Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • IT/OT

Cybersecurity and IT/OT convergence: How to prepare your team

  • Thomas Roth and Todd Majors
  • December 14, 2021
Figure 2: Complexity of design scales with size, third-party interfaces and types of equipment employed in the ICS. Courtesy: Hargrove Controls + Automation
Total
0
Shares
0
0
0
0

Cyberattacks have increased since the COVID-19 pandemic. While information technology (IT)/operational technology (OT) convergence remains a hot topic, the conversation about cybersecurity for industrial control systems (ICS) has fallen on deaf ears in some cases. The evolution of ICS over the past 20 years has migrated designs away from safer proprietary networks and protocols to introduce common IT architectures and components into the OT network. This migration has involved implementations ranging from fragmented installations never maintained, to smart and sophisticated systems that are often maintained and updated (see Figure 1).

In either case, the evolutionary shift of connecting the plant floor to the IT datacenter has created exposure points with the potential to disrupt an industrial operation or create safety incidents that lead to damage, injury or fatalities in the worst possible case. More often, companies are being held ransom. There are national security breaches and interruptions to the global supply chain, leading led to immeasurable consequences. Cybersecurity is a critical component for businesses of all sizes, from local manufacturers to global industrial companies. It is no longer just an IT department problem; it’s also a critical OT component of ICS design, regardless of scope or size.

Figure 1: Industrial control system (ICS) migration has involved implementations ranging from fragmented installations never maintained, to smart and sophisticated systems that are frequently maintained and updated. Courtesy: Hargrove Controls + Automation
Figure 1: Industrial control system (ICS) migration has involved implementations ranging from fragmented installations never maintained, to smart and sophisticated systems that are frequently maintained and updated. Courtesy: Hargrove Controls + Automation

Elements of effective cybersecurity

Effective cybersecurity in any network employs well designed standards, thoughtful planning and consistent implementation. But the most important component of a comprehensive strategy is building the value of cybersecurity into the culture of the organization. If every member of the organization believes in the importance of keeping all business systems safe, secure and robust, the cybersecurity implementations are more likely to be successful. This is true on the OT network, which is often the most vulnerable. Engineering departments prioritize uptime and safety, keeping processes running and product going out the door. Cybersecurity is a key component, but real-world problems on the plant floor often take precedence. Intangible potential threats from the outside are harder to internalize into the built-in risk registers we operate against every day.

This vulnerability can be a difficult obstacle to overcome. Larger companies with mature IT organizations tend to dictate “thou shalt comply” to all who connect to their network. This can lead to friction when IT/OT convergence is not properly implemented. When IT and OT systems are interconnected on IT-owned equipment, it can wreak havoc on production environment. If system cybersecurity updates are deployed by an IT department without proper evaluation against the ICS, this can prevent machine communication and shut down production. When production is down, the number one focus becomes “how do I get my process back up and running safely?” Meanwhile, engineering must unravel what occurred to get systems back online and functioning.

Ideally, they will work with IT through this process to ensure they do not open themselves to cybersecurity vulnerabilities as they get their process back up and running, but this does not always happen. In another scenario, smaller companies may have their engineering department perform all IT and OT tasks. Production is the primary focus, and sometimes cybersecurity-related IT tasks fall behind. Then malware or ransomware infiltrates the network and production is not even possible.

In our new reality, cybersecurity has become a necessary mentality, skillset and investment for manufacturers of all sizes and industries. However, in the rush to implement secure networks, manage access control and shield industrial access, many companies are not prepared for the impact of cybersecurity on IT/OT convergence. Taking time to understand the impact of IT security on OT assets is necessary to ensure the most secure and usable cybersecurity implementations. Education, understanding and setting the proper expectations are essential to a successful deployment. These activities help transform the team’s mindset by placing cybersecurity a close second to safety as they work to get their processes restored.

Working with operational teams across a range of industries, we often see network segmentation and access control tend to have the most operational impact. These areas affect not just which devices can communicate between each other, but also who can use those devices.

Network segmentation

Before the adaptation of IT-networked components in the ICS world, control networks were proprietary and often vendor-specific. Network segmentation was a virtue of the limited interoperability between different network types and protocols, as well as the ability to design physical separation of systems. These types of networks were relatively secure with limited exploit potential.

Modern ICS based on Ethernet network designs are wide open out of the box. The unmanaged nature of this kind of network leaves major cybersecurity gaps. Without security measures in place, the environment is vulnerable and significantly increases risk for uncontrolled access to critical system components.

By design, most network hardware can be configured for proper network segmentation to limit network access. By securing the network perimeter, we can limit the access coming in or out of the plant floor. And by segmenting the network, we can prevent devices on the plant floor from accessing other systems. This is a foundational tenet of the defense-in-depth strategy where multiple layers of protection are installed to limit an attacker’s ability to access the system. Does all this sound complicated? It’s not when you engage the right people who understand how to implement network segmentation on OT systems.

While the ideology has been around for a long time, the implementation in a modern ICS can be intricate. Systems integrators specialize in designing these controls early in the project lifecycle. Complexity of design scales with size, third-party interfaces and types of equipment employed in the ICS (see Figure 2). The typical plant engineer focused on process or machine uptime and optimization does not have the skillset to implement and maintain this system. This results in additional manpower for the end user — a place where a system integrator can help. Troubleshooting this system requires the right skillset: Significant IT knowledge in an OT world.

Figure 2: Complexity of design scales with size, third-party interfaces and types of equipment employed in the ICS. Courtesy: Hargrove Controls + Automation
Figure 2: Complexity of design scales with size, third-party interfaces and types of equipment employed in the ICS. Courtesy: Hargrove Controls + Automation

Access control

Process control networks that enable the plant floor to work together can expose control systems to threats from more than just the network. Access control is now of primary concern for operators and system integrators as many control system assets are accessible from any location on the process control network. While network access capabilities provide huge benefits, they come with the need to implement secure access control for all involved systems.

For plant operators, this can mean noticeable changes to the operating procedures used by plant personnel. Easy passwords and post-it notes stuck under keyboards allow unauthorized users to put plant operations and uptime at risk, trading short-term convenience for long term security. Generic administrator and engineering accounts lack the security and accountability of named user accounts. These oversights allow outside attackers an easy foothold into the ICS and automation devices it controls.

The most common access control system is Microsoft’s Active Directory. Active Directory is a bedrock of enterprise access control and user management schemas. When implemented properly, it is a secure way to manage users and permissions across the plant floor. Most control systems have native integration with Active Directory, providing a single secure, centralized location to manage users. System integrators can work with teams to implement Active Directory in alignment with the way the plant operates.

Consider this

As control systems have continued to evolve, the infrastructure required to support them has grown in step. Commercial off-the-shelf (COTS) IT infrastructure provides improved capabilities and a support base of skilled personnel capable of maintenance and implementation. Just as we have adjusted to the inclusion of technology in our daily lives, we must adjust to the inclusion of technology on the plant floor. Most users would agree rapid communication across the plant floor, gathering data from all aspects of the manufacturing system and centralizing process control, far outweigh the risks. However, we must understand and reduce those risks to protect the safety and data of our operations. Working closely with subject matter experts and setting the proper expectations lay groundwork for a successful journey through the impact of cybersecurity on IT/OT convergence.

As you work through process control network design and begin to see separate domains of communication, ask how this will affect operational personnel. Do they know which systems are able to communicate with each other? Is their understanding when they’re unable to reach a device or server the network is broken? Or is this operating as designed? Setting these expectations provides a sense of understanding and allows operations personnel to take ownership of the systems relying on this infrastructure.

Hargrove Controls + Automation is a member of the Control System Integrators Association (CSIA).

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Thomas Roth and Todd Majors

Thomas Roth, CISSP is the integrated solutions industry leader at Hargrove Controls + Automation. Todd Majors, PE is the industry engineering leader at Hargrove Controls + Automation.

Related Topics
  • CFE Content
  • Featured
Previous Article
An oil pump jack
  • Threats & Vulnerabilities

Throwback Attack: Hackers take advantage of the holidays to hit oil giant Saudi Aramco

  • Gary Cohen
  • December 13, 2021
Read More
Next Article
Courtesy: Sealevel Systems, Inc.
  • Strategies

Convergence or overlap? Understanding the IT/OT relationship

  • Katherine Elrod
  • December 16, 2021
Read More
You May Also Like
Read More

Protecting Critical Infrastructure eBook

Courtesy: Bundy Group
Read More

Cybersecurity mergers and acquisitions and capital markets update

Read More

Webcast: How to Protect Against Supply Chain Attacks

Courtesy of: Louisiana State University
Read More

Taking a ‘hands-on’ approach to smartphone identity verification

Courtesy: Applied Control Engineering Inc.
Read More

New funding will help University of Arizona grow the cybersecurity workforce

Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
Read More

Immune to hacks: Inoculating deep neural networks to thwart attacks

Read More

Introduction to ICS security fundamentals

Courtesy: CFE Media and Technology
Read More

NSF award will help IUPUI train, increase diversity of next wave of cybersecurity engineers

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT