Six tips for a secure OT environment
Those who follow six recommended actions will have laid a solid foundation for effective risk mitigation and a secure OT environment. A guide to defending against cyber threats.
Strategy 1 - Raise end-user hazard awareness
Against this background, it proves useful to focus on the risk to the overall business. Companies should frame the discussion of cybersecurity in the OT context in terms of the risk of production disruption. It can be helpful to give OT engineers and operations managers access to security tools so they can visualize all of their assets and see how a single vulnerability could affect production overall.
Strategy 2 - Identify the true assets in the company
The first step is therefore comparatively simple: companies should develop a detailed understanding of the resources that exist in the OT network. This means documenting the operating systems, the firmware layers, the software installed, the libraries present, how the individual assets communicate with each other, and - perhaps most importantly - the importance of the assets to the overall OT system.
Strategy 3 - Systematic network segmentation
To enable secure interaction between IT and OT infrastructure, it is important to think through network segmentation requirements before access becomes necessary. In an emergency, it is better not to create new connections, but to establish system-to-system connectivity in a Purdue model. It's also a good idea to set up firewalls and firewall controls to create a hierarchy in the network. The Purdue model for controlling hierarchy is a framework commonly used by vendors in various industries. It is helpful in understanding how data typically flows through networks and how to secure each of the network zones and their respective elements accordingly.
Strategy 4 - Consistent threat monitoring and
Incident Management
Given the security challenges of an OT environment, an incident can be extremely damaging in a short period of time. IT security strategies such as threat monitoring and tracking and incident management can help, but they require real-time collaboration and coordination between security and OT teams. From the third-party security operations center (SOC) or managed security service provider (MSSP) to the operations manager to the OT engineer, roles and responsibilities must be clearly defined.
Strategy 5 - Connectivity and access controls
It is essential to assume "hyperconnectivity" and plan for it in advance to safeguard productivity and operations. The following basic principles apply here: Identity management, password requirements, multi-factor authentication, synchronization of access to Active Directory. Remote access capabilities can also be helpful. However, it should be avoided to use the same remote access solution for both IT and OT to reduce the attack surface and avoid downtime. In the event of an emergency, this makes it possible to clearly identify who had access to the affected system and cut the connection if necessary.
Strategy 6 - Vulnerability and Patch Management
Source:
Interested parties can also find out more about effective risk minimization and a secure OT environment in the Operational Technology Webinar October 6.