Operating Technology Security Issues Are Increasing

Operational Technology (OT) and Industrial Control Systems (ICS) have become more and more vulnerable to cyber attacks. 

As more cyber-physical manufacturing systems become connected, accessibility to these networks from the Internet and the cloud requires defenders to have timely, useful vulnerability information to inform risk decisions. 

OT cyber security references the software, hardware, practices, personnel, and services deployed to protect operational technology infrastructure, people, and data. As data collection and analysis become more important and as IT and OT converge to enable “big data” initiatives, it has become necessary to reassess cyber security best practices for protecting OT. 

Industrial Control System (ICS) security is defined as the protection of industrial control systems from threats from cyber attackers. It is often referred to as OT security or security. It includes a wide range of practices including asset inventory & detection and vulnerability management.

ICS (or ) Security is growing in importance as cyber attacks increasingly focus on physical processes for either ransom or to cause harm to critical production systems.

Attacks such as those at the Oldsmar water treatment plant, the various ransomware attacks on the vaccine supply chain, and the more extensive threats to the Ukrainian and US power grids and oil refineries in the Middle East generate greater worry for boards, governments, and operators of industrial organisations.

There was a significant increase in ICS vulnerabilities during the second half  of 2021, with a 25% increase from the previous six months. 50% of vulnerabilities reported in the four year period were disclosed by third-party companies, and a majority of these were discovered by researchers at cybersecurity companies. This saw them shift their focus to include ICS alongside IT and IoT security research.

Non-OT products made up 34% of ICS vulnerabilities reported in 2021, and that indicates a trend of businesses merging OT, IT and IoT under a single security umbrella.

The experts at ICS security firm Claroty suggest that calling a world devoid of distinctions between operational tech, informational tech and Internet of things devices the “extended Internet of things” (XIoT), “an umbrella term that captures the cyber-physical systems critical to our lives.”

The risks associated with connecting OT, ICS and IoT networks to Internet-facing systems go beyond devices and endpoints. 

  • 87% of all ICS vulnerabilities reported in 2H 2021 were considered low complexity, meaning an attacker doesn’t need any special conditions and can expect repeated success.
  • 63% of vulnerabilities disclosed in the same timeframe could be executed remotely, and 53% gave attackers the ability to remotely execute code.

The recommendation is for organisations to segment the network. “Network segmentation is the top step, and should be a top consideration for defenders ahead of other options on our list,” say Claroty.

Organisations should configure virtual zones so they can be easily managed remotely, give zones specific policies tailored to the specific needs of the users in that zone and be sure they reserve the ability to inspect traffic, including OT protocols.

Claroty / Team82:       Mission Secure:     I-HLS:     Security Brief:      ZDNet:      Verve Industrial:

You Might Also Read: 

The Importance Of Securing OT Platforms:

 

« Only A Few Employees Cause The Majority Of Breaches
Conti Operates Like A Sophisticated Corporation »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.