Sectrio

OT

Why OT security gap and threat assessment is essential for your security posture

Why OT security gap and threat assessment is essential for your security posture

An Operational Technology risk and threat assessment can serve as a foundational activity for improving your overall approach to infrastructure security. Not only can it identify gaps in your OT security posture, but it can also help sensitize employees and to ascertain if you have the right resources, practices, and workflows to improve OT security. Each year, many security vendors and OEMs publish their threat environment assessment reports. 2023 is no different. In fact, Sectrio will be publishing its IoT and OT threat landscape assessment report in the coming week. Our report talks about the specific deterioration in the threat environment surrounding OT-based infrastructure. There are specific inputs on how threat actors, emboldened by their success in targeting OT infrastructure are now expanding their operations to target many aspects of OT including devices sitting at the periphery of OT networks as well as safety and instrumentation systems. Also Read: How to get started with OT security Thus, anytime is a right time to conduct an OT threat and gap analysis exercise to find out how susceptible your infrastructure is to such attacks and threat actors. As a leading OT security vendor, Sectrio has undertaken many OT threat assessment projects. Following are some of the best practices that our SMEs recommend for conducting an effective OT security risk and gap assessment 10 best practices for OT security gap and threat assessment 1. Start with the scope Determine the full scope of the assessment along with objectives. Which are the systems, devices, and processes that will be assessed? What are the parameters and what kind of assessment methodologies and models will be used? This will help you to focus your resources and efforts and ensure that you have a comprehensive understanding of not just the security risks but also the amount of time and resources involved. If there is any scope for a downtime, it should be identified here. 2. Identify the assets Identify the critical assets in the system that you are assessing and prioritize them based on need and on the possible impact in case of a cyberattack. This includes hardware, software, networks, and other components. It is advisable to identify the interdependencies as well. 3. Conduct a threat assessment Identify the potential threats that could affect the assets. This includes cyber threats such as malware, ransomware, side loading, man-in-the-middle attacks, and hacking, as well as physical threats such as natural disasters, accidents, and equipment failures. 4. Identify specific vulnerabilities Assess the security vulnerabilities that exist within the system. This includes both technical and non-technical vulnerabilities. 5. Measure compliance with IEC 62443 Do the systems comply with various IEC 62443 stipulations? IEC 62443 can serve as a guiding standard for various aspects of operations and infrastructure.  6. Evaluate the existing security measures and their impact Determine what security measures are already in place and assess their effectiveness. 7. Identify gaps Identify any gaps that exist in the current security measures and determine what additional measures are needed to address these gaps. 8. Develop a plan Develop a plan to address the identified gaps and mitigate the identified risks. This should include a prioritized list of actions and a timeline for implementation. 9. Implement the plan Implement the plan and monitor the system to ensure that the security measures are effective. 10. Conduct regular assessments Conduct regular assessments to ensure that the security measures remain effective and to identify any new risks or vulnerabilities that may have emerged. Conducting an OT security risk and gap assessment is a complex process that requires expertise in both industrial systems and cybersecurity. Which is why you need to speak to Sectrio. We have conducted OT security and threat assessments across industries. Our mature risk, gap and threat assessment approach can help your organization identify and mitigate gaps and threats.    Find out what is lurking in your network. Go for a comprehensive 3-layer threat assessment now by Sectrio

Why OT security gap and threat assessment is essential for your security posture Read More »

Securing-Legacy-OT-Systems-Challenges-and-Strategies

Securing Legacy OT Systems: Challenges and Strategies

Operational Technology (OT) systems are critical to the operation of industrial and critical infrastructure processes. These systems often consist of legacy equipment, hardware, and software that may be decades old and lack modern security features. As a result, legacy OT systems are vulnerable to cyberattacks that can disrupt operations, cause safety incidents, and result in significant financial losses. Read this blog and learn more about the challenges associated with securing legacy OT systems and outline strategies that organizations can use to enhance the security and reliability of their legacy OT systems. Challenges with Securing Legacy OT Systems Outdated Hardware and Software Legacy OT systems typically consist of outdated hardware and software that may be difficult to secure. These systems may not support modern encryption algorithms or secure communication protocols, leaving them vulnerable to eavesdropping, data theft, and manipulation. Lack of Encryption Encryption is essential to protecting sensitive data and communications in modern industrial and critical infrastructure processes. However, legacy OT systems may not support encryption, leaving them vulnerable to attacks that can compromise data confidentiality and integrity. Insecure Communication Protocols Legacy OT systems may use insecure communication protocols that can be exploited by attackers. For example, Modbus, a widely used communication protocol in legacy OT systems, does not include authentication or encryption, making it vulnerable to attacks that can compromise data integrity and availability. Lack of Security Awareness Operators and technicians who manage legacy OT systems may lack security awareness and training, making them vulnerable to social engineering attacks. Social engineering attacks can be used to gain access to sensitive information or systems by exploiting human vulnerabilities. Strategies for Securing Legacy OT Systems Conduct Risk Assessments Risk assessment is the process of identifying, evaluating, and prioritizing risks to legacy OT systems. This includes identifying vulnerabilities, threats, and potential consequences of a successful cyber-attack. Once identified, organizations should prioritize risks based on their potential impact and likelihood of occurrence. Based on the results of the risk assessment, organizations should develop and implement risk mitigation strategies to reduce the risk of successful cyberattacks. By regularly performing risk assessments and implementing risk mitigation strategies, organizations can proactively identify and address potential vulnerabilities in their legacy OT systems and improve their overall security posture Implement Network Segmentation Network segmentation involves dividing a network into smaller, more secure subnetworks, or segments, to limit the spread of cyberattacks. By segmenting legacy OT systems, organizations can isolate critical assets and limit the damage that could be caused by a successful cyberattack. Organizations should identify critical assets and systems and segment them from non-critical systems. This includes placing systems with similar functions, security requirements, and access controls in the same segment. In addition, organizations should regularly monitor and review their network segmentation policies and procedures to ensure that they remain effective and up-to-date. By implementing OT network segmentation, organizations can reduce the attack surface of their legacy OT systems, minimize the impact of successful cyberattacks, and improve overall system security. Implement Access Control Access control involves implementing mechanisms to control access to legacy OT systems. Access controls should include strong authentication, authorization, and accountability mechanisms. Organizations should limit access to critical systems only to authorized personnel with a legitimate need to access them. The first step in implementing access control is to identify the assets that need to be protected and the individuals or roles that require access. Access control policies should be developed to define the rules and procedures for granting and revoking access to these assets. Read more: IEC 62443, NIST Table of Roles & Responsibilities Template Strong authentication mechanisms, such as two-factor authentication or biometric authentication, should be used to verify the identity of users before granting access to the system. Authorization mechanisms should be implemented to define what actions users can perform on the system and which resources they can access. Implement System Hardening Hardening legacy OT systems involves implementing security controls to reduce the attack surface and improve the security posture of the systems. This includes implementing firewalls, intrusion detection and prevention systems, access controls, and other security measures to limit the potential for successful cyberattacks. In addition, organizations should disable or remove any unnecessary or unused services, protocols, and applications that could be exploited by attackers. This may include disabling unnecessary ports, removing default accounts and passwords, and restricting access to critical systems and components. By hardening their legacy OT systems, organizations can significantly reduce the risk of successful cyberattacks and improve the overall security of their critical infrastructure. It is important to note, however, that hardening should be performed in a careful and deliberate manner, as any misconfigurations or errors can result in unintended consequences or downtime. Implement Security Monitoring Implementing security monitoring for legacy OT systems involves using tools and techniques to identify and respond to potential cyber threats and attacks in real time. This includes implementing network and system monitoring tools, intrusion detection systems, and security information and event management (SIEM) solutions to detect and respond to potential threats. Know more: Find out how Sectrio Hub can be a centralized console for real-time threat monitoring Organizations should establish and follow incident response procedures that outline how to respond to a security incident or cyber-attack. This should include strategies for identifying the source and scope of the attack, containing the damage, and restoring systems and data to their pre-attack state. By implementing effective security monitoring for their legacy OT systems, organizations can detect and respond to potential threats in a timely and effective manner, reducing the risk of successful cyberattacks and minimizing the impact of any security incidents that do occur. It is important to note that security monitoring should be an ongoing process, and that organizations should regularly review and update their monitoring strategies to ensure that they remain effective in the face of evolving cyber threats and attack techniques. Implement Security Awareness and Training Implementing security awareness and training programs for legacy OT systems is critical to reducing the risk of successful cyberattacks caused by human error

Securing Legacy OT Systems: Challenges and Strategies Read More »

Corporate espionage, the latent objective behind many cyberattacks

Corporate espionage, the latent objective behind many cyberattacks

Two instances of major cyberattacks segregated in space and time are linked by a hidden objective. One targets a large pharmaceutical company in Asia and the other a large American heavy equipment manufacturer. These two cyberattacks, as per our research have a not-so-obvious connection. While on the surface, both attacks seemed to be motivated by monetary objectives, when one digs deeper, a more sinister link emerges. The smokescreen: Corporate Espionage The actor involved in both these instances of cyberattacks was the Alphv hacker group. In the case of the pharma company, nearly 17 TB of data was exfiltrated from the company’s networks. While the hacker group was still negotiating with the victim business, it had also tried to sell the data through many breach forums. One may think this is something drawn straight from a hacker group playbook, but there is a possibility that the attack could have been motivated by corporate espionage and the whole drama of negotiations with the victim was just a smokescreen to bury the real objective beneath layers of fresh subterfuge. There are various reasons to believe that this is the case. Let’s look at some of the evidence that points to this line of reasoning: A careful analysis of the above information points to the actor having secured some form of monetary gains from the hack even before Alphv put forth its first ransom demand. Typically, after attacking a victim, hackers try their best to put pressure on victims to yield ransom quickly. The longer the negotiations stretch, the higher the chances for the victim to reverse the encryption and regain access to their systems, and lockout hacker access. Despite this threat, Alphv allowed the negotiations to go on without putting any significant pressure on both victims. Wasn’t Alphv serious about ransom? How could this be? It is possible that in both these instances, Alphv was contracted by some entity to exfiltrate specific data from the servers and networks of its victims (for a price, of course). The subsequent half-hearted ransom demand was just an attempt to cover tracks and pretend this was just a regular cyberattack. While such instances are far and few, they do happen. Also read: Complete Guide to Cyber Threat Intelligence Feeds As hacker groups diversify their revenue streams espionage becomes another revenue spinner for them and knowing the highly competitive segments these two businesses are in and the behavior shown by the threat actor, it is possible that Alphv was in touch with a competitor for sale of the stolen data even before it was exfiltrated.   Sectrio’s IoT and OT Specific threat intelligence feeds We are giving away threat intelligence for free for the next 2 weeks. Find out how you can sign up and try out our threat intelligence feeds Find out what is lurking in your network. Go for a comprehensive 3-layer threat assessment now

Corporate espionage, the latent objective behind many cyberattacks Read More »

My reflections from GISEC 2023 (1)

My reflections from GISEC 2023 and the cybersecurity challenges we are faced with in the Middle East region.

According to a new report from analyst firm Frost and Sullivan, the Middle East’s cybersecurity market is expected to reach $31 billion by the year 2030, up from $7.5 billion in 2022. This exponential growth is a clear reflection of the state of the market and the level of priority that enterprises are giving to cybersecurity in addressing the increased risks they face. With the uptick in digital transformation and AI-powered automation projects, cybersecurity will gain even more prominence. While such transformations are necessary to retain a competitive edge and are good for businesses, there are areas that need improvement to ensure a holistic approach. Sectrio was among the handful of OT security vendors at the GISEC event. This meant that we were able to participate in many discussions with businesses on embracing a robust ICS/OT security framework that secures operational assets from all types of sophisticated attacks. Regional businesses are now looking at OT security from a fresh perspective, decoupling it from traditional IT security, and the age-old approach of meeting the bare minimum compliance mandates to avoid fines or regulatory penalties. Many are waking up to OT threats and in the process of setting up a specific OT-security roadmap with clear milestones. As some of you may already be aware, the OT threat environment in the region is deteriorating rapidly due to the emergence of new advanced persistent threat actors, cybercriminals, a growing volume of targeted attacks, and increasing sophistication of cyber-attacks. It will only be a matter of time before such attacks breach the kinetic threshold and take shape of large-scale attacks causing unacceptable losses. APT actors and new hacker groups using easy-to-obtain malware such as Lockbit 3.0 are redefining the threat landscape and underscoring the need for improving cyber hygiene and expanding the scope of investments in cybersecurity. While at the event, I met with many OT security leaders from the region and multiple industry verticals. They were all nearly unanimous when it came to their outlook for the region, cyber threats faced, and what businesses need to focus on to improve their security posture and ensure risk-free operations. I am sharing a few of those insights here; please feel free to reach out to me in case you wish to have a deeper conversation on any of these areas or wish to learn more. At the end of three packed days at GISEC, I am certain of a few things: They are looking up to specialists like Sectrio to step up and work with them to secure their OT networks so that they can continue on their digital transformation journeys. And guess what? We are ready to take on this challenge. Wish to connect with us? Sign up here: request a demo and check out our solution in action today.

My reflections from GISEC 2023 and the cybersecurity challenges we are faced with in the Middle East region. Read More »

TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

On March 8th, 2023, the Transportation Security Administration (TSA) announced a new and important cybersecurity amendment to the security programs of certain TSA-regulated airports and aircraft operators in the US. This emergency action follows a similar set of measures announced in October 2022 for passenger and freight railroad carriers. The TSA is taking this action due to persistent (and growing) cybersecurity threats directed against U.S. critical infrastructure, including the aviation sector. The overall goal is to increase the cybersecurity resilience of and harden U.S. critical infrastructure with extensive collaboration with aviation partners. In the wake of increasing cybersecurity threats, the TSA is prioritizing the importance of OT network segmentation policies and controls in the aviation sector. One of the key requirements outlined in the new amendment is the need for an OT network segmentation and controls. This is a critical step in ensuring that operational technology systems can continue to operate safely in the event that an information technology system has been compromised, and vice versa. By creating separate OT network segments for different types of systems, operators can reduce the risk of a single cyberattack taking down their entire infrastructure. OT Network Segmentation for Critical Infrastructure OT Network segmentation is a fundamental principle of cybersecurity and is essential for protecting critical infrastructure. Without proper OT network segmentation, a cyber attacker can easily move from one system to another, causing widespread disruption and damage. By isolating different types of systems from each other, operators can limit the impact of a cyberattack and prevent it from spreading throughout their network. In addition to OT network segmentation, the new amendment also requires operators to implement access control measures to prevent unauthorized access to critical cyber systems. This is another critical step in securing their networks and preventing cyberattacks. By limiting access to critical systems, operators can reduce the risk of a cyber attacker gaining control of their infrastructure. Continuous monitoring and detection policies and procedures are also essential for defending against cyber threats. Operators must be vigilant in monitoring their networks for signs of suspicious activity and responding quickly to any anomalies. This requires a combination of advanced cybersecurity tools and skilled cybersecurity personnel. Also read: How to get started with OT security Finally, the new amendment also emphasizes the importance of timely patching and updating of critical cyber systems. This is essential for reducing the risk of exploitation of unpatched systems, which are often targeted by cyber attackers. By prioritizing patching and updating of critical systems, operators can reduce the risk of a successful cyberattack. These measures are essential for protecting the nation’s critical infrastructure and ensuring the safe and secure transportation of people and goods. The TSA is working closely with industry stakeholders across all transportation modes to reduce cybersecurity risks and improve cyber resilience. This new amendment builds on previous requirements for TSA-regulated airport and aircraft operators, which included measures such as reporting significant cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency (CISA), establishing a cybersecurity point of contact, developing and adopting a cybersecurity incident response plan, and completing a cybersecurity vulnerability assessment. The TSA’s efforts to enhance the cybersecurity resilience of U.S. critical infrastructure are part of a larger national effort to secure the full benefits of a safe and secure digital ecosystem for all Americans. On March 2nd, 2023, the Biden-Harris Administration announced the National Cybersecurity Strategy to prioritize cybersecurity for all Americans. In conclusion, here are 7 key takeaways from the TSA’s new cybersecurity amendment: By prioritizing OT network segmentation and implementing other key cybersecurity measures, TSA-regulated entities can help reduce cybersecurity risks and improve cyber resilience to support safe, secure, and efficient travel. Find out how Sectrio’s OT Segmentation module can help Secure your IT-OT infrastructure today, Download now: Product Brief Sectrio MicroSegmentation We are giving away threat intelligence for free for the next 2 weeks. Find out how you can sign up and try out our threat intelligence feeds Find out what is lurking in your network. Go for a comprehensive 3-layer threat assessment now

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure Read More »

Complete-Guide-to-Zero-Trust-Security

Complete Guide to Zero Trust Security

Zero Trust Security – Always Verify and Authenticate Zero Trust Security architecture functions on the premise that any connection requires mandatory identification, verification, and authentication. Previously, networks were potentially secure from outside threats. At the same time, those inside the system had complete access to every nook and corner of the network. The security systems back then were dubbed as the ‘castle and moat’ system (or ‘trust but verify’). If someone crosses the moat (manages to intrude on the network), they would have complete access to every network component. All the intruders need to gain are legitimate credentials to enter the system. Likewise, the threat of an insider is always high in such scenarios, leaving troves of data at the mercy of the attacker and is a complete failure of the security architecture. Zero Trust Security architecture is independent of whether the connection is within or outside the network premises. Therefore, enterprises should take a holistic approach to adopting ZTA across every enterprise level. ZTA (Zero Trust Architecture) typically comprises a set of rules, procedures, and techniques to secure the systems. In the future, cyberspace will only get more vulnerable and treacherous. But, despite its drawbacks, cybersecurity researchers feel that Zero Trust Security is the way to go ahead. Contents The Zero Trust Security framework (architecture) can protect every network component if implemented perfectly and with fine-tuning. Moreover, in case of a successful intrusion, it helps minimize the damage. What drives Zero Trust Security? – Key Principles of Zero Trust Security Framework Zero Trust Security framework relies heavily on the ‘assume breach, verify explicitly’, and continuous trust verification and authentication mechanism. At all times, all connections need to be periodically verified, irrespective of their previous interactions. The key principles that drive the Zero Trust Security Framework are as follows: What makes ZTA so unique? – Advantages of Zero Trust Security The world has been catapulted 5-7 years into the future regarding digitalization, using cloud services, and remote work. The call for security has been at its epitome with data flowing across various networks. To ensure the workforce and clients operate in sync without giving much thought about security concerns, we must adopt strict security measures that protect data, identities, networks, and infrastructure. The need led to the fast-track adoption of Zero Trust Security globally. Moreover, complying with industry standards and government requisites plays a big part in running an enterprise. Implementing Zero Trust Security Establishing Zero Trust Security is a challenging exercise requiring experience, expertise, and time. Usually, enterprises see ZTA as a turnkey cybersecurity solution thinking of it as a plug-and-play product. But, in reality, ZTA comprises various elements, with each element unique in its way and serving a specific purpose. Therefore, enterprises should hire an expert cybersecurity solution provider, like Sectrio, to implement and monitor ZTA. But, how to implement ZTA helps enterprises understand the platform in more detail, paving the way for better security practices. There are two ways one can approach the implementation of Zero Trust Security: 1. Rip and Replace: Only a very select few enterprises take this option. As the name suggests, replacing the existing infrastructure with modern infrastructure makes it easy to implement ZTA. Going ahead with this approach requires a thorough understanding of the following: 2. Build around and replace Most enterprises might have a potpourri of security installations spread across various timelines. Most security offerings are either incomplete or incompetent at the same level of expertise across multiple domains. Opting for ZTA requires a thorough analysis of the security posture and every element that is a part of it. There might be a case for replacing infrastructure, given the lack of compatibility due to modern security protocols. Similarly, the administrator can revoke permissions due to implementing the Privileged Access Management / Least Privileged Access policy. Finally, the workforce needs to get habituated to Multifactor authentication, as ZTA works on the core principle of ‘assume breach, verify explicitly’ for every new connection request. Similarly, ZTA focuses on protecting data and successfully thwarting intrusions rather than concentrating on the attack surface and external perimeter (alone). Implementing Zero Trust Security in 7 Steps The network of any enterprise involves securing its devices, dataflow paths, user authentication, network connection, and applications in use. Additionally, ZTA heavily relies on network connectivity, which can be affected during a DDoS attack or a surge in user traction. These two scenarios can strain the network, with processes slowing down before a complete collapse. Only with time can an enterprise understand the extent of strict protocols they might require for a particular set of data and network. With this understanding and UEBA (User and Entity Behavior Analytics) tools, one can strengthen Zero Trust Security, thereby improving security posture.  Zero Trust Security Challenges Nothing is a fairytale in cybersecurity. Adopting ZTA or Zero Trust Security framework is no exception in that. To adopt a security product like Zero Trust Architecture by an enterprise, everyone involved in the company, regardless of whether they belong to the IT department, should be a part of the exercise. It requires significant man-hours to create awareness and train people to implement the best ZTA practices. Unfortunately, few enterprises see this as an investment, while others see it as a dent in their balance sheet. Let us learn about common challenges an enterprise faces with adopting ZTA.  Overcoming Zero Trust Security Challenges Like every other cybersecurity product, Zero Trust Architecture has flaws and drawbacks. However, irrespective of anything, ZTA is the best option that can effectively tackle the current cybersecurity threat landscape. It is so comprehensive that it brings many aspects of a network’s security into play and supplements the monitoring team with analytical data, helping them have a detailed granular view on every process on the network. Therefore it is essential to understand how to overcome Zero Trust Security challenges to make the best use of the product. Zero Trust Security Best Practices Having a protocol sheet is always helpful in cybersecurity. The rules, guidelines,

Complete Guide to Zero Trust Security Read More »

2023 will be an important year for cybersecurity in India

2023 will be an important year for cybersecurity in India

In addition to the heightened attention the country is receiving from hackers and hacktivists, there are chances of data stolen in 2022 being weaponized this year. IoT and OT Cybersecurity predictions for India for 2023 are based on the trends we have observed in India’s digital space over the last 4 years, our research on the type of cyberattacks that have occurred in this duration, chatter on the Dark Web and other forums and on threat and actor specific IoT and OT focused threat intelligence gathered by Sectrio’s Threat and APT Hunting team. Here are our specific 2023 IoT and OT cybersecurity predictions for India: The IoT and OT Security CISO peer survey 2022 report conducted by Sectrio is a must-read for all. Click here and download your copy of the report now: The CISO Peer Survey Report 2022 We are giving away threat intelligence for free for the next 2 weeks. Find out how you can sign up and try out our threat intelligence feeds Find out what is lurking in your network. Go for a comprehensive 3-layer threat assessment now

2023 will be an important year for cybersecurity in India Read More »

Complete guide to OT network segmentation

Complete guide to OT network segmentation

As industrial businesses connect their OT and IT networks, network segmentation is becoming an increasingly important approach. Using this method, it is feasible to successfully secure industrial assets while maintaining their important characteristics. Data reigns supremacy in the era of the Industrial 4.0 Revolution. In some of our most important industries, it catalyzes IT/OT convergence. IP subnet-based VLANs and utility infrastructure are being combined in smart cities like Dallas to detect water use and leaks, enabling intelligent water saving. The industrial and manufacturing sectors are also implementing IoT solutions to gather crucial data from machinery and production lines. Companies are cutting project schedules, limiting unplanned downtime, lowering operational costs, and witnessing growth never seen before. Security considerations must, however, moderate the desire for efficiency and profitability since the security of an entire organization’s vital infrastructure is on the line. In an OT environment, traditional IT segmentation is inadequate. We have depended on strong perimeter security for many years to monitor communications related to north-south traffic at the network level. However, the construction of traditional IT segmentation including intricate VLAN and firewall setups takes time. Additionally, OT settings have a low tolerance for extended downtimes, particularly when it comes to pipelines, power plants, or ports of call. Additionally, IT firewalls can’t completely reveal which set of packet exchanges are permitted in an OT context. Micro segmentation is becoming more and more of a realistic option for lowering OT attack surfaces as a result of the sophistication of cyberattack methods. Current statistics show that “connectivity to external systems continues to be the predominant root cause of…incidents, a sign that enterprises still fail to adopt network segmentation best practices.” Micro-segmentation allows for fine-grained workload visibility. It offers improved breach containment for OT settings, zero trust security, SDN-based control, granular control of systems that must adhere to regulatory standards, and SDN-based control.     What is OT Network Segmentation?   OT networks from IT networks, guest networks from corporate networks, and essential industrial networks are all separated from one another via network segmentation, a physical security measure. Within essential infrastructures including oil and gas, electricity, utilities, aircraft, transportation, manufacturing, and other important verticals recognized by the US government, segmentation is frequently used. Why? Because ICS devices and the computers used to monitor and control them require increased attention due to the increasing attack rates and degrees of competence needed to access them.   Why are OT network segmentation and segregation essential?   The significance of segregation has been underlined frequently over the past few years, particularly in light of the recent spate of significant data breaches, including those at Marriott, Equifax, WannaCry, and many more. Network isolation can prevent malware, but how? Segregation enables you to separate the infection and stop it before it gets to the network’s core if your first virus or ransomware defenses are breached. By doing so, you and the IT staff at your company will be able to limit the breach to a single host before you need to take manual action. Using advanced methods, an attacker may attempt to connect straight from a compromised host to a more susceptible host. The Australian Cyber Security Centre reports that once a workstation has been compromised, the hacker frequently attempts to establish a remote connection to a server, map a network resource, or use authorized network administration tools to access sensitive data or run malicious code on that server. Therefore, the key to assisting you in preventing such assaults is a well-planned and implemented network segregation and segmentation. Some preventative measures include setting servers to restrict file sharing, forbid remote desktop connections, and limit the server’s capacity to interact with distant connections.   The risk of Unsegmented OT-IT Networks   Flat Network – All of the equipment in the facility is interconnected and forms a flat network. There is no compartmentalization, segmentation, distinction, or prioritizing since any device can “speak” to any other device, from the telephones at the help desk to the webcams at the point of sale to the desktops in accounting. No incline, so flat. Although flat networks are quite popular, there are several significant concerns that you should be aware of. Shopify Inc., a multinational Canadian e-commerce business, published a security incident alert on its website on September 22, 2020. Two workers were discovered to have illegally accessed documents about some of the company’s merchants. According to estimates, the issue exposed customer information from 200 vendors, including names, email addresses, addresses, and order details. Shopify released the following statement in response to the incident: “We promptly revoked these people’s access to our networks and reported the situation to police enforcement. In the investigation into these criminal activities, we are presently collaborating with the FBI and other foreign organizations. Although there is currently no proof that the private data was utilized, the company has informed the impacted merchants of the occurrence. One of the largest security issues that businesses are currently experiencing is insider threats. User behavior analytics (UBA) is used by ManageEngine ADAudit Plus to assist IT, and security teams, in identifying insider threat signs such as numerous unsuccessful login attempts, unusual user behavior such as a spike in file accesses, or privilege escalations. ADAudit Plus uses machine learning to establish a baseline of typical user behavior and only alerts security staff when this baseline is violated.   Implementing OT Network Segmentation: 5 Best Practices   Threat actors now view OT factories as simple, low-effort ventures with a good probability of significant payouts during the past 10 years. Factory owners put a lot on the line when there are lockouts, and they frequently dive deep into their coffers to pay ransoms rather than accept the chance of losing days of availability. The foundation of current OT security trends is the illusion of protection that perimeter firewalls and air gaps provide. They are unable to stop hackers with the dexterity to travel laterally who are ready to observe and wait for months to finally get access to

Complete guide to OT network segmentation Read More »

Specific IoT and OT security predictions for North America for 2023

Specific IoT and OT security predictions for North America for 2023

The year 2023 will see a significant shift in the way cyberattacks are engineered and that is just a start. To help you understand how things will change in 2023, we have distilled our learning from the last 4 years and the threat intelligence gathered from our global threat research facilities into specific points for your understanding. We would like to place on record these specific IoT and OT security predictions: The IoT and OT Security CISO peer survey 2022 report conducted by Sectrio is a must-read for all. Click here and download your copy of the report now: The CISO Peer Survey Report 2022 We are giving away threat intelligence for free for the next 2 weeks. Find out how you can sign up and try out our threat intelligence feeds Find out what is lurking in your network. Go for a comprehensive 3-layer threat assessment now

Specific IoT and OT security predictions for North America for 2023 Read More »

Threat Modeling Using the Purdue Model for ICS Security

Threat Modeling Using the Purdue Model for ICS Security

For organizations today, it’s essential to use the right threat modeling methodology for network defense and risk management. The Purdue Model for ICS (Industrial Control Systems) Security is a great solution for threat modeling. Threat modeling for ICS security is a challenging task. As a solution, the Purdue Common Model for ICS Security provides structure, but it’s important to understand its implementation. This article aims to define and clarify the Purdue model for securing ICS from modern cyber threats. What Is the Purdue Model for ICS Security? The Purdue industrial control system (ICS) security model is a segmented approach to protecting physical processes, supervisory controls and operations, sensors, and logistics. Despite the rise of edge computing and direct-to-cloud connectivity, the ICS network segmentation model remains a crucial framework for protecting operational technology (OT) from attacks like malware. Industrial Control System (ICS) security has a lot to consider. Security professionals have to put processes and procedures in place based on the general risks involved in the industry. However, it is recommended that organizations specializing in ICS security should implement best practices as outlined by NSA and CISA for the Purdue Model for ICS Security. The model is a reference model for manufacturing data flows. As part of the Purdue Enterprise Reference Architecture (PERA), it helps organizations more efficiently transition to completely automated processes. It maintains a hierarchical flow of data throughout interconnected layers of the network. Six zones isolate ICS/OT from industrial technology (IT) systems, enabling improved access controls. Today the model is the standard for ICS network architecture that supports OT security. Breaking Down the Zones of the Purdue Model The OT system resides at the lower levels of the model, and the IT system takes up the higher levels. The systems interact in a “demilitarized zone” (DMZ). Let’s examine each zone of the Purdue reference model: Enterprise Zone: Levels 4 and 5 This is where you’ll find the IT network. These levels include storage, databases, and servers used to run manufacturing operations. In this zone, enterprise resource planning (ERP) systems control inventory levels, shipping, plant production schedules, and material use. Disruptions at this location can lead to extended downtime, which can cause damage to the economy, infrastructure failure, and loss of critical resources. Demilitarized Zone (DMZ): Level 3.5 Here you find security systems like proxies and firewalls. They protect against attacks on both the OT and IT environments. With increased automation and the need for bidirectional data flow between IT and OT systems, organizations can have new cybersecurity vulnerabilities in their system. However, the convergence layer can help mitigate this risk and increase organizational efficiency. Manufacturing Operations Systems Zone: Level 3 Here you find OT devices that manage workflows on the shop floor. Manufacturing operations management (MOM) systems provide a platform for companies to manage their production operations, while manufacturing execution systems collect real-time data. This can then be used to optimize production. Also on this level are data historians, which collect and store process data and conduct a contextual analysis. Disruptions at Levels 4 and 5 can lead to economic damage, infrastructure failures, and revenue loss. Control Systems Zone: Level 2 On this level, you’ll find systems that control physical processes and monitor their status. These include supervisory control and data acquisition (SCADA) software that monitors physical processes. The software collects this data and sends it to historians or other users. Distributed control systems (DCS) are on this level, and they perform SCADA functions locally. These systems are less expensive than other methods of implementing SCADA. Finally, human-machine interfaces connect directly to DCSs and PLCs. This allows for primary equipment control and monitoring. Intelligent Devices Zone: Level 1 This level contains instruments that transmit instructions to the devices at Level 0. These include programmable logic controllers (PLCs) that help monitor automated or human input in industrial processes and adjust output. And remote terminal units (RTUs) that connect hardware in Level 0 to systems in Level 2. This provides a reliable conduit for data to pass from one level to another. Physical Process Zone: Level 0 Here you’ll find sensors, actuators, and other machinery that monitor the assembly line’s condition and suggest adjustments in real-time. Many modern sensors use cellular networks to communicate directly with monitoring software in the cloud. How the Purdue Model Applies Today Since it was introduced by the Purdue University Consortium in the 1990s, the Purdue model has been used as an information hierarchy for CIM. At that time, few other models had outlined a straightforward way to organize CIM. Today, with IT and OT networks integrated through the industrial internet of things (IIoT), it would be reasonable to doubt if the Purdue model applies to modern ICS networks. For example, its data segmentation framework is irrelevant, as Level 0 data is sent directly to the cloud. But it isn’t time to throw out this model just yet. One advantage of the Purdue model that makes it still relevant today is its hierarchical structure. The model divides system components into distinct layers and clearly defines each component. Network segmentation is a logical way to control access between the layers in an OT network. Although the model won’t necessarily fit your current OT network, it still presents a good starting point for securing such a network. As new cybersecurity risks continually emerge, methods that have proven to be effective — even if they don’t perfectly match today’s systems — continue to have value. The Purdue model is a worthy asset to keep in your arsenal of cybersecurity tools. Final Thoughts Segmenting an OT network into layers allows you to control access between the layers. The model may not fit your current OT network exactly, but starting from the model is still an excellent way to secure an OT network. While historically the Purdue model has been used to secure ICS technology, as more of these systems have been connected to the internet they have become less resistant to intrusion. At Sectrio, we provide a service that helps fill the gaps in the Purdue model opened by internet

Threat Modeling Using the Purdue Model for ICS Security Read More »

Scroll to Top