3 Benefits of a 360-Degree Vulnerability Assessment
Defending critical infrastructure requires 360-degree visibility into asset and network vulnerabilities through a vulnerability assessment.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Did we just go back into pre-Stuxnet times?
It sounds ominous to try and “stop malicious cyber activity against connected operational technology”, but is the messaging correct? It’s certainly well-meaning and aligned with the ideals of OT/ICS, but at this point – private industry (which represents most of the US critical and manufacturing sectors) has been moving for nearly FORTY years towards connectivity and data in order to complete its mission. It’s a bit of a too little too late notice, and the advice has consequences.
So let’s break apart the executive summary first:
A significant shift in how operational technologies (OT) are viewed, evaluated, and secured within the U.S. is needed to prevent malicious cyber actors (MCA) from executing successful, and potentially damaging, cyber effects. As OT components continue being connected to information technology (IT), IT exploitation increasingly can serve as a pivot to OT destructive effects. Recent adversarial exploitation of IT management software and its supply chain has resulted in publicly documented impacts across the U.S. Government (USG) and the Defense Industrial Base (DIB). Malicious cyber activities directed at OT also continue to threaten these networks.
Well, this reads fairly well, and is an accurate account of where we are today.
The majority of threats are delivered through poorly separated and protected IT networks, and the bad guys wander in likely through that, or IT systems providing connectivity to the OT segments. However, the specific mention of saying recent adversarial exploitation of IT management software and supply chain should be broadened – to include OT management software and supply chain. Tons of kits now use open-source components, embedded operating systems etc. – and as we know, it’s adulterated, abandoned, and left insecure for periods of at least 5-10 years. IT-only isn’t inclusive enough if you want to protect the grid from being backdoored — or from product developers using the same code within the IT supply chain.
The second paragraph of the executive summary:
This paradigm shift applies to the stagnant OT assets and control systems installed and used throughout the USG and DIB, many of which are past end-of-life and operated without sufficient resources. To evaluate and improve the cybersecurity of connected OT and control systems, NSA recommends that National Security System (NSS), Department of Defense (DoD), and DIB network owners perform a detailed risk analysis prior to creating cross-domain connections (e.g., IT-to-OT, Internet-to-OT) and for all currently connected OT.
Seems likely again, and one would have thought this was mandated or standard practice, and EoL assets in OT should not be a new concern for any of those branches of government/military. And the third paragraph?
Following the steps below will enable OT owners and administrators to evaluate risks against their systems and use that knowledge to guide network changes with current resources to realistically monitor and detect malicious activity. Without direct action to harden OT networks and control systems against vulnerabilities introduced through IT and business network intrusions, OT system owners and operators will remain at indefensible levels of risk.
Risk management in the private sector is tricky. To date – there has been little incentive to really remediate the risks, downtime is expensive, commitment has been rare, but also due to the fact that asset owners have had to absorb the risk passed onto them by the OEMs and vendors (also mostly US-owned) who created the products in the first place; I admit revenue vs. time vs. effort is a fundamental feature of capitalism, but it has gone unchecked in ICS/OT.
And while it is true that asset owners should have the resources, technology for anomaly detection – most private industry is resource-strapped, and needs IT-esque systems such as ERP, billing, and connected technology because they aim to be profitable and competitive. Isolation is the last resort for most organizations today after they have spent copious amounts of money trying to modernize or go digital.
To end this review – the last paragraph was likely the most representative of sound thinking and should have been moved to the initial executive summary. Prioritizing risk, by mindful of remote access risks, IT/OT interconnectivity etc.
The key to an efficient and effective OT security program is to take a comprehensive risk view of the assets and the process, something we call 360-degree risk management. 360-degree risk management means the ability to aggregate the risk information about an asset and its network and process. Then to prioritize which risks to which assets are most critical. Companies can waste significant resources trying to tackle every CVE, especially when many if the OT systems cannot easily be updated given the legacy environments. It is critical that OT security looks at things such as true network device configuration, not just what’s on paper in the design, patch status, A/V status, backup status, risky accounts and password settings, etc. To really secure OT, organizations need to apply core system management functions.
Defending critical infrastructure requires 360-degree visibility into asset and network vulnerabilities through a vulnerability assessment.
Learn MoreA vulnerability review for 2019/2020. This document was performed as a summary piece highlighting the last two years of ICS advisories in an in-depth way.
Learn MoreCVEs and advisories should not be scary – here are the basics to get anyone started.
Learn More