Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • IIoT & Cloud

Internet of vulnerable things: New industrial attack vectors

  • Michael Rothschild
  • August 30, 2020
Courtesy of CFE Media
Total
0
Shares
0
0
0
0

Learning Objectives

  • Industry 4.0 and IIoT have brought newfound efficiency and efficacy to industrial environments, but also an expanded the industrial attack surface.
  • With IT and OT convergence, attacks can expose an environment in more ways than ever before.
  • Industrial organizations require industrial-grade security, purpose-built to secure modern, converged environments.

The Fourth Industrial Revolution has brought innovation and advanced technology, but it has also made these systems increasingly vulnerable.

Before Industry 4.0, operating industrial devices required manual interference. In the example of critical infrastructure such as an oil pipeline, pumping stations with sensors were sprinkled across thousands of miles, keeping a read on operational health, including pressure and temperature monitoring. Previously, a staff member would be required to physically visit the sites to check data and make any critical adjustments.

With information technology (IT) and operations technology (OT) environments converging and the interconnection of Industrial Internet of Things (IIoT) and supervisory control and data acquisition (SCADA) systems, these sensors transmit data for real-time analysis and remote changes. While this has brought efficiency and efficacy, it is not without cyber risks.

This transmission of data exposes these converged IT and OT environments to a multitude of attack vectors from all directions. Even those choosing to “air gap” – or virtually separate IT and OT environments – still face cyber risks. It is imperative organizations understand the modern attack vectors threatening the industrial sector – especially those with critical infrastructure – and move to secure these environments.

External threats manifest in OT

Now that IT infrastructure, such as servers, routers, PCs and switches are connected through IIoT to OT infrastructure, such as programmable logic controllers (PLCs), distributed control systems (DCSs) and human-machine interfaces (HMIs), the attack surface has expanded. An attacker can now enter from IT and traverse to OT, often wreaking havoc in industrial environments including expensive and dangerous impacts to critical infrastructure.

Once an attacker is inside an OT environment, exploitation is easier because OT device commands are unencrypted. Even though industrial controllers are built for rugged environments, they don’t provide built-in security. The results can be disastrous if an attacker gains control of an industrial controller. Examples include creating dangerous pressure levels in oil or gas lines, power outages or damaged products from a production line. Downtime in the aftermath of an attack can result in hefty costs. Organizations need to be aware of blind spots and ensure their security teams have holistic visibility into assets and devices in converged environments.

Courtesy: Tenable

Analyzing insider threats

An organization’s own employees, subcontractors or partners also can cause an attack – whether intentionally or not. Many employees are granted elevated credentials to access sensitive assets and devices. With this level of authorization, a disgruntled employee can make catastrophic changes to interconnected devices. And this can have a domino effect as damages can quickly spread across internet-connected devices.

Although organizations should trust their employees and partners, it’s important to account for worst case scenarios, as well as accidents. In moments of oversight, employees can make small mishaps that lead to large consequences. It is essential that security teams monitor any changes and anomalies in these environments, and then act to remediate when needed.

Three ways to secure industrial environments

Securing the attack vectors created by IIoT and digital transformation is possible. Modern, converged industrial environments require purpose-built solutions to secure complex, distributed and dynamic industrial architectures. Organizations should be able to:

  1. Achieve holistic visibility for converged environments – Capture visibility across IT and OT environments, including in-depth knowledge of each asset and its health. Support this with strong asset inventory that provides deep situational analysis on every device, including information such as patch levels, firmware down to the ladder logic and backplane. This makes it possible to prevent blind spots, monitor the environment in one place and even schedule key maintenance.
  2. Create risk-based vulnerability management – With deep knowledge on each and every asset, identify the vulnerabilities and set a triaged risk score based on the type of vulnerability and criticality of the asset. This helps ensure the most severe and dangerous vulnerabilities get dealt with first.
  3. Ensure employee security awareness – Ensure regular cybersecurity trainings are completed by employees to educate on best practices as well as inform of warning signs (avoiding impacts from the use of phishing emails, suspicious links or unknown files or devices, such as a USB).

It’s crucial organizations continue strengthening the security posture of the industrial environments modern society relies on. With the proper solutions in place, organizations can help prevent breaches, downtime and damages while focusing on continued innovation.

Michael Rothschild is senior director of OT solutions at Tenable. Edited by Mark T. Hoske, content manager, Control Engineering, CFE Media, mhoske@cfemedia.com.

KEYWORDS: Industrial cybersecurity, securing industrial environments

Industry 4.0 and IIoT have brought newfound efficiency and efficacy to industrial environments, but also an expanded attack surface.

With IT and OT convergence, attacks can expose an environment in more ways than ever before.

Industrial organizations require industrial-grade security, purpose-built to secure modern, converged environments.

CONSIDER THIS 

Are your cybersecurity efforts staying ahead of others in your industry? Is most vulnerable least desirable?

Online Extra

Author biography: Michael Rothschild is senior director of OT solutions who comes to Tenable by way of the Indegy acquisition. He focuses on Tenable’s OT product line, is an advisory board member at Rutgers University and is a past professor of marketing. He also has a number of published works in marketing and healthcare. In his spare time Rothschild is a first aid instructor and volunteers as an EMT.

Original content can be found at Control Engineering.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Michael Rothschild

Michael Rothschild is senior director of OT solutions who comes to Tenable by way of the Indegy acquisition. He focuses on Tenable's OT product line, is an advisory board member at Rutgers University and is a past professor of marketing. He also has a number of published works in marketing and healthcare. In his spare time Rothschild is a first aid instructor and volunteers as an EMT.

Related Topics
  • CFE Content
Previous Article
Test 2 Alt Text
  • Strategies

Validating cybersecurity effectiveness to reduce exposure to potential risk

  • Gregory Hale
  • June 6, 2020
Read More
Next Article
  • Strategies

Technology hikes supply chain security, reduces risk

  • Gregory Hale
  • September 30, 2020
Read More
You May Also Like
Courtesy: Brett Sayles
Read More

Webcast: Addressing Cybersecurity Challenges in Industry 4.0

Wires plugged into a network
Read More

How to secure Industry 4.0 in a highly connected world

Courtesy: CFE Media
Read More

Increasing smart factory cybersecurity using a trusted execution environment

Courtesy of CFE Media and Technology
Read More

Three risks to consider before taking your business’s accounting to the cloud

Courtesy: Brett Sayles
Read More

Technique offers faster security for non-volatile memory tech

Read More

How industrial control systems can be secure in the cloud

Image of IT/OT convergence on a control panel
Read More

New concepts to reduce the risk of ransomware in IIoT environments

Courtesy: CFE Media and Technology
Read More

How to mitigate cloud security threats

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT