小程序
传感搜
传感圈

The Tipping Point for OT Cybersecurity

2023-03-22
关注

The Tipping Point for OT Cybersecurity
Illustration: © IoT For All

In a recovering post-pandemic world, interconnectivity and digitalization continue accelerating at an unprecedented pace. With advanced technology penetration and the interconnectedness of industrial devices, organizations are increasingly reliant on operational technology (OT) to keep their businesses running and competitive. Moreover, in many cases, these advancements have become key foundations driving new revenue streams. The next five years will be critical for industrial control systems (ICS) and OT cybersecurity. Driven by multiple factors, experts agree that a major ICS/OT cyber-attack is inevitable. Forrester analysts alarmingly have predicted that in 2023, 60 percent of all businesses will experience a major or minor OT security incident. The question is not if, but when a major ICS/OT attack will happen.

“With advanced technology penetration and the interconnectedness of industrial devices, organizations are increasingly reliant on operational technology (OT) to keep their businesses running and competitive.”

-Daniel Bren

Protecting Your Company

Taking a proactive approach to reducing risks for cyber-physical systems helps ensure that industrial manufacturing, critical, and smart infrastructure organizations maintain resilient operations. That is because a focus on reducing risks and vulnerabilities to ICS and OT cybersecurity will be far more effective than reacting after an anomaly has been detected or a security breach has occurred. By that time, the damage will already be done.

Key steps need to be taken in order to help keep your company’s operations resilient. Mainly, you need to utilize a risk-based approach to OT security and ensure that your cyber-physical systems regularly assess risks and reduce vulnerabilities to help prevent breaches that result in ransomware.

Risk-Based Approach to OT Security

The common risk-based approach to OT cybersecurity should have two elements:

  1. Identifying critical risks
  2. Making them a priority

Therefore, a risk-based approach requires skills in both risk assessment and reacting nimbly. Risk assessment skills involve several unique competencies, especially for OT security. A straightforward example is assessing an organization’s security posture, yet this crucial element is insufficient by itself.

The real challenge is correlating technical findings to their impact on the business — both financial and operational. So how do businesses assign a monetary value to each OT security finding and corresponding risk reductions they achieved by implementing different mitigations?

Driven by reality, regulatory agencies worldwide have started pushing for cyber risk governance. This requires businesses to remain up-to-date with regulatory changes. Most importantly, you need the ability to understand how compliance risks can arise from your company’s internal processes.

This includes new technology systems, third-party software and hardware solutions, and third-party service providers. Call to action – be ransomware ready. To safeguard your OT infrastructure and mitigate the risk of a cyber breach, you need to go beyond asset visibility. Let’s look at what you do to prepare for these potential threats and mature your organizational OT cybersecurity.

Three Key Steps

#1: Regular, Contextualized Assessments

You need to understand what assets are at risk in your business, and what potential damage scenarios would be if such assets were compromised.

#2: Enhance IT & OT Collaboration

One of the main challenges today is the collaborative need for IT security with on-site automation experts. Only through this collaboration can effective and efficient risk mitigation will be met. Using the proper native technology will not only automate the operation but also accelerate the maturity, hence, the preparedness.

#3: Prescriptive Mitigation

Due to the unique nature of the operational environment, many of the traditional IT-related practices (e.g., patching and non-safe scanning) are not relevant. Leveraging the power of cross-domain data analytics will enable you to automatically determine an optimal course of action.

By considering all relevant factors and available security controls, this type of analysis will not only yield recommendations for the next steps but also will provide the different practitioners with operational safe practical actions to mitigate risk.

After that enhanced risk assessment comes with the job of reacting to identified risks. As mentioned, being nimble is essential for this process to succeed. It also requires many specific abilities for the compliance program. First, the program will need the skill to implement the controls. Your organization needs the skills to validate and execute compensating controls.

To monitor progress and report compliance, the program will need evidence-based reporting dashboards and reports for internal progress, senior leadership regulators, business partners, and anyone else that your compliance program has thought through its regulatory and corporate compliance strategies.

Next Steps

Security automation is essential for operating technology safely and effectively. Cyber-physical systems are vulnerable and need to be protected. However, simply assessing vulnerabilities (asset vulnerability) or mapping assets (vulnerability mapping) is insufficient.

In order to make the best decisions about where to allocate resources for OT security, you also need to understand how effective your security controls are and how exploitable different assets are.

Only then can you make smart decisions about resource allocation to reduce critical risks. Have you designed a multi-phase plan for your OT security yet? Facing this coming reality with haste is of the utmost importance.

Tweet

Share

Share

Email

  • Connectivity
  • Cybersecurity
  • Data Analytics
  • IoT Platforms
  • IT and Security

  • Connectivity
  • Cybersecurity
  • Data Analytics
  • IoT Business Strategy
  • IoT Platforms

参考译文
OT网络安全的临界点
在大流行后复苏的世界中,互联互通和数字化继续以前所未有的速度加速。随着先进技术的渗透和工业设备的互联性,组织越来越依赖于操作技术(OT)来保持业务的运行和竞争力。此外,在许多情况下,这些进步已经成为推动新收入流的关键基础。未来五年将是工业控制系统(ICS)和OT网络安全的关键时期。在多种因素的推动下,专家们一致认为ICS/OT遭受重大网络攻击是不可避免的。Forrester分析师预测,到2023年,60%的企业将经历或大或小的加班安全事件。问题不在于是否会发生重大ICS/OT攻击,而在于何时会发生。“随着先进技术的渗透和工业设备的互联性,企业越来越依赖运营技术(OT)来保持业务的运行和竞争力。”采取积极主动的方法来降低网络物理系统的风险,有助于确保工业制造、关键和智能基础设施组织保持弹性运营。这是因为,专注于降低ICS和OT网络安全的风险和漏洞,将比在检测到异常或发生安全漏洞后做出反应更有效。到那时,伤害已经造成了。需要采取关键步骤来帮助保持公司的运营弹性。主要是,您需要利用基于风险的方法来确保OT安全,并确保您的网络物理系统定期评估风险并减少漏洞,以帮助防止导致勒索软件的破坏。基于风险的OT网络安全通用方法应包含两个要素:因此,基于风险的方法需要风险评估和灵活反应的技能。风险评估技能涉及几个独特的能力,特别是对于OT安全性。一个简单的例子是评估一个组织的安全状况,但是这个关键因素本身是不够的。真正的挑战是将技术发现与其对业务(包括财务和运营)的影响联系起来。那么,企业如何为每个OT安全发现和通过实施不同的缓解措施实现的相应风险降低分配货币价值呢?在现实的推动下,世界各地的监管机构都开始推动网络风险治理。这就要求企业紧跟法规的变化。最重要的是,您需要了解合规风险是如何从公司的内部流程中产生的。这包括新的技术系统、第三方软件和硬件解决方案以及第三方服务提供商。行动号召-准备好勒索软件。为了保护OT基础设施并降低网络入侵的风险,您需要超越资产可见性。让我们来看看如何为这些潜在威胁做好准备,并使组织OT网络安全变得成熟。您需要了解您的业务中哪些资产处于风险之中,以及如果这些资产受到损害,将会出现什么样的潜在损害情况。当今的主要挑战之一是IT安全与现场自动化专家的协作需求。只有通过这种合作,才能切实有效地减轻风险。使用适当的本地技术不仅可以使操作自动化,而且还可以加速成熟,从而提高准备工作的效率。由于操作环境的独特性质,许多传统的it相关实践(例如,打补丁和不安全扫描)是不相关的。利用跨域数据分析的强大功能将使您能够自动确定最佳行动方案。 通过考虑所有相关因素和可用的安全控制,这种类型的分析不仅将为下一步提供建议,而且还将为不同的从业者提供可操作的安全实际行动来降低风险。在加强风险评估之后,是对已识别的风险做出反应的工作。如前所述,敏捷是这个过程成功的关键。它还要求遵从性计划具有许多特定的能力。首先,程序将需要实现控制的技能。您的组织需要验证和执行补偿控件的技能。为了监控进度和报告合规性,该计划将需要基于证据的报告仪表板和内部进度报告、高级领导监管机构、业务合作伙伴,以及您的合规计划通过其监管和公司合规战略考虑的任何其他人。安全自动化对于安全有效地操作技术至关重要。信息物理系统是脆弱的,需要加以保护。然而,仅仅评估漏洞(资产漏洞)或映射资产(漏洞映射)是不够的。为了做出关于在哪里为OT安全性分配资源的最佳决策,您还需要了解安全控制的有效性以及不同资产的可利用性。只有这样,您才能在资源分配方面做出明智的决定,以减少重大风险。你为你的OT安全设计了一个多阶段计划了吗?赶快面对即将到来的现实是至关重要的。
  • en
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

TMP Pro Distribution C012EN RF 音频麦克风

C012E射频从上到下由实心黄铜制成,非常适合于要求音质的极端环境,具有非常坚固的外壳。内置的幻像电源模块具有完全的射频保护,以防止在800 Mhz-1.2 Ghz频段工作的GSM设备的干扰。极性模式:心形频率响应:50赫兹-18千赫灵敏度:-47dB+\/-3dB@1千赫

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

Minco AH439S1N10EN 温湿度变送器

Minco空间湿度探测器组件具有温度补偿功能,结构紧凑,重量轻。它们是为直接安装在建筑内墙上而设计的。他们的特点是集成电路传感器与稳定的聚合物元件,是由烧结不锈钢过滤器封装,加上先进的微处理器,以提供准确和可重复的测量。温度输出是可选的。,用于需要:

评论

您需要登录才可以回复|注册

提交评论

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

微软推出基于chatgpt的浏览器和必应搜索引擎

提取码
复制提取码
点击跳转至百度网盘