2022 ICS Advisory Report
Download the 2022 ICS Advisory Report to uncover our key findings and predictions for what's to come.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Last week Verve released its annual review of the ICS Advisories. You can find the complete report here. 2022 was another year of increase in the number of ICS Advisories released by CISA. It also was the year that the ICS-CERT faded into the history books as the distributor of the advisories, replaced by the CISA brand.
Why dive into the ICS Advisories? ICS Advisories provide public awareness of vulnerabilities and risks to software and hardware that comprise industrial control systems. The United States Critical Infrastructure and Cyber Security Administration (CISA) reviews and approves these notices. They provide operators with important context about the risks to systems and potential remediation or mitigation steps to reduce or eliminate those risks. By reviewing them and following their recommendations, operators can improve their chances of defending against attacks on their most critical infrastructure.
As providers of vulnerability management software and services, analyzing the advisories in detail allows us to support our clients in identifying, prioritizing, and remediating or mitigating the risks disclosed therein. As operators, analysis of the advisories supports the development of appropriate security strategies for their environments based on real-world risks.
Before we summarize the findings from analyzing all of the advisories, it is important to recognize that there are some consistent recommendations on how to address these risks, which all industrial operators can follow. And some of these fundamentals are critical to effectively leverage these advisories.
First, a key requirement to effectively using the ICS Advisories is having a comprehensive and accurate asset inventory of all firmware versions of all embedded devices as well as full application software inventories on HMIs, servers, workstations, etc. Verve has been deploying the Verve Security Center for fifteen years across different OEM brands and industrial environments. This endpoint solution gathers this necessary detailed inventory – through backplanes of PLCs, down to serially connected firmware versions, full application inventories on HMIs, workstations, etc. This is fundamental to effective ICS advisory vulnerability management.
Second, CISA has a set of common OT security fundamentals, as shown in their graphic below.
These eight foundational elements grow out of the threats that CISA observes every day within the world’s critical infrastructure. They cover networking, endpoint, physical security, etc. As we review the ICS advisory mitigation recommendations, they tend to repeat these core recommendations. See below for the recommendations on the Industroyer2 malware seen in Ukraine in 2022
As you can see, many of these recommendations are part of the components of CISA’s core recommendations.
Third, while the number of advisories is growing every year, in our experience doing hundreds of site-level technology-enabled assessments, the VAST majority of vulnerabilities are actually in the Operating Systems and traditional IT applications sitting on the Windows, Unix and Linux servers, workstations, HMIs, etc. “Branded ICS vulnerabilities” such as OT:ICEFALL, Pipedream/Industroyer2, etc., are certainly important. However, these can distract from where the real weight of the risk is, i.e., in those unmanaged OS-based devices. Organizations need to avoid the “whack-a-mole” of chasing the biggest press release and keep an eye on continuously improving the core fundamentals.
The reason for highlighting these core elements is that regardless of whether your environments contain the specific devices or software covered by these advisories, there are a set of consistent recommendations for how to secure OT environments.
Now as we dive down into the individual ICS advisories, the following are some of the key findings from the 2022 review.
The reality is that the number of ICS advisories is going to increase year after year as more researchers dive into these products that were not designed with security in mind. One could argue that there are “zero-day” flaws in most legacy devices. The researchers are regularly uncovering those which is helping raise awareness of the need for action to remediate these risks.
It will be critical to maintain an accurate view of these new advisories and be able to match that to your organization’s inventory. But beyond that, organizations need to continue to expand their investments in the foundational or “hygiene” elements of vulnerability management on OS’s, hardening configurations, user & account management, network protections, etc.
Download the 2022 ICS Advisory Report to uncover our key findings and predictions for what's to come.
Learn MoreLearn about the current ICS vulnerability landscape, where to focus your energy, and why ICS vulnerability management matters.
Learn MoreOT ransomware attacks are on the rise. Learn proven strategies to protect your industrial systems, minimize downtime, and recover quickly.
Learn More