Claroty Celebrates More Key Public Sector Investments
Learn More
 
Request a Demo
Claroty Toggle Search
Return to Blog

Understanding Facility Related Control Systems in U.S. Federal Facilities

/ / 9 min read
Facility-Related Control Systems (FRCS) are responsible for crucial operations, making them potential targets for cyber threats against the U.S. federal government.

Within U.S. federal buildings and across installations both domestically and abroad, Facility-Related Control Systems (FRCS) are responsible for crucial operations, making them potential targets for cyber threats. Protecting these systems, which are a category of Operational Technology (OT), is imperative to securing the broader federal environments they’re a part of, from U.S. military operations to critical manufacturing and maintenance, energy and biomedical laboratories to diplomatic missions. Securing these systems requires OT and CPS-specific security expertise and capabilities that go beyond superficial protocol analysis and a comprehensive exposure analysis of each asset or system.

Learn more about the world of FRCS cybersecurity, its importance in federal environments, the unique challenges it presents, and the strategic measures to enhance CPS security.

Defining Facility Related Control Systems and their Criticality

What are Facility Related Control Systems?

Facility-Related Control Systems encompass several categories of assets:

  • The building control systems handling essential utilities for a specific environment, including temperature, electricity, and humidity control;

  • Electronic security systems that govern access to facilities such as bases, campuses, buildings, and rooms; and

  • Fire and life safety systems such as fire suppression systems.

FRCS cybersecurity aims to protect these access controls from adversaries looking to exploit the system and, thus, hinder the system’s objective or worse, use them as a launching point into the broader federal network. Within the U.S. DoD, Unified Facilities Criteria (UFC) govern the handling of these systems and the Risk Management Framework, through DoD Instruction 8510.01, governs the security of these systems by impact level. Within U.S. civilian agencies, FISMA governs FRCS security, requiring the identification, risk assessment, security controls and regular monitoring of these systems. 

Common Types of FRCS

The devices that comprise Facility-Related Control Systems are susceptible to cyber attacks that could circumvent controls, laterally move into the broader network, and/or lead to serious harm. From overtaking physical security into a facility, to thwarting life-saving systems to impeding mission-critical operations in an airfield, adversaries who gain access to FRCS can derail operations, destroy property, and endanger physical safety.

Common types of FRCS that must be secured include building automation systems (BAS) like HVAC, lighting, and electricity, life safety systems, energy monitoring systems, water management systems, environmental sensors, electronic security systems and more.

Criticality of Securing FRCS

Beyond the role of FRCS, two other considerations make securing FRCS a priority: the sheer magnitude of these systems throughout federal environments, and their locations often outside the control of the U.S. government.  For example, within DoD, the U.S. Navy alone is estimated to manage approximately 260,000 FRCS. And maintaining control of and securing such systems becomes even more complex when they are outside the U.S. For example, the U.S. military is estimated to maintain over 128 installations across 51 countries and the U.S. State Department maintains 3,000 properties in almost 300 U.S. diplomatic posts - all of which include these critical functions and systems.  

Key Security Risks and Vulnerabilities in FRCS

With the convergence of IT and OT, FRCS is increasingly connected to and controlled by the internet, opening them up to risks and exposures. Since FRCS commonly utilize insecure protocols and legacy systems, and are often accessed remotely, their security can be impacted by new attack vectors and vulnerabilities. See the three main security risks FRCS must be protected from.

Cyber Threats: Targeted Attacks, Malware, Insecure Remote Access

IT and OT convergence, coupled with increased remote access have expanded the attack surface of Federal networks, including access to FRCS. Gaining network access via insecure remote connections can allow adversaries to access FRCS and potentially gain footprint onto Federal networks, moving laterally from FRCS if not segmented, secured, and otherwise addressed.  Federal agencies and the U.S. Service Branches have begun adopting Zero Trust principles, including the DoD’s Zero Trust Reference Architecture, to improve their security accordingly. 

Attacks against ICS vendors used by U.S. federal agencies is another concern to FRCS security. The cyberattack against Johnson Controls International, an ICS and FRCS manufacturer with several U.S. federal and DIB contracts, is but one example of risk within the US Federal supply chain. Such attacks, like this ransomware attack against the company’s IT infrastructure and applications, can pose a downstream risk to Federal customers exposing sensitive insights such as federal floor plans. 

In addition, foreign adversaries have targeted U.S. industrial control systems (ICS) in food and agriculture, healthcare, and water and waste management sectors, making FRCS vulnerable to similar threats on control systems. However, the greatest concern for Federal FRCS is that of such targeted attacks - either with Living off the Land (LOTL) techniques as those perpetrated by Volt Typhoon or by insecure remote access set up for contractors, vendors or employees accessing operations remotely. OT malware attacks are also on the rise, requiring proactive strategies to guard against them. 

FRCS Network Vulnerabilities

Any exposure in the network can broaden the attack surface to allow adversaries access to connected OT devices, including FRCS. Accurate asset inventories of FRCS - down to the line card and firmware version - and comprehensive network mapping to understand not just the network topology but the legitimate communications between assets, are foundational to FRCS security. With these as the foundation, detecting abnormal FRCS activity, swiftly, can be key to protecting FRCS. FRCS also typically include legacy systems with equipment sometimes older than 20 years, making them difficult to secure and sensitive to modern scanning methods that can disrupt the systems. Employing OT-specific capabilities - with deep OT protocol and OT communication proficiency - enable accuracy in identifying FRCS vulnerabilities and other exposures, in detecting anomalous FRCS communications and in reducing false positives to ensure against disruption to FRCS and broader network. 

Securing FRCS 

With the rise of cyberattacks on OT and CPS, federal agencies must prioritize securing FRCS. Lasting consequences of attacks on FRCS and high profile examples of cyber incidents necessitate a comprehensive strategy to protect these critical control systems. 

How to Mitigate Threats

Much attention is being paid to the importance of protecting and securing FRCS in federal agencies. But it takes time with the expanse of FRCS real estate owned and operated by the Federal Government.  In 2019, Naval Facilities Engineering Command (NAVFAC) directed installations to be standardized for FRCS, citing recent attempted and successful cyber attacks against critical infrastructure.  The UFC has included FRCS for DoD facilities and was updated in 2023, and subsequent Defense authorization acts raise attention to the subject again. 

Several assumptions often impede the progress of FRCS security: 

  1. Often, agencies assume they need to rip out and replace their entire switching infrastructure to even get started in asset visibility, so they put off the enormous task. 

  2. Previous attempts to catalog exposure to their assets have resulted in false positives, causing more work and slowing progress.

  3. Lacking OT expertise onsite, agencies don’t know where or how to start and presume they must hire experts for each site or have no way to navigate the challenge. 

How Claroty Protects Facility Related Control Systems in U.S. Federal Facilities

Despite the many challenges tied to FRCS security, employing a comprehensive, purpose-built OT (and broader CPS) protection platform that can help agencies overcome these hurdles may be an easier task than thought possible. Claroty Edge is a fast and simple solution to deliver an inventory of all OT, IoT and IT managed and unmanaged assets across an entire environment. 

  • Discover with speed and ease: To get started, did you know that a small software agent can help you discover assets in minutes? Claroty Edge is a highly flexible data collector that delivers complete visibility into networks quickly without requiring network changes, sensors, or physical footprint at lower network levels.

  • Improve accuracy and reduce false positives: Backed by deep industry insight and OT expertise, identifying asset details at the lowest level possible makes exposure insights precise. Building the foundation on accurate information, vulnerability, EoL, and other insights proves to be valid, saving time and energy teams can use to focus on compensating controls. 

  • Limited resources can be deployed and leveraged to overcome the OT security skills gap: Easily deploy the Edge agent and/or deploy assessment teams with carry-on flyaway kits to conduct FRCS discovery and assessments. Improve time-to-secure FRCS, multiply the benefit of existing expertise without waiting for training or added personnel, recommend and oversee remediations for faster security.

The Claroty Platform helps Federal agencies overcome obstacles in securing their FRCS, regardless of the magnitude of devices to protect - overall improving the security of their facilities and their missions. Implemented on OT networks and harnessing zero-trust principles, while enabling compliance with BODs, EOs, the RMF, the NDAA, and other Federal mandates,The Claroty Platform utilizes multiple discovery methods to automate asset inventories, detect exposures, and provide recommendations for network protection and micro-segmentation. When ready, The Platform supports continuous monitoring and threat detection efforts that build upon the FRCS security established.

To learn more about how to secure Federal FRCS with Claroty, reach out to speak to one of our experts today.

Stay in the know Get the Claroty Newsletter

Interested in learning about Claroty's Cybersecurity Solutions?

Claroty
LinkedIn Twitter YouTube Facebook