Page 18 - Gi June/July 2019
P. 18

critical infrastructure – protecting essential systems from cyber threats


                 recently told me: “Business has made   focus only on OT vulnerabilities. IT
                 the decision to implement new OT and   and OT convergence means that
                 we’ve got to catch up and secure it. The   both ICS and IT vulnerabilities
                 business arguments are too compelling.   can be exploited to attack critical
                 It’s about enabling business leaders to   infrastructure, as we have seen.
                 do what they want to do.”          Clear and complete visibility of
                   However, it’s not easy to balance   both IT and OT systems viewed
                 the need to remediate security threats   together through a single pane
                 against the impact to the organisation,   of glass is the only way to gain a
                 as we’ll see:                    holistic view on risks.
                                                    To illustrate the scale of the
                   OT environments tend to be structured   problem, in the first four
                 around legacy technologies that were not   months of 2019, the
                 designed with security in mind   Industrial Control System-
                 Often they were secured via isolating   Computer Emergency
                 initiatives, such as air-gapping.   Response Team (ICS-CERT)
                 As modern plants increasingly    issued 74 alerts describing
                 connect machines, devices, sensors,   vulnerabilities in industrial
                 thermostats, etc., to the internet, the   control systems.
                 security blanket of a fully air-gapped OT   These vulnerabilities
                 environment is eradicated.       apply to products from
                                                  leading control system
                   Most organisations that rely on   manufacturers including
                 OT have a zero-tolerance policy to   ABB, AVEVA, Mitsubishi,
                 downtime given the business criticality   Omron, Rockwell,
                 of the systems                   Schneider Electric,
                 For example, an energy provider may   Siemens and Yokogawa.
                 operate 15 or 20 different sites. It’s   That quantity is small
                 not a simple, or even quick, process to   compared to the 2,817 IT
                 shut down a treatment system to fix a   vulnerabilities discovered
                 vulnerability in a programmable logic   during the same period.
                 controller (PLC), even if we were to   This velocity may or may
                 ignore the impact it would have further   not continue throughout the
                 in the process. That said, could the   year, but even if it decreases by half,
                 business afford to risk a threat actor   the number is challenging to manage   using different tools, different KPIs and
                 exploiting the vulnerability that could   without an automated process.  different policies to their IT security
                 damage the plant or even threaten life?                           programs will not make it in today’s
                                                                                   threat landscape.
                   Security solutions designed for IT   Awareness among IT and OT   Traditional ways of securing systems
                 networks don’t always transfer into OT   professionals of the increased   through Excel spreadsheets or tribal
                 environments                     threat landscape is essential    knowledge are quite simply insufficient
                 For example, a poorly timed security   if organisations are going to   for securing organisations against the
                 scan, which would probably go                                     modern cyber threat landscape.
                 unnoticed in an IT network, could have   reduce their cyber risk   It is not only those on the ground who
                 a devastating impact in a sensitive OT                            need awareness of the risks facing OT
                 environment. It could potentially knock                           environments; the C-suite and board of
                 out the gauge on a pipeline, cause a   Insecurity is not an option  directors also need to understand the
                 drill to malfunction, or even take the   As with anything, acceptance is the   cyber threats their organisation faces.
                 whole plant offline. To solve this issue,   starting point. Awareness among IT and   Effectively securing connected
                 organisations can employ passive   OT professionals of the increased threat   OT and IT environments is a work
                 monitoring that allows them to watch   landscape is essential if organisations   in progress, with progress being the
                 and listen, profiling the network and   are going to reduce their cyber risk.   operative word. It’s not something that
                 devices connected to it. This allows   While it’s a challenging task, there   will be fixed overnight.
                 them to understand what they have and   are steps organisations can take. The   As digital transformation continues
                 where it’s potentially exposed, so they   first is clear and complete visibility of   to result in the convergence of OT/IT
                 can identify vulnerabilities without   the attack surface to identify, access and   environments, industries that rely on
                 impacting system functionality.  mitigate cyber risk. This includes both   OT are acknowledging the challenges
                                                  IT and OT systems.               and working towards solving the
                   While vulnerabilities are discovered   Once that’s accomplished, the next   cybersecurity issues the industry
                 in OT technology, there have been   step is determining what is important   is facing.
                 occasions where a patch to fix the flaw   to the organisation’s ability to function
                 is not forthcoming               and whether it is vulnerable to attack.    Tenable Inc. is the cyber exposure
                 If you cannot patch, then what else can   None of this can happen without   company. Over 27,000 organizations
                 you do to secure your environment?   integrating IT and OT security efforts.   around the globe rely on Tenable to
                   Staff responsible for OT security   The reality is that organisations with   understand and reduce cyber risk. For more
                 cannot afford to be blinkered and   separate, siloed OT security programs,   information, visit www.tenable.com



          18



        ProtectingAgainstCyberAttacks.indd   3                                                                    16/05/2019   14:20
   13   14   15   16   17   18   19   20   21   22   23