Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/26/2019
10:00 AM
Ilan Abadi
Ilan Abadi
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Go Medieval to Keep OT Safe

When it comes to operational technology and industrial control systems, make sure you're the lord of all you survey.

Digital transformation has dramatically changed the world of industrial control systems (ICS) and operational technology (OT) all the way up to today, when they have joined the online world with direct factory-floor connections to the Internet.

Production floors are exposed to an entire spectrum of nonstop cyber threats — even hostile code from the 1990s — that we in the manufacturing community see continually.

Attacks are constant, they can come at any time from anywhere in the world, and our governments and regulators cannot protect us. When planning our tactical approach to risk mitigation at our company, we sometimes liken our situation to that of an independent city-state in medieval times. Enemies are everywhere, no one can be trusted, and we are on our own.

This metaphorical model can be extended to aptly describe the state-of-the-art cybersecurity we deployed that provides us with defense in depth across our entire OT infrastructure, one that previously was unprotected in almost every layer.

To better understand how to combat current cyber threats, let's explore tried-and-true lessons from these age-old medieval tactics.

Advanced Walls, Layered Fortifications, and Lockdowns
Castles of old layered their defenses, too, using moats, multiple perimeters, and even keeps for last-ditch protection. Gates tightly controlled who came in and who got out.

Similarly, each production system in our OT world must be separated from the rest of the world by multilayer virtual walls and air gaps, with entrances and exits via approved gates only. Elements in the IT security stack that help achieve this include next-gen firewalls and network access control (NAC); however, these generally do not natively protect ICS components.

It is necessary to integrate them with an ICS cybersecurity solution that discovers and monitors Industrial Internet of Things (IIoT) and ICS/OT devices and speaks their languages, such as Modbus and DNP3, and recognizes specialized ICS devices, such as programmable logic controllers and human-machine interfaces.

The gate for today's networks is the NAC. All communications, whether incoming or outgoing, must undergo checks to ensure the communication is legitimate and not hostile. Source and destination addresses are checked and behavior patterns analyzed. Anomalies and suspicious data exfiltration can be blocked.

Installing walls and gates is critical to protecting the vulnerable production system. But we know that no walls are 100% foolproof and hostile code may still break in. The ability to lock down and isolate a city and place it under quarantine at a moment's notice, so nothing goes in or out, will be carried out by the same walls that are supposed to protect, thereby mitigating the harm to the entire country/society.

Spy Network, Hunting, and Assassins
Sometimes information brought by spies has great value and can determine the outcome of a campaign. In the past, the internal and external espionage networks created an extensive intelligence infrastructure, and thus the kingdom was defended.

The parallel today is that listening to OT production networks is critical. The ability to understand their languages — different from those used in IT systems — and simultaneously hunt for any unusual activity requires the use of a purpose-built platform designed for the unique protocols, devices, and behaviors of OT networks.

Unusual activity, or anomalies, must generate alerts in a control center or even real-time mitigation through integration with a system information and event management system, NAC, or firewall.

Citizens' Awareness
Clever people have long used deception and others' gullibility in warfare. During the Crusades, for example, medieval knights handed over a well-fortified Syrian castle when they were presented with a forged letter purportedly from the Hospitallers' Grand Master ordering them to surrender. Similarly, today's cyber enemies use human nature as vulnerabilities to bypass sophisticated cyber mechanisms. Constant training is essential to ensure awareness and alertness of the employees. Addressing this weakness requires a unique awareness program for everyone, and the availability of a hotline around the clock for when suspicion arises on the production floor.

The Royal Court
In the past, threats to the city-state were always met with a keen sense of urgency. Information was passed to the ruler and his or her insiders in the king's court. Decisions were taken and commends for action meted out.

Of course, that all pales in comparison to the volume of information, complexity, and real-time scale of today's cybersecurity decision-making support systems.

What hasn't changed is the need to deliver all the information and alerts coming from the countermeasures and monitoring systems above into a nerve center where the information from the production floor will be processed in seconds, analyzed, and deemed normal or abnormal activity.

The decision-makers in these situations must have clear protocols on how to address various scenarios, and must be armed with the tools to take action.

Think Layered Fortifications
In all layers of this defense-in-depth discussion, presented using the medieval city-state as a metaphor, the unique needs of the IIoT/ICS environment must be addressed. A comprehensive approach incorporating layered fortifications, ICS-aware continuous monitoring, and employee awareness is essential for strategic risk mitigation, and to ensure safe and continuous operation of production facilities. 

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Ilan Abadi joined Teva Pharmaceutical Industries in May 2012 as Global CISO. In his current role, Ilan is in charge of establishing cybersecurity strategy and structure and managing ongoing cyber activities, including current and future security threats. Among his ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
UPASSANOV017
50%
50%
UPASSANOV017,
User Rank: Apprentice
4/26/2019 | 11:23:19 AM
Walls --- Not just for keeping attackers out
Great post -- I like the analogy to medieval walls and the fact that they serve a purpose not just in keeping attackers out, but also in keeping attackers IN.  Network segmentation is perhaps the first and foremost step towards mitigating threats in the operational technology world...
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...