
Threat Taxonomy18, as this is a more extensive list. It can be used as the basis to identify threats that apply in the
context of the company and to assess railway cyber threats. It has been simplified to better apply to railways, and to
ensure stakeholders can effectively use it. The resulting list of categories was reviewed and validated with experts
during dedicated workshops. The main categories are as follows:
Each threat belongs to a category and is applicable to one or more railway assets. This taxonomy has been
represented graphically in Figure 6 and the threats are described in more detail in Annex B.
For an updated view of the current threat landscape, i.e. the current top threats, readers can consult the latest ENISA
Threat landscape report19. For a more detailed analysis of adversary tactics, the MITRE ATT&CK® knowledge base20
and the Common Attack Pattern Enumeration and Classification (CAPEC)21 can also be used.
Scenario 1: Compromising a signalling system or automatic train control system, leading to a train accident
Scenario 2: Sabotage of the traffic supervising systems, leading to train traffic stop
Scenario 3: Ransomware attack, leading to a disruption of activity
Scenario 4: Theft of clients’ personal data from the booking management system
Scenario 5: Leak of sensitive data due to unsecure, exposed database
Scenario 6: Distributed Denial of Service (DDoS) attack, blocking travellers from buying tickets
Scenario 7: Disastrous event destroying the datacentre facility, leading to disruption of IT services
18
See https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
19
https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends
20
https://attack.mitre.org/
21
https://capec.mitre.org/
20
RAILWAY CYBERSECURITY
November 2021
Figure 7: Compromising a signalling system or automatic train control system, leading to a train accident
This scenario requires high motivation of the attacker and in-depth knowledge of railway systems and networks. It is
considered a low likelihood scenario. It has been included as the potential impact can be very high and this is one of
the primary concerns of railway stakeholders when considering cyber risks. A similar incident took place in the city of
Lodz, Poland in 2008 when an attacker managed to hack into a tram system.
Attack details
Security Measures
21
RAILWAY CYBERSECURITY
November 2021
4.2.2 Scenario 2 – Sabotage of the traffic supervising systems, leading to train traffic stop
Figure 8: Sabotage of the traffic supervising systems, leading to train traffic stop
This scenario is a targeted attack using a specific Industrial Control System (ICS) malware to disrupt the traffic
supervising systems, thus leading to an urgent stop of train traffic. Such an incident has not yet occurred in the
railway sector. This scenario could also be applied to freight docking systems, and thus disturb or interrupt freight
activity.
Attack details
An attacker introduces an ICS malware, through phishing emails sent to employee or removable devices
used on OT systems;
The ICS malware propagates, takes over of the system, and gains remote access;
The malware allows the attackers to easily communicate with traffic supervising systems and remotely
manipulate the system’s memory to inject shellcodes, eventually injecting a payload that disrupts traffic
supervising systems;
The traffic supervising systems stop, preventing their supervision and leading to an urgent stop of train traffic.
Remote monitoring
Temporary speed restriction
Disruption of activity Railway undertaking Interlocking
Loss of reputation Infrastructure manager Train control
Automatic train protection
Freight docking
Security Measures
NIS - GV.6 Human resource security NIST - PR.AT Awareness & Trainings (1, 2, 3, 4, 5)
NIS - PR.9 IT security maintenance procedure CLC/TS50701 - SR 3.2 - Malicious code protection
22
RAILWAY CYBERSECURITY
November 2021
In 2021, ransomware attacks are considered the top threat scenario and are targeting the transport sector. In this
case, the attacker infiltrates the information system, exploits a vulnerability, and deploys a ransomware on a large
amount of assets. A similar incident happened in May 2017 when Germany’s Deutsche Bahn rail infrastructure was
infected with WannaCry ransomware22, leading to messages appearing on station information screens.
Attack details
Security Measures
NIS - PR.9 IT security maintenance procedure CLC/TS50701 - SR 3.2 Malicious code protection
NIS - PR.2 System segregation CLC/TS50701 - SR 3.4 - Software and information
NIS - PR.3 Traffic filtering integrity
NIS - GV.6 Human resource security CLC/TS50701 - SR 5.2 Zone boundary protection
22
See https://www.railtech.com/digitalisation/2017/12/11/wannacry-virus-was-wake-up-call-for-railway-industry/
23
RAILWAY CYBERSECURITY
November 2021
4.2.4 Scenario 4 – Theft of clients’ personal data from the booking management system
Figure 10: Theft of clients’ personal data from the booking management system
This scenario is a targeted attack, where the attacker steals the identity of an administrator and is therefore able to
connect to a cloud-based booking management system and exfiltrate customer data. A similar incident happened in
November 2017 with Rail Europe North America (RENA) suffering due to a 3-month long data breach23 and in
January 2019 when China Railway’s official online booking platform suffered a massive data breach, with information
later being sold on the dark web24.
Attack details
Attackers identify and retrieve authentication data (credentials) to get access to useful systems:
o by gathering information on railway systems through social engineering;
o by identifying the targeted systems used for booking management and fetching the identity of the
people using them;
o once systems and their operators/users are identified, attackers launch phishing attacks to retrieve
credentials to access to those systems;
The attacker gets direct access, accesses the system using the administrator credentials;
They get unauthorised access to customer data and retrieve it;
They leak the data or sell them.
Booking management
Tarnished reputation
Railway undertaking Clients’ personal information
Regulatory sanction (GDPR)
Passengers
Security Measures
23
See https://d3security.com/blog/data-breach-of-the-month-rail-europe-north-america/
24
See https://cyware.com/news/cyber-incidents-affecting-railways-a-threat-to-customer-data-a8d25ccc
24
RAILWAY CYBERSECURITY
November 2021
This scenario is also related to data leakage, but the starting point here is a supplier with a low cybersecurity level.
The attacker uses this third-party weakness to exfiltrate sensitive data. A similar incident happened in February 2020
with a database of C3UK25, which offered Wi-Fi services to passengers in train stations. The database contained 146
million records, including personal contact details and dates of birth, and was exposed online without a password26.
Attack details
A supplier providing services stores sensitive data (e.g., marketing company that manages a marketing
campaign, data from an open Wi-Fi service available at a train station) in an unprotected database, exposed
on internet, without password and without encrypting the information;
Hackers connect to the database and exfiltrate the information;
The database contains personal information, such as email addresses, date of birth, name, reason to travel
and travel arrangements;
Hackers use the information for extortion attacks targeting employees and customers.
Security Measures
NIS - GV.5 Security Audit NIST - ID.SC Supply Chain Risk (1, 2, 3, 4, 5)
NIS - GOV.7 Ecosystem mapping ISO27002 - A.15 Supplier relationships
NIS - GOV.8 Ecosystem relations CLC/TS50701 SR 4.1 - Information confidentiality
25
Wi-Fi for transport service provider
26
See https://www.bbc.com/news/technology-51682280
25
RAILWAY CYBERSECURITY
November 2021
This scenario is a targeted attack, where the prerequisite for the attacker is to have created a botnet network (a set of
compromised devices controlled by a hacker to perform their attacks). The attacker can then use the botnet to flood
devices with requests and make them unavailable. Another possibility to consider for a DDoS scenario is a non-
targeted attack, where an Internet Service Provider (ISP) is targeted with this type of attack, thus affecting railway
services that use this ISP.
Attack details
An attacker has previously infected a number of computers, creating a botnet (a set of compromised
devices controlled by a hacker to perform their attacks);
The botnet is used to launch a DDoS attack on the railway networks: the networks and servers exposed
to the internet are flooded with requests and connection attempts and thus shut down, unable to sustain
the flow;
All services and actions that need the internet-exposed devices are now unavailable: ticket-vending
machines, sites or applications, and commercial websites. Passengers are unable to book tickets.
Tarnished reputation
Loss of revenue
Booking management
Disruption of activities Railway undertaking
Automatic fare collection
Administrative and
resource burden
Security Measures
26
RAILWAY CYBERSECURITY
November 2021
Figure 13: Disastrous event destroying the datacentre, leading to disruption of IT services
This scenario is the consequence of a disastrous event which leads to disruption of activity. The event (natural
disaster, fire, etc.), affects the datacentre and destroys part of it, leading to a physical destruction of IT systems and
thus a disruption of activities related to these services. Depending on the redundancy strategy of the company (geo-
redundancy, cloud, external back-ups, etc.), the disruption can last more or less time. A similar incident happened in
March 2021 when OVH27 had a fire in one of its datacentres, making millions of websites unavailable for days 28.
Attack details
A disastrous event affects the datacentres and destroys part of it; it can be either a natural disaster
(earthquake, flooding, storm, etc.) or a fire due to a physical malfunction;
The railway servers supporting the IT systems are physically destroyed;
The main IT systems are unavailable, leading to a disruption of all IT-supported services: corporate and
support, sales and customers relations, timetable construction systems, asset management;
The back-ups stored in the datacentres are physically destroyed as well; data are thus lost, prolonging the
disruption.
Security Measures
27
French Hosting and Cloud company
28
See https://www.reuters.com/article/us-france-ovh-fire-idUSKBN2B20NU
27
RAILWAY CYBERSECURITY
November 2021
5. CYBERSECURITY
MEASURES
Once risks have been identified and prioritised according to risk evaluation criteria in relation to the incident scenarios
that lead to those risks, they should be treated via a risk treatment plan. Four options are usually proposed regarding
risk treatment29 : risk modification, risk retention, risk avoidance and risk sharing.
Risk modification is modifying the level of risk by introducing, removing, or altering controls so that the
residual risk can be reassessed as being acceptable.30
Risk retention is accepting the risk without further action, if the level of risk meets the risks acceptance
criteria.31
Risk avoidance is avoiding the activity or condition that increases the particular risk.32
Risk sharing is sharing the risk with another party that can most effectively manage the particular risk. 33
As described in the ISO 27005 standard, these options must be selected based on the outcome of the risk
assessment, the expected cost for implementing these options and the expected benefits from these options. At the
end of the process, no risk exceeding the risk acceptance criteria should be left. In order to reduce the identified risks
to acceptable levels, appropriate security measures should be identified and prioritised. Security measures can be
defined internally, using best practices and building a remediation plan tailored to the information system. However, a
common practice is to use already-defined security measures published in security frameworks. These security
frameworks often contain a list of controls or security requirements.
NIS Directive cybersecurity measures. The NIS cooperation group issued a list of security measures directed to
OESs in a Reference document on security measures for Operators of Essential Services. The purpose of this list is
“to provide Member States with a clear and structured picture of Member States’ current and often common
approaches to the security measures of OES”.34 The document examines a high number of domains where
cybersecurity measures should be applied. For each domain, it gives a set of broad measures alongside their
definitions (Figure 14).
These domains and measures could be used as the first basis for the risk treatment plan and complemented with
measures from the CLC/TS 50701 regarding the OT cybersecurity and ISO/IEC 27002 security measures for IT
cybersecurity.
Indeed, during the workshops, it was discovered that RUs and IMs often choose a two-step approach, by selecting a
general framework for IT cyber risk treatment and complementing it with a more detailed, industry-driven one for the
OT cyber risk treatment. ISA/IEC 62443 and CLC/TS 50701 are among the main references used for OT
cybersecurity. For IT risk frameworks, NISD national security requirements, ISO27002 framework and the NIST
Cybersecurity framework are among the more commonly used. Other less common frameworks have also been
cited, such as the SANS Top 20 Critical Security Controls35, or the Forrester Information Security Model36.
29
See for instance ISO 27005, chapter 9 Information security risk treatment
30
See ISO 27005, chapter 9.2 Risk modification
31
See ISO 27005, chapter 9.3 Risk retention
32
See ISO 27005, chapter 9.5 Risk avoidance
33
See ISO 27005, chapter 9.5 Risk sharing
34
Reference document on security measures for Operators of Essential Services, p.5
35
A list of 20 actions for cyber defence, that are close to the NIST 23 categories, and published by the SANS Institute, an organisation that provides
information, resources, and training regarding cybersecurity.
36
A security model declined in 123 security components (controls) divided into 25 functions and 4 domains has been cited. It is published by the
market research company Forrester.
28
RAILWAY CYBERSECURITY
November 2021
Figure 14: Domains of security measures for OESs (NIS Cooperation Group, 2018)
The ISO/IEC 27002 standard and Annex A’ of ISO2001 describe requirements for information security management
and a set of security controls37. These controls are organised in 12 categories38:
Similar to the NIS Directive security measures, ISO 27002 could be used as a basis for the risk treatment plan, and
complemented with additional national security requirements, while OT systems could be complemented with
CLC/TS 50701. Some measures from the NIST framework could also be used as they can be described in more
detail.
The NIST Cybersecurity framework is accompanied by an exhaustive list of requirements. They are classified
according to five functions (Identify, Protect, Detect, Respond, Recover) and 23 categories. Each of these categories
contain a list of precise security requirements (over 900 in total). Those controls are also mapped against the ISA
62443 series and the ISO/IEC 27001:2013. The framework is quite detailed and focuses primarily on IT security. The
NIST cybersecurity framework can be used as is and complemented by CLC/TS 50701 for OT railway systems
requirements, or it can be used to complete another generic frameworks or standards, such as the ISO 27001 or the
NIS Directive security requirements.
CLC/TS 50701 is based on or derived from IEC 62443 series standards. The purpose of the TS “is that, when a
railway system is compliant to this TS, it can be demonstrated that this system is at the state of the art in terms of
cybersecurity, that it fulfils its targeted Security Level and that its security is maintained during its operation and
maintenance.” It is best suited for industrial systems and designed specifically for the railway sector, as it applies to
the Communications, Signalling and Processing domain, the Rolling Stock domain and to the Fixed Installations
domain. It contains a list of security requirements for the OT components and services of the railway sector and thus
37
https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/risk-management-inventory/rm-ra-
methods/m_iso27001.html
38
ISO/IEC 27001 Standard - Information technology - Security techniques - Information security management systems – Requirements, p9
29
RAILWAY CYBERSECURITY
November 2021
should be completed with a more generic approach, such as the ISO 27001, the NIST Cybersecurity Framework or
the NIS Directive.
Defining the list of measures that will be used was described as the top priority of the attendants of the workshops. To
do so, operators draw a list of cybersecurity measures from known references. Assets’ maturity is assessed against
those measures, and measures that are not met are included in the list of security measures that must be applied to
these assets. This list of security measures can also be used as a common basis for the manufacturers to implement
minimum cybersecurity requirements by design or for security requirements to be included in contract specifications.
To define the set of measures that will be used, organisations also assess the level of compliance with national
cybersecurity requirements (primarily according to the NIS Directive, but also against other requirements stemming
from laws on national security, transport security or critical infrastructure protection).
During the workshops, stakeholders highlighted the importance of awareness raising and training sessions
(especially against top threats, such as ransomware and phishing) or email security to prevent phishing. On the latter,
the protection of endpoints and network segregation is also a top priority to reduce the risk of propagation of such
attacks. As for OT security, the emphasis is placed mainly on network segregation and access control for critical
systems. Adaptation of legacy systems is also a concern and should be considered as a priority, but it is also a big
challenge, considering the complexity of updating systems with long lifecycles. Additionally, particular emphasis is
placed on incident response.
Finally, applied security measures are often challenged by external audits or penetration testing. Some organisations
use third parties to conduct such assessments. The systems tested can belong both on the IT and OT domains. In
addition to technical audits, governance audits can also be conducted, such as an ISO-compliance audit.
Furthermore, business continuity and recovery and incident response plans can also be tested with crisis exercises.
A challenge cited by multiple RUs and IMs is the management of relationships with third parties and ensuring that the
products and services supplied meet cybersecurity requirements. Often, compliance with NIS Directive security
requirements does not apply to third parties. To engage more with the industry and to encourage the implementation
of cybersecurity measures, one solution could be to design a baseline at EU level to make the manufacturers and
providers align their systems’ compliance. Common baseline requirements should be reflected in tenders to allow for
competing solutions achieving similar security capabilities across Europe. However, when considering minimum
baseline requirements, there are risks involved, such as the minimum baseline not changing while the threat
landscape changes, or that these minimum-security requirements do not meet the risks of the organisation. The use
of EU certification schemes for IT or OT cybersecurity (should these become available) could be also a way to assess
whether such requirements are met by the industry.
Another challenge that was identified is continuity, i.e., ensuring that the security level remains adequate and that the
risks are continuously monitored. To do so, regular reviews and compliance assessments are needed. Maintaining an
up-to-date threat landscape for the railway sector is equally important. An additional challenge is the separation
between IT and OT, as it is often difficult to differentiate what is strictly OT from what is IT. In this case, it is difficult to
know which controls to apply.
39
The security measures of CLC/CS 50701 are matching the measures described in IEC 62443-3-3:2013.
30
RAILWAY CYBERSECURITY
November 2021
national sectorial regulations. They should also verify which references apply to them and, if needed, complete the
present list with the missing requirements.
The mapping was done in two phases: first, the references were reviewed and the most relevant measures were put
in front of the NIS Directive measures, keeping these measures as the starting point of the review. Then, the reverse
operation was carried out: the measures from the references that had been removed in the first phase were added to
the most relevant NIS Directive measures. This ensures that all NIS Directive measures have been covered; and that
all the other referenced measures are integrated into the mapping.
An example of a security measure is included below. It includes measures under the NIS Directive domain: Protection
and the category of “Identity and Access Management”. The two measures of this category “Authentication and
identification”, and “Access rights” are described according to the NIS Directive guidelines. They are then associated
with relevant measures that can be found in ISO/IEC 27002, the NIST cybersecurity framework and CLC/TS50701.
31
RAILWAY CYBERSECURITY
November 2021
32
RAILWAY CYBERSECURITY
November 2021
6. CONCLUSIONS
European RUs and IMs use a combination of good practices, approaches, and standards to perform cyber risk
management for their organisations. This report gathers insights on these current practices in a single document and
can assist railway undertakings and infrastructure managers in their efforts to apply them. It provides examples of
reference material, such as available taxonomies of assets and threats, comprehensive threats scenarios, derived
from real incidents and cyber risk mitigation measures, derived by guidelines and standards.
The report also highlights the challenges faced when applying such approaches. Most importantly,
Railway
there is a lack of a single cyber risk management approach for railway organisations to cover
both IT and OT in a unified manner.
organisations
lack of a single
IT vs OT risk management approaches. The differentiation between IT and OT in the railway cyber risk
sector is increasingly difficult and having discrete approaches and taxonomies for cyber risk management
management makes the issue more challenging. In many cases, it can be a complex process to
approach to
identify which approach is better suited, whether a device can be considered IT or OT or which
security measures and which standard should be applied. Having a more structured and unified
cover both IT
approach with respect to cyber risk management would help the sector to harmonise, thus facilitating and OT in a
risk discussions between the different entities of the railway ecosystem. It can also enable more unified manner
collaboration with the supply industry of the sector.
More harmonization and alignment of good practices. Future work could include further alignment of the sector-
specific taxonomies and more guidance on the application of good practices. Wherever possible, further
standardisation could be pursued, as this is also a request stemming from the railway supply industry, which
advocates for more certification schemes at EU level. Significant sectoral challenges remain, including the cyber risk
management of supply chains. This could be remedied with a regulatory approach encompassing the entire railway
ecosystem under the same cyber risk management requirements. At present, key elements of the railway supply
chain, both IT and OT, do not fall under the same European regulatory framework.
Keeping railway systems and cyber risk assessments up-to-date. Another significant issue specific to the sector
is the plethora of legacy systems which add an additional degree of difficulty when managing cyber risk. At present, it
is not possible to provide relevant recommendations to address the cybersecurity of legacy systems in the railway
sector. It would be necessary to involve the railway industry in such an exercise. Additionally, even for newly
developed systems, there is the need to ensure that the results of risk assessments remain current, that risks are
continuously monitored, and that the security level remains adequate. Maintaining an up-to-date threat landscape for
the railway sector could be a step towards this direction.
33
RAILWAY CYBERSECURITY
November 2021
7. BIBLIOGRAPHY
Cyrail, 2018. CYRail Recommendations on cybersecurity of rail signalling and communication systems. September
2018. https://cyrail.eu/IMG/pdf/final_recommendations_cyrail.pdf
ENISA, 2020. Railway Cybersecurity - Security measures in the Railway Transport Sector. November 2020.
https://www.enisa.europa.eu/publications/railway-cybersecurity
ENISA, 2021. Minimum Security Measures for Operators of Essentials Services (tool).
https://www.enisa.europa.eu/topics/nis-directive/minimum-security-measures-for-operators-of-essentials-services
IEC 62443-2-1:2010, Industrial communication networks - Network and system security - Part 2-1: Establishing an
industrial automation and control system security program.
IEC 62443-3-3:2013, Industrial communication networks - Network and system security - Part 3-3: System security
requirements and security levels.
ISO/IEC 27001: 2013, Information technology - Security techniques - Information security management systems –
Requirements.
ISO/IEC 27002: 2013, Information technology - Security techniques - Code of practice for information security controls
ISO/IEC 27005: 2018, Information technology - Security techniques - Information security risk management.
NIS Cooperation Group, 2018. Reference document on security measures for Operators of Essential Services. CG
Publication 01/2018, February 2018. https://digital-strategy.ec.europa.eu/en/policies/nis-cooperation-group
NIST Cybersecurity Framework, 2018. Cybersecurity Framework Version 1.1, April 2018.
https://www.nist.gov/cyberframework
Risk Management: Implementation principles and Inventories for Risk Management/Risk Assessment methods and
tools. https://www.enisa.europa.eu/publications/risk-management-principles-and-inventories-for-risk-management-
risk-assessment-methods-and-tools
UIC, 2018. Guidelines for cyber-security in railway, UIC-ETF, ISBN 978-2-7461-2732-6. https://www.shop-
etf.com/en/guidelines-for-cyber-security-in-railways
X2Rail-1 Start-up activities for Advanced Signalling and Automation Systems (2016 - 2018).
https://projects.shift2rail.org/s2r_ip2_n.aspx?p=X2RAIL-1
X2Rail-3, Advanced Signalling, Automation and Communication System (IP2 and IP5) – Prototyping the future by
means of capacity increase, autonomy and flexible communication (2018 - 2020).
https://projects.shift2rail.org/s2r_ip2_n.aspx?p=X2RAIL-3
X2Rail3, 2020. Deliverable D8.1 - Guidelines for railway cybersecurity part 1 –Simplified Risk Assessment. December
2020. https://projects.shift2rail.org/s2r_ip2_n.aspx?p=X2RAIL-3
34
RAILWAY CYBERSECURITY
November 2021
Telecom
Radio network used for all railway processes: communication Network and
Radio transmission
with trains, signalling, safety and security operations, logistics communication ENISA, 2020
network
management, etc. systems
Wired and wireless Network and
Wired and wireless systems used for network
transmission communication ENISA, 2020
communications in LAN or Internet connection.
network systems
Operational Network and
Telephone-related devices such as loudspeaker systems,
telephone communication ENISA, 2020
walkie-talkies, etc.
intercom systems
Network and
Mobile telephone
GSM/GSM-R phone devices. communication ENISA, 2020
devices (GSM)
systems
IT & OT Infrastructure
Computer & Computers and servers used as support goods by all IT & OT
IT systems ENISA, 2020
server systems.
Automatic ticket
distribution and
Devices and equipment to distribute and control the tickets. IT systems -
verification
infrastructures
CCTV (video Devices used for video surveillance of assets and people at
OT systems CLC/TS 50701
surveillance) risk.
Fixed
Detectors such as track vacancy detectors, hot box detectors,
infrastructure OT systems CLC/TS 50701
avalanche detectors and fire detectors.
detectors
Wayside Source and destination for information about approaching
OT systems -
equipment trains and their crews.
Station signalling Equipment for station signalling regarding interlocking (safe
(automatic train setting of routes for trains by controlling signals, points, and
protection, the track vacancy), automatic train protection (ATP) or radio OT systems CLC/TS 50701
interlocking, radio block centre (controls the movement authorities for the trains
block centre) in an ETCS Level 2/3 system).
Fixed
Network and
communication Fixed devices to communicate with railway personnel and
communication CLC/TS 50701
tools (GSM-R, passengers.
systems
MSC/BSC)
Network and
Radio transmission
Relays antenna for radio communication. communication CLC/TS 50701
relays
systems
Wired and wireless
Network and
transmission
Equipment to support network communications. communication CLC/TS 50701
internal network
systems
infrastructures
40
When a reference to a document is not given, the element was added based on the consultation with experts (workshops).
35
RAILWAY CYBERSECURITY
November 2021
Network and
Public Wi-Fi and
Equipment to support public Wi-Fi and internet access. communication CLC/TS 50701
internet accesses
systems
On-Board
Timetable construction
41
When a reference to a document is not given, the element was added based on the consultation with experts (workshops).
36
RAILWAY CYBERSECURITY
November 2021
Assets management
Asset inventory Systems enabling RUs and IMs to inventory their assets. IT systems ENISA, 2020
Systems enabling RUs and IMs to manage their asset
Logistics IT systems ENISA, 2020
logistics.
Systems enabling RUs and IMs to account for their assets
Asset procurement (infrastructure, or trains for example), and to procure new IT systems ENISA, 2020
assets.
Signalling
Command-Control
Auxiliary
Energy System overseeing the management of power delivery. OT systems ENISA, 2020
Heating, ventilating
and air System overseeing the management of heating, ventilation,
OT systems ENISA, 2020
conditioning and air conditioning.
(HVAC)
Lighting System overseeing the management of lighting. OT systems ENISA, 2020
Water System overseeing the management of water. OT systems -
Escalator and System overseeing the management of escalators and
OT systems -
elevator elevators.
37
RAILWAY CYBERSECURITY
November 2021
Development
Bidding
Bidding systems for the RU or IM to answer invitations to
management IT systems ENISA, 2020
tender for train operations or infrastructure management.
systems
Research and
engineering Centralise and coordinate research and engineering. IT systems ENISA, 2020
systems
Passenger services
Telecom
Network and
Operational time System which synchronises the clocks of the different IT
communication ENISA, 2020
distribution system equipment (servers, workstations, etc.).
systems
Security
Safety
Maintenance
38
RAILWAY CYBERSECURITY
November 2021
Documentation
systems / System overseeing the management of documents (shared
IT systems ENISA, 2020
Document folders, SharePoint, OneDrive, etc.).
management
Alert escalation
Process and system used in case of crisis, in order to escalate
and crisis IT systems ENISA, 2020
and manage the situation.
management
Administrative
Administration of the telephone systems used by employees. IT systems ENISA, 2020
telephone systems
Administrative time Network Time Protocol (NTP) systems that provide time
IT systems ENISA, 2020
distribution management for all systems.
Finance Manages all financial aspects (accounting, consolidation).. IT systems ENISA, 2020
System for employee management: recruitment, pay, training,
HR IT systems ENISA, 2020
evaluation, etc.
IT-related
(equipment,
Vendor systems for IT services and equipment. Supply chain -
services) system
supply
On-Board
Train Physical equipment of trains including embedded devices and their software. -
Freight
On-board physical infrastructures related to freight locomotives. -
locomotives
Special wagons
(Container
transport, oil On-board physical infrastructures related to special wagons. -
transport,
refrigerated)
On-board system
On-board physical infrastructures related to the system supply. -
supply
Energy systems
Infrastructures that support providing energy to all facilities. -
supply
42
When a reference to a document is not given, the element was added based on the consultation with experts (workshops).
39
RAILWAY CYBERSECURITY
November 2021
Train assembly
Facilities where trains are assembled. -
facility
Stations -
All buildings used for train stations. CLC/TS 50701
buildings
Other buildings
(Administrative, All building used for corporate, IT or OT purposes. -
facilities, …)
Electrical
Physical infrastructures that support electrical substations. CLC/TS 50701
substations
Physical infrastructures supporting level crossings. Protects the crossing area of rail
Level crossing CLC/TS 50701
and road traffic.
Physical infrastructures related to bridges or tunnels.
"Tunnels" includes the electronics installed in railway tunnels to support tunnel
Tunnels and specific infrastructure functions (e.g., ventilation, alarm systems, fire and smoke
-
bridges detectors, fire extinguisher, etc.)
"Bridges" includes the electronics installed in railway bridges to support bridge
specific infrastructure functions (e.g., monitoring systems, lift control, etc.)."
Escalators and Physical infrastructures related to escalators or elevators that allow passengers and
ENISA, 2020
elevators employees' to move in buildings and infrastructures.
Fire management Physical infrastructures related to fire management (fire extinguisher, etc.) -
Freight docking Physical infrastructures related to freight docking platforms, allowing loading and
-
platform unloading of goods.
Goods storage
Physical infrastructures related to goods storage (such as containers). -
facilities
Heating, ventilating
and air Heating and ventilating equipment, providing crew and passengers with ambient
CLC/TS 50701
conditioning comfort conditions.
(HVAC)
40
RAILWAY CYBERSECURITY
November 2021
Assets Description
Clients’ personal information Name, address, credit card information, usage, etc.
Research and engineering data Data related to research and engineering activities.
Systems maintenance data Backups, configurations, audit, log, install images, licenses, certificates, etc.
People
41
RAILWAY CYBERSECURITY
November 2021
Threats Description
Information leakage/sharing due to Confidential data shared involuntarily by a member of the organisation via the
human error information system (emails, social network...).
Erroneous use or administration of Error in the use or administration of the organisation’s assets leading to information
devices and systems leakage, damage to such assets or physical harm.
Using information from an unreliable Using information in the organisation’s processes and systems from a non-verified,
source non-official source, or an official but corrupted source.
Unintentional change of data in an
Harmful modification of data, mistakenly done by a member of the organisation.
information system
Inadequate design and planning or Error in the design of a system or its planning or delivery, leading to system
improper adaptation unavailability.
Damage caused by a third
Unintentional damage caused by a supplier or a partner.
party (supplier or partner)
Damages resulting from penetration Unintentional damage caused by an IT team during a penetration test of an
testing information system.
Loss of (integrity of) sensitive Loss of sensitive information, or unwanted modification of sensitive information,
information leading to the unavailability of the necessary data.
Loss of recorded information in IT systems (back up) or OT systems (train system
Destruction of records
records or similar).
42
RAILWAY CYBERSECURITY
November 2021
Threats Description
Failures / Malfunction
Failure / malfunction of devices or Natural dysfunction or dysfunction stemming from a misconfiguration on a device
systems or a system.
Failure / malfunction / disruption of Natural dysfunction or dysfunction stemming from a misconfiguration, on the
communication links communication networks.
Failure / malfunction / disruption of Natural dysfunction or dysfunction stemming from a misconfiguration on the
service providers (supply chain) services provided by the suppliers.
Outages
Low competency or maturity of Personnel lacking competency to correctly and efficiently complete tasks causing
personnel unavailability of assets or services.
Internet outage Unavailability of the services provided by the global internet suppliers.
Unauthorised use or administration of Unauthorised use or administration of the organisation’s assets leading to
devices and systems information leakage, damage to such assets or physical harm.
43
RAILWAY CYBERSECURITY
November 2021
Threats Description
44
RAILWAY CYBERSECURITY
November 2021
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
Information System Security Governance & Risk Management
ID.GV Governance (4)
ID.RA Risk Assessment (1, 3, 4, 5,
6)
ID.RM Risk Management Strategy
6.1 Actions to address risks and opportunities
(1, 2, 3)
The operator conducts and regularly 8 Operation
RS.IM Improvements (1, 2) SR 7.8 - Control system component
updates a risk analysis, identifying 9.3 Management review
ID.SC Supply Chain Risk inventory
its Critical Information Systems (CIS) 10 Improvement
Security risk Management (1)
NIS - GV.1 underpinning the provision of the A.8.1 Responsibility for assets
analysis PR.IP Information Protection
essential services of OESs and A.12.6.1 Management of technical See sections 6 and 7 of CLC/TS50701
Processes and Procedures (12)
identifies the main risks to these vulnerabilities and IEC 62443-2-1 (section 4.2)
ID.AM Assets management (1, 2,
CIS. A.18.2.1 Independent review of information
4, 5)
security
DE.CM Security Continuous
Monitoring (8)
RS.MI Mitigation (3)
RS.AN Analysis (5)
4.3 Determining the scope of the information
security management system
4.4 Information security management system
5.1 Leadership and commitment
5.2 Policy
5.3 Organisational roles, responsibilities and
authorities ID.BE Business Environment
The operator establishes, maintains
6.2 Information security objectives and (1,2,3,4)
and implements an information
planning to achieve them ID.GV Governance (1,2,3,4)
Security system security policy (ISSP)
NIS - GV.2 9.3 Management review PR.AT Awareness & Trainings See IEC 62443-2-1 (section 4.3.2)
policy approved by senior management,
A.5.1 Management direction for information (2,3 4,5)
guaranteeing high-level
security DE.DP Detection Processes (1)
endorsement of the policy.
A.6.1 Internal organisation ID.AM Assets Management (6)
A.7.2.1 Management responsibilities
A.18.1.1 Identification of applicable legislation
and contractual requirements
A.18.1.2 Intellectual property rights
A.18.2.2 Compliance with security policies and
standards
45
RAILWAY CYBERSECURITY
November 2021
46
RAILWAY CYBERSECURITY
November 2021
47
RAILWAY CYBERSECURITY
November 2021
Table 7: Protection
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
IT Security Architecture
SR 1.13 - Access via untrusted networks
SR 2.2 - Wireless use control
SR 2.3 - Use control for portable and
mobile devices
SR 2.4 - Mobile code
4.3 Determining the scope of the
SR 2.6 - Remote session termination
information security management
SR 3.1 - Communication integrity
system
SR 3.3 - Security functionality verification
A.6.2 Mobile devices and teleworking
SR 3.4 - Software and information integrity
A.8.1 Responsibility for assets
SR 3.5 - Input validation
A.8.3 Media handling
SR 3.8 - Session integrity
The operator only installs services and A.12.1 Operational procedures and PR.IP Information Protection
SR 4.1 - Information confidentiality
Systems functionalities or connects equipment responsibilities Processes and Procedures (1, 2, 3)
NIS - PR.1 SR 4.2 - Information persistence
configuration which are essential for the functioning and A.12.5 Control of operational software DE.AE Anomalies and Events (1)
SR 4.3 - Use of cryptography
the security of its CIS. A.12.6 Technical vulnerability PR.PT Protective Technology (3)
SR 5.1 - Network segmentation
management
SR 5.2 - Zone boundary protection
A.13.1 Network security management
SR 5.3 - General purpose person-to-
A.14.1 Security requirements of
person communication restrictions
information systems
SR 7.1 - Denial of service protection
A.14.2 Security in development and
SR 7.2 - Resource management
support processes
SR 7.6 - Network and security
configuration settings
SR 7.7 - Least functionality
SR 7.8 - Control system component
inventory
SR 1.13 - Access via untrusted networks
SR 2.6 - Remote session termination
SR 3.1 - Communication integrity
SR 3.5 - Input validation
SR 3.8 - Session integrity
SR 4.1 - Information confidentiality
PR.DS Data Security (5, 7)
SR 4.2 - Information persistence
The operator segregates its systems in A.12.1 Operational procedures and PR.PT Protective Technology (3, 4)
System SR 4.3 - Use of cryptography
NIS - PR.2 order to limit the propagation of IT security responsibilities PR.AC Identity Management,
segregation SR 5.1 - Network segmentation
incidents within its systems or subsystems. A.13.1 Network security management Authentication and Access Control
SR 5.2 - Zone boundary protection
(5, 6)
SR 5.3 - General purpose person-to-
person communication restrictions
SR 5.4 - Application partitioning
SR 7.1 - Denial of service protection
SR 7.6 - Network and security
configuration settings
48
RAILWAY CYBERSECURITY
November 2021
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
SR 1.13 - Access via untrusted networks
SR 2.6 - Remote session termination
SR 3.1 - Communication integrity
SR 3.5 - Input validation
SR 3.8 - Session integrity
PR.DS Data Security (2)
SR 4.1 - Information confidentiality
The operator filters traffic flows circulating PR.PT Protective Technology (4)
SR 4.2 - Information persistence
in its CIS. The operator therefore forbids 8.1 Operational planning and control PR.AC Identity Management,
Traffic SR 4.3 - Use of cryptography
NIS - PR.3 traffic flows that are not needed for the A.13.1 Network security management Authentication and Access Control
filtering SR 5.1 - Network segmentation
functioning of its systems and that are A.13.2 Information transfer (3, 5)
SR 5.2 - Zone boundary protection
likely to facilitate an attack. DE.CM Security Continuous
SR 5.3 - General purpose person-to-
Monitoring (6, 7)
person communication restrictions
SR 7.1 - Denial of service protection
SR 7.6 - Network and security
configuration
settings
In its ISSP, the operator establishes and
implements a policy and procedures
related to cryptography, in view of A.10.1 Cryptographic controls ID.GV Governance (3)
Cryptograph SR 4.3 - Use of Cryptography
NIS - PR.4 ensuring adequate and effective use of A.18.1 Compliance with legal and PR.DS Data Security (1, 2, 5, 6, 8)
y SR 5.2 - Zone boundary protection
cryptography to protect the confidentiality, contractual requirements PR.PT Protective Technology (4)
authenticity and/or integrity of information
in its CIS.
IT Security Administration
SR 1.1 - Human user identification and
authentication
SR 1.2 - Software process and device
identification and authentication
The operator sets up specific accounts for SR 1.3 - Account management
the administration, to be used only for SR 1.4 - Identifier management
PR.AC Identity Management,
employees that are carrying out A.9.2 User access management SR 1.5 - Authenticator management
Administrati Authentication and Access Control
NIS - PR.5 administrative operations (installation, A.12.4.3 Administrator and operator SR 1.6 - Wireless access management
on accounts (1, 4, 7)
configuration, management, maintenance, logs SR 1.7 - Strength of password-based
PR.AT Awareness & Trainings (2, 4)
etc.) on its CIS. These accounts are kept authentication
on an up-to-date list. SR 1.8 - Public key infrastructure (PKI)
certificates
SR 1.9 - Strength of public key
authentication
SR 2.1 - Authorisation enforcement
49
RAILWAY CYBERSECURITY
November 2021
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
SR 1.1 - Human user identification and
authentication
SR 1.2 - Software process and device
identification and authentication
SR 1.3 - Account management
SR 1.4 - Identifier management
A.9.3.1 Use of secret authentication
PR.AC Identity Management, SR 1.5 - Authenticator management
Hardware and software resources used for information
Authentication and Access Control SR 1.6 - Wireless access management
Administrati administration purposes are managed and A.9.4 System and application access
(1, 3, 4, 6, 7) SR 1.7 - Strength of password-based
on configured by the operator, or, where control
NIS - PR.6 PR.DS Data Security (5, 6, 7) authentication
information appropriate, by the service provider that A.12.1.4 Separation of development,
PR.AT Awareness & Trainings (2, 3, SR 1.8 - Public key infrastructure (PKI)
systems the operator has authorised to carry out testing and operational environments
4) certificates
administration operations. A.12.4.3 Administrator and operator
PR.PT Protective Technology (4) SR 1.9 - Strength of public key
logs
authentication
SR 1.10 - Authenticator feedback
SR 2.1 - Authorisation enforcement
SR 5.2 - Deny by default, allow by
exception
SR 6.1 - Audit log accessibility
Identity and access management
SR 1.1 - Human user identification and
authentication
SR 1.2 - Software process and device
identification and authentication
SR 1.3 - Account management
SR 1.4 - Identifier management
SR 1.5 - Authenticator management
SR 1.6 - Wireless access management
SR 1.7 - Strength of password-based
A.9.1 Business requirements of
For identification, the operator sets up authentication
access control
unique accounts for users or for SR 1.8 - Public key infrastructure (PKI)
A.9.3 User responsibilities PR.AC Identity Management,
Authenticati automated processes that need to access certificates
A.9.4 System and application access Authentication and Access Control
NIS - PR.7 on and CIS resources. Unused or no longer SR 1.9 - Strength of public key
control (1, 4, 6, 7)
identification needed accounts are to be deactivated. A authentication
A.9.4.2 Secure log-on procedures PR.DS Data Security (5)
regular review process should be SR 1.10 - Authenticator feedback
A.9.4.3 Password management
established. SR 1.11 - Unsuccessful login attempts
system
SR 1.12 - System use notification
SR 1.13 - Access via untrusted networks
SR 2.1 - Authorisation enforcement
SR 2.2 - Wireless use control
SR 2.3 - Use control for portable and
mobile devices
SR 2.4 - Mobile code
SR 2.5 - Session lock
SR 2.6 - Remote session termination
50
RAILWAY CYBERSECURITY
November 2021
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
SR 2.7 - Concurrent session control
SR 5.2 - Zone boundary protection
SR 1.1 - Human user identification and
authentication
SR 1.2 - Software process and device
identification and authentication
SR 1.3 - Account management
Among the rules defined in its ISSP, the A.9.1 Business requirements of
ID.AM Assets management (5, 6) SR 1.4 - Identifier management
operator grants access rights to a user or access control
PR.AC Identity Management, SR 1.5 - Authenticator management
an automated process only when that A.9.2 User access management
Access Authentication and Access Control SR 1.6 - Wireless access management
NIS - PR.8 access is strictly necessary for the user to A.9.4.4 Use of privileged utility
rights (1, 4, 6, 7) SR 1.7 - Strength of password-based
carry out their mission or for the programs
PR.DS Data Security (5) authentication
automated process to carry out its A.9.4.5 Access control to program
PR.PT Protective Technology (3) SR 1.8 - Public key infrastructure (PKI)
technical operations. source code
certificates
SR 1.9 - Strength of public key
authentication
SR 1.10 - Authenticator feedback
SR 2.1 - Authorisation enforcement
IT Security Maintenance
6.2 Information security objectives and
planning to achieve them
7.5.3 Control of documented
information
8.1 Operational planning and control
10.1 Nonconformity and corrective
action
SR 3.1 - Communication integrity
The operator develops and implements a A.8.2 Information classification PR.MA Maintenance (1,2)
SR 3.3 - Security functionality verification
procedure for security maintenance in A.11.2 Equipment PR.IP Information Protection
IT security SR 3.4 - Software and information integrity
accordance with its ISSP. To this end, the A.12.1.2 Change management Processes and Procedures (1, 2, 3,
NIS - PR.9 maintenance SR 3.8 - Session integrity
procedure defines the conditions enabling A.12.6.1 Management of technical 4, 7)
procedure SR 6.1 - Audit log accessibility
the minimum security level to be vulnerabilities PR.DS Data Security (3, 4)
SR 7.6 - Network and security
maintained for CIS resources. A.13.1 Network security management ID.SC Supply Chain Risk (4)
configuration settings
A.14.1 Security requirements of
information systems
A 14.2 Security in development and
support processes
A.14.3 Test data
A.15.2 Supplier service delivery
management
51
RAILWAY CYBERSECURITY
November 2021
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
52
RAILWAY CYBERSECURITY
November 2021
Table 8: Defence
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
Detection
SR 2.8 - Auditable evens
SR 2.9 - Audit storage capacity
SR 2.10 - Response to audit
processing failure
SR 2.11 - Timestamps
9.1 Monitoring, measurement, analysis SR 2.12 - Non-repudiation
The operator sets up a security incident
and evaluation PR.DS Data Security (6, 8) SR 3.1 - Communication integrity
detection system of the “analysis probe for
A.12.2 Protection from malware DE.AE Anomalies and Events (1, 5) SR 3.2 – Malicious code protection
files and protocols” type. The analysis
A.12.4 Logging and monitoring DE.CM Security Continuous SR 3.3 - Security functionality
NIS - DF.1 Detection probes for files and protocols analyses the
A.12.6.1 Management of technical Monitoring (1, 2, 3, 4, 5, 6, 7) verification
data flows transiting through those probes
vulnerabilities DE.DP Detection Processes (1, 2, 3) SR 3.4 - Software and information
to seek out events likely to affect the
A.15.2.1 Monitoring and review of PR.PT Protective Technology (1) integrity
security of the CIS.
supplier services SR 3.8 - Session integrity
SR 3.9 - Protection of audit information
SR 5.1 - Network segmentation
SR 5.2 - Zone boundary protection
SR 5.4 - Application partitioning
SR 6 - Timely response to events
SR 1.12 - System use notification
SR 2.8 - Auditable evens
ID.RA Risk Assessment (1)
9.1 Monitoring, measurement, analysis SR 2.9 - Audit storage capacity
ID.SC Supply Chain Risk
The operator sets up a logging system on and evaluation SR 2.10 - Response to audit
Management (1)
each CIS to record events relating, at A.12.4 Logging and monitoring processing failure
PR.MA Maintenance (1,2)
least, to user authentication, management A.14.1.2 Securing application services SR 2.11 - Timestamps
NIS - DF.2 Logging DE.CM Security Continuous
of accounts and access rights, on public networks SR 2.12 - Non-repudiation
Monitoring (1, 2, 3, 6, 7)
modifications to security rules, and the A.15.2.1 Monitoring and review of SR 3.9 - Protection of audit information
DE.AE Anomalies and Events (3)
functioning of the CIS. supplier services SR 6 - Timely response to events
RS.MI Mitigation (3)
A.18.1.3 Protection of records SR 6.2 – Continuous monitoring
PR.PT Protective Technology (1)
SR 7.8 – Control system component
inventory
ID.RA Risk Assessment (4, 5) SR 2.8 - Auditable evens
9.1 Monitoring, measurement, analysis PR.PT Protective Technology (1) SR 2.9 - Audit storage capacity
The operator creates a log correlation and
and evaluation DE.AE Anomalies and Events (2, 3, SR 2.10 - Response to audit
Log analysis system that mines the events
9.3 Management review 4) processing failure
NIS - DF.3 correlation recorded by the logging system installed
A.16.1.4 Assessment of and decision DE.DP Detection Processes (3, 4, 5) SR 2.11 - Timestamps
and analysis on each of the CIS to detect events that
on information security events PR.IP Information Protection SR 2.12 - Non-repudiation
affect CIS security.
A.16.1.7 Collection of evidence Processes and Procedures (7) SR 3.9 - Protection of audit information
RS.AN Analysis (1, 5) SR 6 - Timely response to events
53
RAILWAY CYBERSECURITY
November 2021
54
RAILWAY CYBERSECURITY
November 2021
Table 8: Resilience
Security
ID Description ISO/IEC 27002 measures NIST CSF measures CLC/TS50701 measures
Measures
Continuity of operations
SR 2.8 - Auditable evens
SR 3.1 – Communication integrity
SR 3.3 - Security functionality verification
ID.RM Risk Management Strategy
SR 3.6 - Deterministic output
(1, 2, 3)
9.3 Management review SR 3.7 - Error handling
PR.IP Information Protection
In accordance with its ISSP, the operator 10.2 Continual improvement SR 4.1 – Information confidentiality
Processes and Procedures (4, 7, 9,
Business defines objectives and strategic A.5.1.2 Review of the policies for SR 4.2 – Information persistence
10)
NIS - RS.1 continuity guidelines regarding business continuity information security SR 5.2 - Zone boundary protection
RS.IM Improvements (2)
management management, in case of an IT security A.11.2.4 Equipment maintenance SR 6.1 - Audit log accessibility
RC.IM Improvements (1, 2)
incident. A.17.1 Information security continuity SR 7.1 - Denial of service protection
RC.RP Recovery Planning (1)
A.17.2 Redundancies SR 7.2 - Resource management
RC.CO Communications (1, 2, 3)
SR 7.3 - Control system backup
PR.PT Protective Technology (5)
SR 7.4 - Control system recovery and
reconstitution
SR 7.5 – Emergency power
ID.BE Business Environment (5) SR 5.2 - Zone boundary protection
In accordance with its ISSP, the operator PR.PT Protective Technology (5) SR 7.1 - Denial of service protection
Disaster defines objectives and strategic PR.IP Information Protection SR 7.2 - Resource management
NIS - RS.2 recovery guidelines regarding disaster recovery A.17.2 Redundancies Processes and Procedures (9, 10) SR 7.3 - Control system backup
management management, in case of a severe IT PR.DS Data Security (4) SR 7.4 - Control system recovery and
security incident. RC.IM Improvements (1, 2) reconstitution
RC.RP Recovery Planning (1) SR 7.5 – Emergency power
Crisis management
5.3 Organisational roles, SR 3.3 - Security functionality verification
The operator defines the organisation for responsibilities and authorities ID.BE Business Environment (5) SR 7.1 - Denial of service protection
Crisis
crisis management in its ISSP in case of A.6.1.1 Information security roles and PR.DS Data Security (4) SR 7.2 - Resource management
NIS - RS.3 management
IT security incidents and to ensure the responsibilities PR.IP Information Protection SR 7.3 - Control system backup
organisation
continuity of the organisation’s activities. A.11.2.4 Equipment maintenance Processes and Procedures (10) SR 7.4 - Control system recovery and
A.17.1 Information security continuity reconstitution
7.4 Communication RC.CO Communications (1, 2, 3) SR 2.8 - Auditable evens
The operator defines the processes for 9.3 Management review RC.RP Recovery Planning (1) SR 3.3 - Security functionality verification
crisis management in its ISSP which the 10.2 Continual improvement RS.IM Improvements (1, 2) SR 6.1 - Audit log accessibility
Crisis
crisis management organisation will A.5.1.2 Review of the policies for ID.SC Supply Chain Risk SR 7.1 - Denial of service protection
NIS - RS.4 management
implement in case of IT security incidents information security Management (5) SR 7.2 - Resource management
process
and to ensure the continuity of an A.6.1.3 Contact with authorities PR.IP Information Protection SR 7.3 - Control system backup
organisation’s activities. A.11.2.4 Equipment maintenance Processes and Procedures (4, 9, 10) SR 7.4 - Control system recovery and
A.17.1 Information security continuity PR.PT Protective Technology (5) reconstitution
55
TP-01-21-425-EN-N
ABOUT ENIS A
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to
achieving a high common level of cybersecurity across Europe. Established in 2004 and
strengthened by the EU Cybersecurity Act, the European Union Agency for Cybersecurity
contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and
processes with cybersecurity certification schemes, cooperates with Member States and EU
bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through knowledge
sharing, capacity building and awareness raising, the Agency works together with its key
stakeholders to strengthen trust in the connected economy, to boost resilience of the
Union’s infrastructure, and, ultimately, to keep Europe’s society and citizens digitally secure.
More information about ENISA and its work can be found here: www.enisa.europa.eu.
ISBN 978-92-9204-545-6
doi: 10.2824/92259