5 Steps to Remove A Remote Desktop Vulnerability From OT Endpoints
Tackling cyber security risk in the form of remote desktop vulnerability in five easy steps.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
The world as we know it has changed in the last few months. Companies and nonessential workers switched to a remote work structure without taking time to determine how such a feat should be accomplished. A global pandemic is not typically something industrial organizations planned for when setting up network infrastructure and access.
Putting aside the technical aspects of securely setting up remote access, companies must also determine how to selectively setup remote access for users based on job function. Asking Who, What, When, Where and How will help you create an effective remote access strategy.
Asking this question may result in a generic answer of “Everyone, now quit bothering me,” but that would be unwise. Remote access should be treated as an insecure connection, and the more insecure connections into a network, the greater the risk of an attack.
Remote access should be granted on an as-needed basis:
It is also important to consider contractors and third-parties who also require access:
Before a remote access solution can be securely implemented, determining access, roles, and identity management lays the groundwork for the rest of the process. The “who” is the foundation that will drive the outcomes of what these users need access to and how that will be accomplished. Think of the “who” as the keystone of an arch. Without the keystone, the rest of the arch will crumble.
Determining the company assets users have access to can become a complicated and time-consuming task.
It is important to put restrictions in place to limit the defined “who’s” and the “what’s” that access applications and assets while preventing direct access – even within your networks. OT environments are often “soft” within their perimeters, and it will be your security team’s worst nightmare if something gets loose inside.
This question is commonly overlooked. Contrary to popular beliefs, every user will not need access 24/7/365:
It is also essential to understand how time restrictions keep your infrastructure stable. In the OT world, there is a common mantra: “No changes on Fridays”. No one wants to work over the weekend to fix a problem created by a user or a change. Time limits reduce the probability of unintended changes that could cause emergency work or system access outages.
However, in the case of an emergency, it’s important to have an emergency authorization procedure to fall back on.
This is straight-forward: Users should only access company assets remotely from other company owned assets, and through authorized means (e.g., no rogue access points or technology such as TeamViewer):
There is, however, a caveat to this: Many companies have contractors that need remote access and do so from their systems only. In this case, additional restrictions and endpoint monitoring should be applied to these users and their systems (even when onsite and not remote).
Regardless of your choice of secure network communications (e.g., IPsec VPNs), many remote access clients or portals verify that a remote users’ computer meets specific security requirements. For example, connection may only be attempted after determining if the endpoint has up-to-date antivirus signatures and the operating system is fully patched. Is a good idea to implement policy pre-requisite checks for any user that needs access from a non-company computer.
Determining how users gain access ties everything together and is a critical step for enabling secure remote connectivity. This is a time-consuming task, but there are several important components to consider. So, let’s review what we have learned so far:
Now creating a remote connection to a site via a VPN is old news, but for the purposes of securing remote systems, even typical enterprise Information Technologies (IT) such as endpoint controls, remote access portals (e.g., Citrix) and Multi-Factor Authentication (MFA) should be used where technically feasible. In fact, MFA should be the de facto standard with all remote access when ensuring the user authenticating is actually that person, and not some malicious entity attempting to gain access.
Often there are many low-cost solutions and sometimes nearly free (as they are already present within the organization) options, but the whole idea is to:
Another highly recommended option is to use a remote access portal as part of a layered remote security architecture. This can be an important component when building secure remote access solutions because traditionally (and insecurely) users might only connect only using a VPN and then freely roam around. It might be an economical solution, but it is very insecure and costly if an attack occurs.
At the bare minimum:
For the third point in that list, the best solution is to use something like a remote access portal. There are countless solutions on the market that can fit any budget.
To ensure secure connectivity of your critical process assets:
Applying the who, what, where, why, and how to your remote access solution ensures a secure remote access setup. It is important to work through each step methodically and to not be afraid to restrict unnecessary access.
Configuring remote access is a journey. It requires fine tuning , but it is well worth it to protect your assets from unauthorized access and expensive downtime during tough economic conditions – especially when a variety of high-profile malware and attacks often originate from network access and remote connectivity technologies.
And don’t forget, “break-glass” accounts for “emergencies” may sound tempting in an effort to appease engineers and OT, a better and mutually aggregable solution can be found. It’s not worth the risk of an account compromise.
Tackling cyber security risk in the form of remote desktop vulnerability in five easy steps.
Learn MoreGain OT security maturity with remote work and limited physical plant access. Learn how to rapidly enable remote security deployment and management in ICS.
Learn MoreA programmatic industrial cyber security approach ensures the tools and procedures applied in the time of crisis are foundational for a long-term solution.
Learn More