Anomaly Detection: Don’t Be Passive About OT Security
Learn why OT systems management is a better solution than passive anomaly detection for managing OT security environments.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
In Verve’s 30 years of experience in OT/ICS cyber security and reliability services, we often hear a debate about the best way to address cyber security risks. You hear about new vulnerabilities in ICS devices (40% more than last year). You hear about new threat actors targeting critical infrastructure. You hear about offerings from OT/ICS cyber security vendors.
And we’re asked questions such as:
Their real question they’re asking: Where should we begin in our ICS/OT cyber security program?
OT/ICS security teams hear different perspectives from different groups and are often left confused as to the best place to begin.
The United States Cybersecurity & Infrastructure and Security Agency (CISA) recommends defense in depth as a way to protect OT/ICS environments. This includes items from policies & procedures to network, access, and endpoint protection. Through all of their advisories for new vulnerabilities and new threat actors, CISA is consistent in its advice. The good news is there are a set of programmatic things you can do to protect your organization.
Improving the reliability and security of ICS networks, Verve has successfully deployed in thousands of environments and conducted hundreds of site assessments of cybersecurity on OT systems. These deployments have called attention to how differently every organization approached their cybersecurity program, but it’s become evident the most successful programs start the same way.
Conducting a robust vulnerability assessment of the ICS/OT attack surface is key to getting your program right. While there is a temptation is to jump in to “do something” to demonstrate progress, organizations tend to neglect the importance of first assessing the situation because of how long it can take. While these companies jump to take immediate actions they know they will eventually need (such as network segmentation or threat detection), this is not the most effective or efficient approach. And may end up costing you in the long run.
For these reasons, we recommend beginning with a Technology Enabled Vulnerability Assessment (TEVA). A TEVA gathers detailed visibility of the risks of the environment and prioritizes those risks. Unlike a traditional vulnerability assessment, it uses technology that gathers detailed asset inventory directly from the endpoints. This results in prioritizing the risks and remediations to gain the greatest maintainable security in the least time and cost.
Benefits of a technology-enabled assessment for endpoint-enabled security:
The tech-enabled vulnerability assessment is defined by a 360-degree view of the most significant threats to the environment are, such as …is the biggest threat the communication at layer1 between two PLCs or between an HMI at level 2 and a PLC at level 1, is the biggest threat that an attacker will reach the IT system and ransomware will spread into OT because it’s connected to IT, is it that a targeted attacker will find a way through the perimeter and run malware or gain privileged access to HMIs and servers to conduct the rest of the campaign, is it that they will use that access to take advantage of a vulnerability in a PLC or controller to cause a DOS or other impact on that device?
It also determines what the organization’s starting point is, whether IT/OT separation exists, is it well configured, do you have significant software vulnerabilities, etc. Then consider what is most timely to execute: How long does a particular project take? What enablers are required to do the first thing?
With this recommendation, we often get the following questions:
We are in no way recommending that an organization ignore its perimeter security. In fact, when we use the TEVA, we find that the most important effort is to improve the perimeter network security. However, the TEVA provides a strategy of the best way to achieve this. For instance, an organization may already have a design that provides for perimeter security, but it is in the configuration of the network protection devices and the evolution of things such as dual NICs, remote access, etc. which degrade the designed security posture. On the other hand, some organizations (or even sites within an organization) may have no clear process control network and their OT networks connect to various connections of the business network and require comprehensive hardware deployment and movement of system connections to achieve the perimeter protection. A fact-based perspective on the actual devices, how they connect, and the rules in the various network devices is critical to establishing the roadmap.
To paraphrase Mark Twain – the report of the death of endpoint protection in OT has been grossly exaggerated. The reality is there is a significant amount of endpoint protection possible in OT/ICS devices. Moreover, many of these can be accomplished more efficiently than trying to deploy the necessary infrastructure (spans/taps/collectors/etc.) to conduct packet analysis for network anomaly detection. In most OT/ICS environments, our 360-degree TEVA analysis discovers hundreds or thousands of software vulnerabilities, missing patches, users and accounts that are insecurely managed, insecure or unnecessary software, insecure configuration settings, weak firewall ACLs, out-of-date anti-virus signatures, etc.
Each of these offers ways to rapidly improve the security of the environment, with no need for additional hardware or infrastructure. Patching, for instance, is NOT impossible. Many of these patches are already approved by vendors and in many cases, an “80-20” rule can be applied whereby by applying just a handful of patches, the organization can address 80% of their vulnerabilities. Similarly, by focusing on those more critical devices – domain controllers, servers, HMIs etc., a significant improvement in overall risk is possible. Further, by eliminating dormant or insecure accounts, changing default passwords, eliminating software that shouldn’t be on OT systems such as TeamViewer, hardening configuration settings, or even just tightening the ACLs in the existing network infrastructure, organizations can make rapid progress in securing their endpoints.
Many OEM vendors have approved Anti-virus solutions and, in most cases, the updated signatures are regularly approved. Furthermore, application whitelisting is a very effective form of OT/ICS endpoint protection that requires no signature updates. In fact, CISA has recommended in prior releases that effectively deployed whitelisting is the #1 protection for OT systems.
Although we understand the attractiveness of a manual/survey/questionnaire-based approach because it sounds less intrusive, the results are much less effective and efficient than when leveraging technology. TEVA advantages include:
The final question that often arises is “why should we use Verve”?
Our 30 years of experience means that our cybersecurity technology is OT/ICS-specific and has been proven to work in every different type of control system environment. It means that our services team has deep OT/ICS expertise to help ensure alignment between IT and OT, but also provide practical efficient results. It means that our clients deliver security rapidly at a lower cost than by using other providers or technologies.
There are three key differences to Verve’s approach:
Cost to security has three components: cost to prioritize risks, cost to remediate those risks, and cost to maintain the security over time. Verve’s approach delivers lower costs at each stage:
The primary alternative to Verve’s approach is the network anomaly detection tools on the market. Although these tools provide a specific security use case – i.e. detection of anomalous communication within the OT network – they do not provide the best PROTECTION to stop an attack. Verve’s solution approach not only provides protection at the network and endpoint level, but also detection at key points in the attack sequence to create responses using Verve to rapidly deter the attack with the “least disruptive response”. Protection and Detection, together at both the network and endpoint level:
ICS/OT security requires that our first mission, like doctors, is to do no harm. Any security solution needs to start with the foundation of operational resilience. Verve has been designing control systems across a range of industries for 30 years. As a result, our team of experts brings a deep understanding of these systems as well as the security knowledge necessary to protect them.
To a CISO trying to create IT-like security in OT, the challenge can be daunting. Scanning systems can cause them to crash. Deploying modern EDR creates challenges with cloud connectivity and false positives that can stop production. Control systems engineers are rightfully cautious to employ new software on a system that needs to run 24X7 on technology from the last century.
Verve’s team of OT/ICS security experts helps bridge this IT-OT divide, both with our technology that enables IT-like security in OT, safely, as well as our services that can be a single partner to help bring the organization through the various challenges of getting IT and OT to understand each others’ needs and challenges.
Our services team helps companies conduct assessments, design and deploy network segmentation strategies, deploy appropriate backup and restoration, ensure systems are patched appropriately, hardened, etc. We strongly believe that protecting OT/ICS environments requires a combination of technology and services that work together to achieve measurable results for our clients.
Learn why OT systems management is a better solution than passive anomaly detection for managing OT security environments.
Learn MoreHow endpoint OT security asset management improves a CISO’s ability to deliver measurable and rapid improvements to OT cybersecurity.
Learn MoreExplore various ICS topics through invited speakers while showcasing current capabilities available today.
Learn More