May 6th, 2024
Contributors: Anju Raj, Nimmy Susan Shaji, Filip Dimitrov
As operational technology becomes increasingly reliant on internet-facing systems, its cyber security risks have grown more severe and complex. While cyber security experts have been warning about these risks for years, the adoption of adequate measures has been relatively slow, resulting in numerous incidents affecting critical systems and infrastructure.
Here are the main five risks that jeopardize OT cyber security:
Network segmentation is a core practice to improve network efficiency and security. Yet, the Cyber Security and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) found that many OT environments had unknown or accidental network connections, which allowed outsiders to gain access.
The main goal of network segmentation is to prevent the spread of cyber threats throughout the network. Instead, if a security breach occurs, it will be contained, with virtual barriers preventing it from spreading laterally.
In OT environments, network segmentation must enable centralized, virtual separation without physical equipment relocation. Solutions should offer intuitive interfaces, allowing easy drag-and-drop zoning by personnel of any skill level without necessitating network re-engineering or causing downtime.
A recent report found that 90% of the world’s largest energy organizations experienced a vendor-related data breach. Today, OT organizations deal with hundreds of vendors, who also have hundreds of other vendors. This third-party ecosystem is very difficult to navigate, as a single vendor vulnerability can affect multiple layers of the supply chain.
To secure OT environments, organizations must develop and strictly enforce strong security policies, guarantees, and mandates for their third-party relationships. A neutral risk assessment is also necessary to provide an unbiased evaluation of a vendor’s security posture and practices. Lastly, organizations should limit the network access vendors have to only the resources necessary for that particular relationship.
OT personnel generally lack sufficient training regarding cyber threats and how attackers can exploit this ignorance to infiltrate and compromise critical infrastructure systems. Contrary to popular thought, sophisticated and highly technical exploits aren’t the main entry point for attackers. Instead, they rely on human error and social engineering attacks.
The positive thing about this is that equipping OT staff with the knowledge and skills to recognize phishing attempts and other social engineering tactics can significantly improve the organization’s security posture.
Security awareness training (SAT) is critical to bolstering cyber security’s human element. By providing regular, updated training sessions that cover cybercriminals’ latest tactics, organizations can create a proactive security culture.
Legacy systems are an integral part of most industrial control system (ICS) environments. These systems have a lifespan of 10 to 20 years, which is a very long time in the rapidly evolving world of technology. Since replacing them is costly and leads to disruption, they’re often kept in place. However, these aging systems have outdated hardware, software, and protocols.
Legacy systems are often incompatible with modern security solutions, requiring a unique approach to cyber security. Network segmentation, which we discussed in more detail above, is crucial to isolate legacy systems from the rest of the network. Organizations should also consider replacing these systems altogether, which would require evaluating pros and cons, including a cost-benefit analysis.
An incident response (IR) plan is a set of rules for detecting, responding to, and recovering from cyber incidents. Unfortunately, from what we’ve seen in several high-profile attacks on OT infrastructure, most organizations dealing with OT have inadequate IR plans. This is evident by how unprepared certain organizations looked when faced with a cyberattack, struggling to contain the breach effectively.
Creating an incident response plan is a serious undertaking. Organizations must clearly understand their operational and technological stack and identify ways to ensure business continuity in the face of cyber incidents. The plan should also include communication strategies for stakeholders and engagement with authorities.
Book a Demo
Get a guided demo of our courses, anti-phishing training, behavior assessments and managed services.