Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

Six answers on industrial cybersecurity effectiveness

  • Massimiliano Latini
  • March 9, 2021
Domain knowledge of operational technology and automation need to be considered for industrial cybersecurity. Courtesy: H-ON Consulting
Domain knowledge of operational technology and automation need to be considered for industrial cybersecurity. Courtesy: H-ON Consulting
Total
0
Shares
0
0
0
0

While industrial cybersecurity is brought up more frequently, it doesn’t very often refer to infrastructure or industrial automation control systems security. Is the trend changing? Where and how should cybersecurity be addressed for operational technology (OT) applications?

1. How is cybersecurity for industrial automation?

The interest in a subject like industrial cybersecurity, or OT cybersecurity, is growing among manufacturing companies globally. The reference to information technology (IT) cybersecurity is evident – think about crypto-currencies and big players such as Google and Facebook. However, it is interesting to see increasing references to the OT field (for example, see the European NIS Directive or the Russian FSTEC legislation). In the IT environment, problems are mainly related to data confidentiality. For automation, a lack of cybersecurity seriously impacts the availability of production plants.

2. Who should address ​​OT cybersecurity risk and protection?

There is a lot of confusion. Everyone talks about cybersecurity, but only a few solutions address automation systems. It is often erroneously thought the OT problem should be handled by the IT department, but actually, the two environments differ in approaches. Consider the example of the plant operator who must activate an emergency procedure, while the PC screen is locked, waiting for a multi-factor authentication (MFA) code. In that simple example, cybersecurity impacts safety. It is therefore necessary to ask first who can access the area and how to deal with it. OT cybersecurity cannot bypass the deep knowledge required for automation. This is why many companies are internalizing a dedicated OT security division.

3. What are the most effective OT security solutions available?

The world reference standard is ISA/IEC 62443, which defines the approach to the problem. This standard was created by a research group at ISA (International Society of Automation), later developed by IEC (International Electrotechnical Commission). The regulatory framework is still under review, but defense-in-depth approach of IEC 62443 series of automation and control systems cybersecurity standards is the most well-known and globally recognized cybersecurity standards in the OT field. And so, starting from a risk assessment, IEC 62443 aims at developing a cybersecurity management system (CSMS), which is a system of cybersecurity procedures, that includes the security policies and responsibilities related to OT security, such as access or patch management.

4. How can a manufacturing company take over an OT cyber ​​issue?

IEC 62443 approach is systematic: clear processes lead to concrete results. It would not make sense to assess a system without having an upstream strategy. The starting point is defined by IEC as business rationale. Use the rationale as a tool to determine the potential critical issues on the OT systems that impact the company such as a stop to production or product contamination. Through business rationale one can quantify the seriousness of cyber-attack consequences.

It is also useful to conduct a high-level risk assessment (HLRA), which is necessary to segment the network infrastructure and estimate what would happen if a cyber attack were successful. In relation to the seriousness parameters defined in the previous phase, the HLRA helps companies save resources by isolating single areas and performing an in-depth analysis on potential vulnerabilities. HLRA is followed by the low-level risk assessment (LLRA), also called detailed analysis, where, with the help of software for the detection of network information (architecture, software, protocols and existing vulnerabilities), one can perform a network scan and a vulnerability analysis.

5. On a technical side, what are the most concrete OT security best practices for automation?

Start with segmentation, which means only traffic that is strictly necessary must circulate at layer 6 and 5 (the lowest level segment containing components and PLCs). If it’s not segmented with the help of a firewall or OPC UA (OPC Foundation Unified Architecture) protocols, network traffic may reach the most remote corners of a production plant. For this reason, network mapping must be always updated and always clear. Finally, many devices on the market can help with cybersecurity, including managed switches, next-generation Wi-Fi access points, anomaly detection software, VPN servers and the cloud.

6. When is it possible “to be safe” from an industrial cybersecurity point of view?

Never. No installation is ever safe from cybersecurity risk. Put in these terms it may sound shocking, but the point is a good dose of maintenance activities need to be carried out continuously to maintain a secure infrastructure over time. Only through periodical audits, through the repetition of further vulnerability analyzes, and thanks to the constant personnel training, is it possible to ensure OT protection will last over time.

Massimiliano Latini, research and special projects director and ICS cybersecurity manager at H-ON Consulting. Edited by Chris Vavra, web content manager, Control Engineering, CFE Media and Technology, cvavra@cfemedia.com.

MORE ANSWERS

Keywords: cybersecurity, operations technology (OT)

There is a lot of talk about cybersecurity, but there is confusion about what to do.

IEC 62443 helps companies develop a cybersecurity management system (CSMS), which is a system of cybersecurity procedures.

It is never possible to be truly safe, but continuous maintenance can minimize risks.

Consider this

What do you need to do to ensure OT protection will last on your plant floor?

RELATED ARTICLES

IT/OT collaboration must drive digitalization
https://www.industrialcybersecuritypulse.com/it-ot-collaboration-must-drive-digitalization/

Manufacturers need to prepare for cybersecurity threats
https://www.industrialcybersecuritypulse.com/manufacturers-need-to-prepare-for-cybersecurity-threats/

Five questions every CISO should ask about OT cybersecurity
https://www.industrialcybersecuritypulse.com/five-questions-every-ciso-should-ask-about-ot-cybersecurity/

Avatar
Massimiliano Latini

Massimiliano Latini, research and special projects director and ICS cybersecurity manager at H-ON Consulting.

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: SecurityHQ
  • Strategies

Machine learning, cyber kill chain analysis white paper released

  • SecurityHQ
  • March 8, 2021
Read More
Next Article
The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.
  • Strategies

How to protect embedded systems in OT cybersecurity

  • Ron Brash
  • March 17, 2021
Read More
You May Also Like
Tyler Whitaker discusses the impact of work from home on cybersecurity.
Read More
  • Strategies

Work From Home Revolution: Expert Interview Series, Tyler Whitaker, Leading2Lean

  • Gary Cohen
  • April 12, 2021
Courtesy: Industrial Defender
Read More
  • Strategies

Why cyber hygiene is needed when developing a risk-based cybersecurity approach

  • Jeremy Morgan
  • April 5, 2021
Industrial control system (ICS) cybersecurity advice, best practices
Read More
  • Strategies

Industrial control system (ICS) cybersecurity advice, best practices

  • Osman Ahmed, Asad Rehman, Ahmed Habib
  • March 23, 2021
The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.
Read More
  • Strategies

How to protect embedded systems in OT cybersecurity

  • Ron Brash
  • March 17, 2021
Courtesy: SecurityHQ
Read More
  • Strategies

Machine learning, cyber kill chain analysis white paper released

  • SecurityHQ
  • March 8, 2021
Industrial controller cybersecurity best practices
Read More
  • Strategies

Industrial controller cybersecurity best practices

  • Benson Hougland
  • February 11, 2021
As threat increases, college cybersecurity programs are more in demand
Read More
  • Strategies

Industrial network security best practice advice

  • Alvis Chen
  • February 5, 2021
Read More
  • Strategies

What OSHA can teach us about cybersecurity

  • John Livingston
  • February 4, 2021
NEWSLETTER

GET ON THE BEAT

Keep your finger on the pulse of top industry news

COUNT ME IN!
Hacks & Attacks
  • Throwback Attack: A Florida teen hacks the Department of Defense and NASA

    By Gary Cohen | April 8, 2021

  • U.S. cybercrime surging, annual losses hit $4.2 billion in 2020

    By StockApps | April 2, 2021

  • Throwback Attack: Hackers steal 1 TB of data from beverage giant Brown-Forman

    By Gary Cohen | April 1, 2021

  • Molson Coors cyberattack impacts production, shipments

    By Gary Cohen | April 1, 2021

  • Evaluating 2021 cyber threat landscape trends

    By Derek Manky and Aamir Lakhani | March 26, 2021

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
Recent News
  • Work From Home Revolution: Expert Interview Series, Tyler Whitaker, Leading2Lean

    By Gary Cohen | April 12, 2021

  • Why cyber hygiene is needed when developing a risk-based cybersecurity approach

    By Jeremy Morgan | April 5, 2021

  • Industrial control system (ICS) cybersecurity advice, best practices

    By Osman Ahmed, Asad Rehman, Ahmed Habib | March 23, 2021

  • How to protect embedded systems in OT cybersecurity

    By Ron Brash | March 17, 2021

Resources
  • The International Society of Automation

  • Cybersecurity & Infrastructure Security Agency (CISA)

  • NIST: Guide to Industrial Control Systems Cybersecurity

  • Video: Cybersecurity for Energy Managers

  • Helpful links and Resources

Industrial Cybersecurity Pulse
  • Contact
  • Privacy Policy
  • Terms and Conditions
CFE Med Tech

Copyright 2021

BETA

Version 1.0

Connect With Us!
Facebook
Twitter
LinkedIn
Reddit

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT