Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Making the Case for IT/OT Security Integration

By Kristina LeBlanc, Staff Writer

In the security world, operational technology (OT) has long been “the land of the forgotten,” taking a backseat in priority to IT network security. “This is no longer tolerable, as adversaries and malicious actors increasingly target OT systems in attempts to extort enterprises or simply wreak havoc through equipment damage, environmental harm or loss of life,” says Mazi Fayazfar, Chief Technology Officer, Atos North America.

“While the focus of security has traditionally been on IT networks, the axis is now flipping. Malicious actors are thinking beyond, ‘what can we do to bring down the IT network?’ to ‘what can we do to bring down the plant?’ creating potentially far worse economic impact,” says Geoff Woollacott, Senior Strategy Consultant and Principal Analyst at TBR.

OT network attacks are often targeted at industrial control system (ICS) networks and supervisory control and data acquisition systems, known as SCADA. These are the systems that control critical infrastructure—dams, water supplies, utility grids and more. OT network attacks have been on the rise in recent years, with the newest research showing exploits increasing in both scale and number throughout 2018. Beyond the more catastrophic impacts, Ernst & Young has found that the cost of downtime from a major OT network attack can exceed $8 million per day.

Traditionally, ICS networks and SCADA systems have been segregated from unsecure areas (corporate networks and the internet) through air-gapping and increased physical security. But in recent years, more of these systems have been brought online to cut costs, share operational information and improve efficiencies—thus increasing their exposure to IT networks as infection vectors, according to Fayazfar. One of the best-known recent examples of this was NotPetya, a ransomware exploit which began by infecting enterprise IT networks and then spread to disrupt the OT networks of several large companies, including Merck and FedEx.

“While many OT network attacks go unreported, the damage caused by cyberattacks reveals the vulnerabilities of ICS networks and SCADA systems. This has led to an increased awareness among organizations to better monitor and protect both their IT and OT networks,” continues Fayazfar. Some keys for doing this include:

 

Start by looking more closely at the IT network

Threats targeting OT networks often originate on IT networks, meaning security teams must gain better visibility into IT traffic and anomalies to protect the OT network. In many cases, this means moving from a reactive approach to a “threat hunting” stance by scouring networks to detect and isolate advanced threats that have evaded more conventional solutions.

Focus on OT system threats

In the past year, at least three new, major ICS-targeting threat activity groups have been identified. Many threats within the broader group have deployed “living off the land” techniques that help them avoid detection. One advantage of OT-network based threats is there are far fewer in number than IT network-based threats, making the task of guarding against them more manageable, but arguably still not scalable by humans alone, notes Fayazfar. Additionally, because malicious actors are often looking to maximize disruption within different market segments (such as gas and electricity), organizations should pay close attention to OT network threats that others in their industry are experiencing.

However, to date this kind of internal industry knowledge-sharing has been sparse. “There would definitely be a benefit to ecosystems of companies sharing insights and data on OT network threats. But organizations have many concerns about sharing details on their ‘near-misses’ and are reluctant to do so, even with industry peers,” says Daniel Callahan, Analyst at TBR.

“Many organizations just don’t want to open the kimono. They are weary of board and shareholder backlash, hits to brand reputation and more,” echoes Curtis Price, Program Vice President of IDC’s Infrastructure Services Group.

Merge and integrate your IT and OT security intelligence, in order to avoid compartmentalized views

Just as IT networks often spread infection to OT networks, the reverse can be true—an attack on an ICS network or SCADA system can quickly pivot to the IT network and compromise the sensitive data that may reside there. Consider an OT network attack at an oil refinery that enables an adversary to gain access to customer credit card information that is gathered further downstream at a gas station. There are numerous examples across industries of threats running bi-directionally, and unless an organization has a comprehensive, holistic view of both their OT and IT network environments, it is nearly impossible to track threats as they transcend realms, observes Fayazfar.

Make OT security an equal citizen

ICS networks and SCADA systems run critical infrastructures, yet they often rely on aging software and obsolete hardware that can be difficult to patch, which leaves them vulnerable to exploitation. Patching these systems is critical, though it can be extremely expensive and difficult. Consider the nature of the infrastructures being patched—many of these run mission-critical services 24×7, and interrupting service to install a new security patch may not be feasible.

Further frustrating the situation is the fact that even with extensive patching, many OT networks are insecure by design, as many of the systems within them lack basic authentication procedures. This does not obviate the need for patching, rather it speaks to the need to address OT network systems strategically and methodically, limiting patching to only those systems where easier approaches (such as whitelisting) may not be available.

Encourage and nurture “chameleons”

“To date, far less emphasis has been placed on cultivating and educating the next generation of OT network security professionals. With OT network attacks escalating, this is dangerous,” says Martha Gomez Vazquez, Senior Research Analyst for IDC’s Infrastructure Services Research Practice. “The ‘chameleon’ type skillset is one the industry absolutely needs, and we see opportunities for private industry to partner with leading universities to develop a curriculum for this unique skillset.”

According to Fayazfar, the security industry needs more chameleons—individuals who have a deep understanding of both IT and OT network security issues, who can see how security threats originating on one side might impact the other and serve as a glue bonding both teams together to identify and remediate threats. This is a rare skillset requiring expertise in different disciplines like mechanical engineering and computer science, but is perhaps one of the most exciting opportunities available for the next generation of security professionals—and the colleges and universities that are preparing them for the workplace of the future.

New forms of malware originating on both IT and OT networks are being discovered all the time, and no industry is spared from the repercussions that can impact critical ICS networks and SCADA systems and IT networks and assets. In this fast-changing world, organizations running OT networks must have a comprehensive, holistic view of the end-to-end IT/OT security picture; otherwise, they are only addressing half of their threat surface area and leaving themselves vulnerable to significant, costly attacks.