The Tipping Point for OT Cybersecurity

2023-03-22 02:42:38
关注

The Tipping Point for OT Cybersecurity
Illustration: © IoT For All

In a recovering post-pandemic world, interconnectivity and digitalization continue accelerating at an unprecedented pace. With advanced technology penetration and the interconnectedness of industrial devices, organizations are increasingly reliant on operational technology (OT) to keep their businesses running and competitive. Moreover, in many cases, these advancements have become key foundations driving new revenue streams. The next five years will be critical for industrial control systems (ICS) and OT cybersecurity. Driven by multiple factors, experts agree that a major ICS/OT cyber-attack is inevitable. Forrester analysts alarmingly have predicted that in 2023, 60 percent of all businesses will experience a major or minor OT security incident. The question is not if, but when a major ICS/OT attack will happen.

“With advanced technology penetration and the interconnectedness of industrial devices, organizations are increasingly reliant on operational technology (OT) to keep their businesses running and competitive.”

-Daniel Bren

Protecting Your Company

Taking a proactive approach to reducing risks for cyber-physical systems helps ensure that industrial manufacturing, critical, and smart infrastructure organizations maintain resilient operations. That is because a focus on reducing risks and vulnerabilities to ICS and OT cybersecurity will be far more effective than reacting after an anomaly has been detected or a security breach has occurred. By that time, the damage will already be done.

Key steps need to be taken in order to help keep your company’s operations resilient. Mainly, you need to utilize a risk-based approach to OT security and ensure that your cyber-physical systems regularly assess risks and reduce vulnerabilities to help prevent breaches that result in ransomware.

Risk-Based Approach to OT Security

The common risk-based approach to OT cybersecurity should have two elements:

  1. Identifying critical risks
  2. Making them a priority

Therefore, a risk-based approach requires skills in both risk assessment and reacting nimbly. Risk assessment skills involve several unique competencies, especially for OT security. A straightforward example is assessing an organization’s security posture, yet this crucial element is insufficient by itself.

The real challenge is correlating technical findings to their impact on the business — both financial and operational. So how do businesses assign a monetary value to each OT security finding and corresponding risk reductions they achieved by implementing different mitigations?

Driven by reality, regulatory agencies worldwide have started pushing for cyber risk governance. This requires businesses to remain up-to-date with regulatory changes. Most importantly, you need the ability to understand how compliance risks can arise from your company’s internal processes.

This includes new technology systems, third-party software and hardware solutions, and third-party service providers. Call to action – be ransomware ready. To safeguard your OT infrastructure and mitigate the risk of a cyber breach, you need to go beyond asset visibility. Let’s look at what you do to prepare for these potential threats and mature your organizational OT cybersecurity.

Three Key Steps

#1: Regular, Contextualized Assessments

You need to understand what assets are at risk in your business, and what potential damage scenarios would be if such assets were compromised.

#2: Enhance IT & OT Collaboration

One of the main challenges today is the collaborative need for IT security with on-site automation experts. Only through this collaboration can effective and efficient risk mitigation will be met. Using the proper native technology will not only automate the operation but also accelerate the maturity, hence, the preparedness.

#3: Prescriptive Mitigation

Due to the unique nature of the operational environment, many of the traditional IT-related practices (e.g., patching and non-safe scanning) are not relevant. Leveraging the power of cross-domain data analytics will enable you to automatically determine an optimal course of action.

By considering all relevant factors and available security controls, this type of analysis will not only yield recommendations for the next steps but also will provide the different practitioners with operational safe practical actions to mitigate risk.

After that enhanced risk assessment comes with the job of reacting to identified risks. As mentioned, being nimble is essential for this process to succeed. It also requires many specific abilities for the compliance program. First, the program will need the skill to implement the controls. Your organization needs the skills to validate and execute compensating controls.

To monitor progress and report compliance, the program will need evidence-based reporting dashboards and reports for internal progress, senior leadership regulators, business partners, and anyone else that your compliance program has thought through its regulatory and corporate compliance strategies.

Next Steps

Security automation is essential for operating technology safely and effectively. Cyber-physical systems are vulnerable and need to be protected. However, simply assessing vulnerabilities (asset vulnerability) or mapping assets (vulnerability mapping) is insufficient.

In order to make the best decisions about where to allocate resources for OT security, you also need to understand how effective your security controls are and how exploitable different assets are.

Only then can you make smart decisions about resource allocation to reduce critical risks. Have you designed a multi-phase plan for your OT security yet? Facing this coming reality with haste is of the utmost importance.

Tweet

Share

Share

Email

  • Connectivity
  • Cybersecurity
  • Data Analytics
  • IoT Platforms
  • IT and Security

  • Connectivity
  • Cybersecurity
  • Data Analytics
  • IoT Business Strategy
  • IoT Platforms

参考译文
OT网络安全的临界点
插图:© IoT For All 在疫情后复苏的世界中,互联互通与数字化正以前所未有的速度加速推进。随着先进技术的渗透和工业设备的互联,越来越多的组织依赖操作技术(OT)来维持业务的运行并保持竞争力。此外,在许多情况下,这些技术进步已经成为了推动新收入来源的关键基础。未来五年将是工业控制系统(ICS)及OT网络安全的关键时期。受多种因素驱动,专家一致认为,一场重大的ICS/OT网络攻击是不可避免的。Forrester分析师警告称,2023年,60%的企业都将经历一次重大或轻微的OT安全事件。问题不再是“是否会”发生,而是“什么时候”发生。 “随着先进技术的渗透和工业设备的互联,组织越来越依赖操作技术(OT)来维持业务的运行和竞争力。” ——Daniel Bren 保护你的公司 采取积极主动的方式降低网络物理系统的风险,有助于确保工业制造、关键基础设施和智能基础设施组织保持弹性运营。这是因为专注于降低ICS和OT网络安全的风险与漏洞,比在检测到异常或发生安全事件后才做出反应要有效得多。到了那个时候,损害已经造成。需要采取关键步骤,以帮助你的公司保持运营的弹性。 主要的是,你需要以基于风险的方式处理OT安全,并确保你的网络物理系统定期评估风险并减少漏洞,以防止导致勒索软件的入侵事件发生。 基于风险的OT安全方法 常见的基于风险的OT安全方法应包括两个要素:识别关键风险,并将其优先处理。因此,这种基于风险的方法要求在风险评估与灵活应对方面具备相关技能。风险评估技能涉及多种独特的专业能力,尤其是在OT安全领域。一个简单的例子是评估组织的安全态势,但这关键的元素本身是不够的。真正的挑战在于将技术发现与对业务的影响(无论是财务还是运营方面)联系起来。 那么,企业是如何为每个OT安全发现赋予经济价值,并衡量实施不同缓解措施所带来的风险降低呢?在现实推动下,全球的监管机构已经开始推动网络风险治理。这要求企业紧跟监管变化的步伐。最重要的是,你必须具备理解公司内部流程如何导致合规风险的能力。这包括新的技术系统、第三方软硬件解决方案以及第三方服务提供商。 行动号召——为勒索软件做好准备 为保护你的OT基础设施并降低网络入侵的风险,你需要超越资产可见性。让我们来看看你采取了哪些措施来应对这些潜在威胁,并提升你组织的OT安全能力。 三个关键步骤 #1:定期、情境化的评估 你需要了解哪些资产在你的业务中面临风险,以及如果这些资产被入侵,潜在的损失场景会是什么。 #2:增强IT与OT的协作 目前最大的挑战之一是IT安全与现场自动化专家之间的协作需求。只有通过这种协作,才能有效、高效地缓解风险。使用合适的原生技术不仅能够自动化操作,还能加速成熟度的提升,从而提高准备就绪度。 #3:指导性缓解措施 由于运营环境的独特性,许多传统的IT相关实践(例如打补丁和非安全扫描)并不适用。借助跨领域的数据分析力量,你可以自动确定最佳的应对方案。通过考虑所有相关因素和可用的安全控制,这种分析不仅会给出下一步的建议,还将为不同的技术人员提供操作上安全且实用的缓解措施。 在风险评估之后,就是应对识别出的风险的工作。如前所述,灵活性对于这一过程的成功至关重要。它还需要合规计划中许多具体的能力。首先,该计划需要具备实施控制措施的技能。你的组织需要具备验证和执行补偿控制的技能。为了监控进度并报告合规性,该计划需要基于证据的报告仪表板和报告,用于内部进展、高管领导、监管机构、业务合作伙伴,以及你合规计划已考虑的所有相关方的监管和企业合规策略。 下一步 安全自动化对于操作技术的安全和有效运行至关重要。网络物理系统易受攻击,需要保护。然而,仅仅评估漏洞(资产漏洞)或绘制资产(漏洞映射)是不够的。为了在OT安全方面合理分配资源,你还需要了解你的安全控制措施的有效性,以及不同资产被利用的可能性。只有这样,你才能做出明智的决策,以分配资源,降低关键风险。 你是否已经为你的OT安全设计了多阶段的计划?面对即将到来的现实,及时行动至关重要。 推文分享 邮件分享 连接性 网络安全 数据分析 IoT平台 IT与安全 连接性 网络安全 数据分析 IoT业务战略 IoT平台
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

全网吹爆的ChatGPT,对数字经济有何影响?

提取码
复制提取码
点击跳转至百度网盘