As operations technology (OT) and information technology (IT) converge, industrial organizations have started to reinforce their network security and are taking cybersecurity precautions to protect their operations.
Critical infrastructure and manufacturing facilities are more likely to be targeted by cyberattacks, as companies could need to halt their production lines for more than one day due to a cyberattack.
In addition to incurring financial losses, a company’s reputation can be damaged when it’s hit by a cyberattack. Companies are being targeted by ransomware attacks, and some are being targeted, despite having taken precautionary measures. These attacks demonstrate the risk of an interconnected world, and no organization is immune from cyberattack.
Chief security officers, specifically chief information security officers, want to learn more about OT environments and how to effectively implement cybersecurity measures without disrupting industrial operations. There are many approaches and architectures that must be considered.
Defense-in-depth and zero-trust approaches
The initial focus of zero-trust architecture, as stated in the NIST Special Publication 800-207, is to only grant the minimal access privileges to those who need to operate on the network. This will prevent the situation whereby someone has a legitimate reason to access the network, but they are unnecessarily given unrestricted access to parts of the network that they do not require access to, which increases the chances of a cybersecurity breach occurring.
The defense-in-depth approach contains multiple layers of security protection to reinforce network security for industrial operations. The rationale behind this is that you’ll have a second chance to protect zones and conduits if the first layer of protection fails. According to the IEC 62443 cybersecurity standard, it is necessary to start this process by partitioning areas based on the levels of protection required.
Also read: Defense-in-depth leads cyber strategy for OT security
Each partition is called a zone, and all the communication devices within it share the same security level, which means they all have the same level of protection. If you want to enhance security even further, it is possible to place a zone inside another zone with additional security measures.
By combining the two approaches that we have just considered, you can build well-defended industrial operations with layers of protection as the foundation and then add further protection by adding the zero-trust mechanism to ensure access is restricted to only those who need to access certain areas of the network (Figure 1). After considering these two approaches, it is clear there is no silver bullet for cybersecurity and there are multiple angles that must be considered to ensure your network is secure.
Enhance cybersecurity awareness
It’s important to enhance cybersecurity awareness across different departments and make sure all team members have the same mindset regarding cybersecurity. Employees should be encouraged to understand the benefits of the following technical security requirements, as this will increase the chances that the guidelines are adhered to.
This requires:
- coordinated security responses, as well as network monitoring and management
- an assumption that all devices and networks will be compromised
- ensuring there are robust recovery-and-response processes.
Strong authentication for users and devices
One unfortunate scenario that is often seen on industrial networks is when user credentials are compromised. For networks that do not utilize the zero-trust principle, a user’s credentials might be all a malicious actor needs to gain access to the network. However, for a network that utilizes zero-trust architecture, a malicious actor requires not only device access control but also user authentication and authorization. On top of that, it is suggested to utilize trust lists for granular control of your network.
Device access control: By using trust lists, rate control and failure logout, network devices only allow access from trusted devices that are equipped with the secure boot function and prevent excessive attempts such as brute-force attacks.