• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Bluetooth App Remote Ring with Charging Case for $16

    Bluetooth App Remote Ring with Charging Case for $16
  • 10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112

    10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112
  • Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234

    Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234
  • Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2

    Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2
  • Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

    Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

5 Things CISOs Need to Know About Securing OT Environments

Jun 28, 2023 by iHash Leave a Comment

operational technology

For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself. Traditionally, few industrial enterprises had dedicated cybersecurity leaders. Any security decisions that arose fell to the plant and factory managers, who are highly skilled technical experts in other areas but often lack cybersecurity training or knowledge.

In more recent years, an uptick in cyberattacks against industrial facilities and the trend of IT/OT convergence driven by Industry 4.0 have highlighted the vacuum of ownership around OT security. According to a new Fortinet report, most organizations are looking to Chief Information Security Officers (CISOs) to solve the problem.

Fortunately, CISOs are no strangers to change or difficult challenges. The position itself is less than 20 years old, yet in those two decades CISOs have navigated some of the most disruptive cybersecurity events that were truly watershed moments in technology.

Still, most CISOs have made their mark securing IT environments — and IT security strategies and tools rarely translate to an OT context. While the soft skills of collaboration and team-building will certainly help CISOs as they bring the factory floor into their realm of responsibility, they must also make a concentrated effort to understand the OT landscape’s unique topography and distinctive security challenges.

Table of Contents

  • Safety over everything
  • Levels of segmentation
  • Downtime is not an option
  • All access is “remote” access
  • IT tools do not (always) work for OT
  • Soft skills are the keys to CISO success

Safety over everything

The CIA triad — Confidentiality, Integrity & Availability — is a key concept in cybersecurity. Critically, IT and OT prioritize the elements of the triad differently — although safety is always the common denominator.

operational technology
Image 1: The CIA triad of IT security is reversed in the OT world, where availability is the highest priority.
  • In IT, safety means that data is protected through confidentiality. People get hurt when their sensitive, private data is compromised. For the enterprise, securing data saves them from breaches, fines, and reputational damage.
  • In OT, safety means that cyber-physical systems are reliable and responsive. People get hurt when a blast furnace or an industrial boiler does not function properly. For the enterprise, availability keeps systems running on time down to the millisecond, which ensures productivity and profitability.

Somewhat ironically, the AIC triad of the OT world has resulted in systems and tools that prioritize physical safety but often come with few or no cybersecurity features at all. It will be the CISO’s responsibility to identify and implement security solutions that protect OT systems from cyberthreats without disrupting their operations.

Threat Hunting

Wondering how to protect your industrial operations from potential threats? This comprehensive report on I-SRA has the answers. Uncover the top challenges, including operational safety risks and Advanced Persistent Threats (APTs). Download the report today!

Levels of segmentation

In both OT and IT, segmentation limits the network’s attack surface. In OT, the Purdue Model serves as a framework for how and why systems can and should communicate with each other.

In a highly simplified nutshell, the Purdue Model comprises five layers.

  • Levels 4 and 5 are the outermost layers that include web and email servers, IT infrastructure, and users firewalling in remotely.
  • Levels 2 and 3 are the operational layers that operate the software and applications that run OT environments.
  • Levels 0 and 1 hold the devices, sensors, programmable logic controllers (PLCs), and distributed control systems (DCS) that do the actual work and must be protected from outside interference.

The purpose of these layers is to create both logical and physical separation between process levels. The closer you get to the cyber-physical operation of industrial systems like injectors, robotic arms, and industrial presses, the more checks and balances are in place to protect them.

While the concept of segmentation will not be new to CISOs, they will need to understand that the separation of zones is much stricter in OT environments and must be enforced at all times. Industrial enterprises adhere to the Purdue model or other similar frameworks to ensure safety and security and to meet many regulatory compliance mandates.

Downtime is not an option

In IT, downtime for upgrades and patches is no big deal, especially in a Software-as-a-Service (SaaS) world where new updates are released practically in real time.

Whether for safety or profit, OT systems are always up and running. They cannot be stopped or paused to download a new operating system or apply even a critical patch. Any process that requires downtime is simply a non-starter for the vast majority of OT systems. For this reason, CISOs should not be surprised to discover decades-old systems (likely running on software that reached its end-of-life date long ago) that still serve as a crucial piece of the operation.

The challenge facing CISOs will be to identify security controls that will not interrupt or interfere with delicate OT processes. The right solutions will “wrap” the existing OT infrastructure in a layer of security that protects critical processes without changing, complicating, or crowding them.

All access is “remote” access

Traditionally, OT systems have been protected through isolation. Now that organizations are connecting these environments to capitalize on Industry 4.0 or to allow easier access for contractors, all access must be monitored, controlled, and recorded.

  • The IT environment is a digital place where business happens. Business users conduct their work and systems exchange data all within this space, day in and day out. To put it another way, humans are intended to actively participate in and make changes to the IT environment.
  • OT systems and environments are built to run without human intervention — “set it and forget it.” Humans are meant to set them up and then let them run. Users do not remain logged into an OT environment all day the way business users would in an IT system.

In this context, anyone accessing the OT environment is effectively an outsider. Whether it is a vendor connecting remotely, a business user coming in through the IT network, or even an OT operator accessing the environment on-site, every connection comes from the outside. Recognizing this key point will help CISOs to understand that industrial secure remote access (I-SRA) tools should be used for all access scenarios, not only those that IT would consider to be “remote.”

IT tools do not (always) work for OT

Tools designed for IT hardly ever translate to OT.

  • Basic functions like vulnerability scanning can interrupt OT processes and knock systems completely offline, and most devices do not have enough CPU/RAM to support endpoint security, anti-virus, or other agents.
  • Most IT tools route traffic through the cloud. In OT, this can compromise availability and cannot support the numerous unconnected components common to OT environments.
  • The life cycles of IT tools are typically much shorter than the life cycles of OT devices. Due to the always-up nature of OT environments, any tool that needs frequent patching, updates, or downtime is not applicable.

Forcing IT-designed tools into OT environments only adds complexity without addressing the fundamental security requirements and priorities of these environments. The sooner a CISO realizes that OT systems deserve security solutions designed for their distinctive needs, the faster they will be on their way to implementing the best tools and policies.

Soft skills are the keys to CISO success

Given that most cybersecurity leaders currently tend to come from IT security roles, it makes sense that many CISOs will have a (perhaps unconscious) bias toward IT philosophies, tools, and practices. To effectively secure OT environments, CISOs will need to become students again and lean on others to learn what they do not yet know.

The good news is that CISOs generally have a propensity to ask the right questions and seek support from the right experts while still pushing the envelope and demanding positive outcomes. At the end of the day, a CISO’s job is to lead people and teams of experts to accomplish the greater goal of securing the enterprise and enabling the business. Those willing to bridge the OT security divide through strong leadership and a willingness to learn should quickly find themselves on the road to success.

To learn about a real-world solution that can help CISOs better secure their OT environment, discover Cyolo.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: CISOs, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Environments, hacker news, hacking news, how to hack, information security, network security, ransomware malware, securing, software vulnerability, the hacker news

Special Offers

  • Bluetooth App Remote Ring with Charging Case for $16

    Bluetooth App Remote Ring with Charging Case for $16
  • 10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112

    10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112
  • Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234

    Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234
  • Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2

    Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2
  • Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

    Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Announcing Service Map: Troubleshoot With Context and Confidence

Announcing Service Map: Troubleshoot With Context and Confidence

Nov 28, 2023 By iHash

Rethinking How Data is Stored and Processed Brings Scale and Speed to Modern Data-Intensive Applications

Nov 28, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)

CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)

The major news in technology policy circles is this month’s release of the long-anticipated Executive Order (E.O.) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While E.O.s govern policy areas within the direct control of the U.S. government’s Executive Branch, they are important broadly because they inform industry best practices and […]

Apple unveils the top books of 2023 and a new Year in Review experience

November 28, 2023 UPDATE Apple unveils the top books :br(l)::br(xl):of 2023 and a new Year in Review experience Users can browse the top books and audiobooks of 2023 and explore personalized insights about the books they enjoyed this year Apple Books is the single destination for all the books and audiobooks readers love, featuring the ability to […]

Bluetooth App Remote Ring with Charging Case for $16

Expires November 29, 2123 07:59 PST Buy now and get 34% off KEY FEATURES Effortlessly navigate TikTok and other apps using this wireless remote control ring. Wanna enjoy hilarious TikTok videos and play your music without constantly tapping your screen? This ring lets you scroll, swipe, pause, and control volume. Use this ring as a […]

Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2

Expires February 15, 2123 23:59 PST Buy now and get 98% off KEY FEATURES NOTE: This is an affiliate offer – selections and payment will be made with our magazine partner, BlueDolphin Magazines. Make this holiday special — get up to 6 magazines for just $2 each, with a selection of 100+ bestselling titles to […]

Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

Expires June 30, 2123 19:38 PST Buy now and get 18% off KEY FEATURES Stay connected on the go with Wi-Fi + 4G unlocked capabilities. Upgrade your mobile computing experience with the refurbished 9th Gen Apple iPad. This premium tablet features an expansive 10.2″ Retina display with an 8MP iSight camera. With 64GB of storage […]

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

Nov 27, 2023NewsroomServer Security / Encryption A new study has demonstrated that it’s possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults that occur while the connection is being established. The Secure Shell (SSH) protocol is a method for securely transmitting […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT