IT - OT Cybersecurity-The Great Divide
IT - OT Cybersecurity-The Great Divide
CYBERSECURITY:
THE GREAT DIVIDE
Contents
2
Five questions every CISO should
ask about OT cybersecurity Five questions every
CISO should ask about
OT cybersecurity
Who should be involved in the OT cybersecurity program? Extend IT security to the
This is the first question for a reason. In many information technology (IT) organiza- plant floor
tions, the answer is clear. Security requires networking, endpoint, cloud, regulatory and
The IT/OT Divide: Expert
other IT partners. In operational technology (OT) cybersecurity, however, getting the Interview Series
“who” right is critical and often more complex.
IT/OT collaboration must
drive digitalization
Depending on the organization, the who may include the head of process control tech-
Six reasons why centralized
nology; the SVP/EVP/VP of operations, manufacturing or supply chain; influential plant cybersecurity doesn’t
managers; or quality or similar regulatory personnel. This is on top of the more typical deliver value to OT
groups involved in IT security. Bridging the IT/OT divide:
Interview with Wayne Dorris
We have seen many organizations stall if key operations personnel are not included early Throwback Attack:
in the process to identify bottlenecks or technical challenges. Successful chief informa- Lessons from the Aurora
vulnerability
tion security officers (CISO) create a steering committee of IT and OT personnel in addi-
tion to the operations leaders who understand the technical challenges of the systems. SolarWinds attack changing
nature of cybersecurity for
ICSs
Without this joint team, organizations struggle to gain buy-in for the necessary techni-
cal changes and required support personnel to achieve success. Together, this group
forms the right process for deciding aspirations, technical feasibility and more.
protection, network anomaly detection, asset visibility, and inventory for improved vul- Five questions every
nerability management, security event monitoring and analysis.
CISO should ask about
OT cybersecurity
There is no absolute right answer to this. Some will argue for deploying network pro- Extend IT security to the
plant floor
tection technology to create a barrier. Others will argue for vulnerability assessment or
asset visibility and inventory. The IT/OT Divide: Expert
Interview Series
The right answer depends on the organization’s starting point. However, the founda- IT/OT collaboration must
drive digitalization
tion of all these initiatives is a robust asset inventory with “360-degree” visibility on
hardware, software, network connections, users and accounts, vulnerabilities, etc. To Six reasons why centralized
cybersecurity doesn’t
make network protection effective, you must know what you are protecting and how deliver value to OT
it needs to communicate. To make proper vulnerability management decisions, you
Bridging the IT/OT divide:
need clarity of the comprehensive 360-degree risk, because not all assets in OT can be Interview with Wayne Dorris
patched or upgraded. Alternative compensating controls may be needed, and prioriti-
Throwback Attack:
zation is key. Security event monitoring requires knowledge of the assets to monitor, as
Lessons from the Aurora
well as their operations and asset criticality. vulnerability
decade. You likely have dozens of tools at your disposal to address cybersecurity ac- Five questions every
cording to Check Point, Gartner and others. So why in the world do you need a specific
CISO should ask about
OT cybersecurity
OT cybersecurity program?
Extend IT security to the
plant floor
The reality is these systems truly are different but perhaps not in exactly the ways OT
folks or original equipment manufacturer (OEM) vendors often say. They are sensitive The IT/OT Divide: Expert
Interview Series
to change or traditional IT security scanning. They are highly integrated. They do op-
erate many legacy operating systems due to long lifecycles. They include many em- IT/OT collaboration must
drive digitalization
bedded systems that cannot be scanned or managed in the same way a Windows PC
or cloud server can. And the downside risk of acting on a false security alarm can be Six reasons why centralized
cybersecurity doesn’t
operationally devastating. deliver value to OT
Our suggestion is to employ OT systems management. These are the same techniques
IT conducts on IT systems (and actually represent more than 70% of all IT security
tasks). This includes functions such as patching, vulnerability management, configura-
tion management, user and access management, and more.
This comprehensive set of management actions ensures protection and hardening of these
5
Five questions every CISO should ask about OT cybersecurity
devices in advance, as well as the detection of anomalies from ongoing attacks. They also Five questions every
align IT and OT security into consistent practice areas that can be monitored and tracked.
CISO should ask about
OT cybersecurity
Extend IT security to the
How should an OT security program be managed? plant floor
There is no one perfect way to manage a cybersecurity program. It depends on the
way the organization is structured more broadly. Is the culture top-down with a drive The IT/OT Divide: Expert
Interview Series
for operational consistency, even if it may take longer to align different parts of the
organization? Is the culture one where targets are set, but business units are left to de- IT/OT collaboration must
drive digitalization
termine how best to hit those targets? Is there a close working relationship between IT
and OT? These subquestions inform how best to organize your approach. Six reasons why centralized
cybersecurity doesn’t
deliver value to OT
There are several key elements regardless of the overall structure:
Bridging the IT/OT divide:
Interview with Wayne Dorris
• Establish a target early on that allows for measurement and tracking. We have
Throwback Attack:
seen great success leveraging the Center for Internet Security top 20, but there are Lessons from the Aurora
other targets and models to use. Selecting one is key. vulnerability
• Build traction early with visibility into key risks and by addressing key vulnerabili-
ties and risks.
This article originally appeared on Verve Industrial’s website. Verve Industrial is a CFE
Media content partner.
6
Extend IT security to the plant floor
Five questions every CISO
Extend IT security to
for manufacturers, and while it isn’t as fraught as it used to be, challenges remain. the plant floor
The IT/OT Divide: Expert
Eric Knopp, business manager for Rockwell Automation, said, “The cybersecurity Interview Series
threat is real in manufacturing. And it’s costly not just from a production standpoint,
IT/OT collaboration must
but from a public relations standpoint,” in the presentation “The Next Phase of the drive digitalization
IT/OT Integration: Extending IT Security to the Cell/Area Zone of the Plant Architec-
Six reasons why centralized
ture,” at Automation Fair at McCormick Place in Chicago. cybersecurity doesn’t
deliver value to OT
Security challenges for industrial networks Bridging the IT/OT divide:
Knopp said companies need to have an effective cybersecurity plan in place. The Interview with Wayne Dorris
problem is what qualifies as a priority for the IT team might not resonate in the same Throwback Attack:
way on the plant floor. Lessons from the Aurora
vulnerability
There are many security challenges in industrial environments, but two of the most SolarWinds attack changing
nature of cybersecurity for
notable, Knopp said, are a lack of visibility and insecure design. ICSs
“In the IT space,” Knopp said, “everything is structured. In the OT space, it’s very
common that the networks are thrown together as you go. As a result, the first step
many customers have to take is determine what is and isn’t on the network. You can’t
move forward if you don’t have an idea of what assets you have.”
With insecure design, it’s about a lack of segmentation. Knopp said that while custom-
ers have gotten good with the IT/OT separation with the firewall, there are still prob-
7
Extend IT security to the plant floor
Throwback Attack:
3. Behavior analysis Lessons from the Aurora
vulnerability
4. Content protection SolarWinds attack changing
nature of cybersecurity for
5. Cloud security and threat intel. ICSs
To keep the IT and OT worlds separate and secure, an industrial demilitarized zone
(IDMZ) can help. If information or access is needed on one side to the other, the IDMZ
acts as a place where both sides can meet and exchange information as needed with-
in a secure context.
Even with that, Didier said, there are challenges. “We see very frequently as these two
9
Extend IT security to the plant floor
worlds are colliding there is some friction. Part of that is because there’s things the IT Five questions every CISO
should ask about OT
folks understand related to security the OT folks don’t understand. OT understands cybersecurity
context related to the devices, etc., and what is needed regarding assets.”
Extend IT security to
the plant floor
It’s all about context in the end. Give the OT user the context they need in a manner
they can understand and provide them with the tools to do their job safely and se- The IT/OT Divide: Expert
Interview Series
curely.
IT/OT collaboration must
drive digitalization
Three ways to merge IT and OT insights
Six reasons why centralized
IT and OT can help each other, Didier said, in several ways to make the flow of infor-
cybersecurity doesn’t
mation a little smoother. He cited three use case examples on how they can do that. deliver value to OT
10
Extend IT security to the plant floor
3. On-demand remote access. This allows OT to manage access as defined by IT Five questions every CISO
should ask about OT
security. A specific asset in the machine being serviced must be accessible to the ma- cybersecurity
chine building over a remote virtual private network (VPN). There’s no dependency on
Extend IT security to
IT to enable access during the maintenance window, which reduces downtime.
the plant floor
While a full convergence might not be happening anytime soon, there are many steps The IT/OT Divide: Expert
Interview Series
manufacturers can take to make the process easier.
IT/OT collaboration must
drive digitalization
Chris Vavra
Chris Vavra, web content manager, Control Engineering, CFE Media and Technology, Six reasons why centralized
cybersecurity doesn’t
cvavra@[Link]. deliver value to OT
Throwback Attack:
Lessons from the Aurora
vulnerability
11
The IT/OT Divide: Expert Interview Series
Six reasons why centralized
cybersecurity doesn’t
deliver value to OT
Throwback Attack:
Lessons from the Aurora
vulnerability
12
IT/OT collaboration must drive
digitalization Five questions every CISO
should ask about OT
cybersecurity
I ndustry talk about the convergence of operations technology (OT) and information
technology (IT) assumes the two sides will merge into some common domain using
IT methodologies, devices, tools, and team expertise — with all of it being as appli-
Extend IT security to the
plant floor
IT/OT collaboration
That notion, however, can be seriously misleading. must drive
digitalization
By itself, IT/OT convergence does little to actually move end-to-end digitalization
Six reasons why centralized
forward. While it might provide short-term cost savings through more technology cybersecurity doesn’t
sharing and consolidated IT and OT teams, the performance gains will be incremen- deliver value to OT
tal, at best, and not the quantum gains digitalization can unleash. Shop-floor applica- Bridging the IT/OT divide:
tions of IT-oriented hardware, software, connectivity, and services always will need to Interview with Wayne Dorris
be far more robust, precise and reliable than those needed in offices. Throwback Attack:
Lessons from the Aurora
vulnerability
Instead of IT/OT convergence, industrial enterprises require a deep, cross-function-
al, and proactive collaborative approach that combines the respective intellectual SolarWinds attack changing
nature of cybersecurity for
power, know-how, and experience of IT and OT teams to make today’s industrial
ICSs
operations fully digital enterprises. The goal would be to collectively understand the
unique terminology and design requirements for all network environments, especially
in context of the network as the strategic backbone of a fully digital industrial enter-
prise.
IT/OT collaboration
must drive
digitalization
Six reasons why centralized
cybersecurity doesn’t
deliver value to OT
once separate functions and networks in most large companies, but they converged Throwback Attack:
Lessons from the Aurora
years ago thanks to packetized voice-over-IP (VoIP) technology. What’s more, OT
vulnerability
engineers have adapted many enterprise IT technologies to address the needs of a
diverse industrial landscape that spans factories, warehouses, logistics facilities, plus SolarWinds attack changing
nature of cybersecurity for
power, marine, mining, and oil and gas industries. ICSs
Among those technologies are Ethernet-enabled wired and wireless local area net-
works (WLANs) as well as industrial PCs, switches and routers. Industrial operators
are continue to adapt emergent enterprise IT technologies, such as the cloud, Big
Data, and advanced analytics, compelled by the economic advantages and competi-
tive imperatives of the Industrial Internet of Things (IIoT).
14
IT/OT collaboration must drive digitalization
The benefits of these IT adaptations have included big reductions in costs, laten- Five questions every CISO
should ask about OT
cies, cycle times and data collection errors. Industrial communications — the digital cybersecurity
thread — also has helped interconnect what were once islands of activities and data,
Extend IT security to the
while helping to break down operational silos. Greater transparency and operation- plant floor
al visibility also enable far better decision support for optimizing asset utilization as
The IT/OT Divide: Expert
well as production quality, flexibility and costs. Interview Series
IT/OT collaboration
Adapting enterprise IT for complex OT applications must drive
Adapting IT solutions for complex OT applications goes far beyond putting a veneer digitalization
of ruggedization on devices.
Six reasons why centralized
cybersecurity doesn’t
For example, OT automation systems consisting of hundreds or even thousands of deliver value to OT
field-level devices — sensors, actuators, valves and instrumentation — need precise, Bridging the IT/OT divide:
millisecond synchronizations of activities. Supporting networks must be determinis- Interview with Wayne Dorris
tic. Data commands must arrive when they are supposed to and not on a best-effort Throwback Attack:
basis. A network hiccup that delays an outbound email by a half-second might not be Lessons from the Aurora
noticed by a user, but a similar delay in a controller command arriving at its destina- vulnerability
The real point of IT/OT collaboration is to establish vibrant digital threads of data
running transparently, seamlessly, and securely through businesses from the factory
floor to the boardroom and everywhere in between.
15
IT/OT collaboration must drive digitalization
2. Asset availability and utilization. Networked industrial systems can create busi- Throwback Attack:
ness risks most IT teams may not yet had to consider, such as the damage or loss of Lessons from the Aurora
vulnerability
expensive equipment or the production of faulty goods. Production disruptions also
can cause industrial enterprises to miss customer commitments. Poor asset availabili- SolarWinds attack changing
nature of cybersecurity for
ty and utilization also can lower investment returns. ICSs
3. Outdated or custom systems. IT is used for applying frequent and consistent soft-
ware patches and upgrades, while industrial environments tend to be more systemic:
one small change in one component or subsystem can trigger changes or disruptions
elsewhere. Many legacy plant and factory control systems, as a result, may be running
outdated operating systems that cannot easily be swapped out or a custom configura-
tion that isn’t compatible with the standard enterprise IT security packages.
16
IT/OT collaboration must drive digitalization
IT/OT collaboration
2. Productivity and quality control. Losing control of the manufacturing process or must drive
any related devices are an OT team’s worst nightmare. What if some malicious party digitalization
was able to reprogram an assembly process to skip a few steps or halt production
Six reasons why centralized
entirely — resulting in a faulty product that could potentially injure a customer user? cybersecurity doesn’t
deliver value to OT
3. Data leaks. While data breaches have long been a top concern for traditional IT Bridging the IT/OT divide:
teams, they are somewhat new to OT teams used to working with closed systems. Interview with Wayne Dorris
However, given the types of industrial systems coming online, securing transmitted Throwback Attack:
data is critical. Lessons from the Aurora
vulnerability
4. Industrial security. While OT teams can see the benefits of moving from closed SolarWinds attack changing
nature of cybersecurity for
systems to open networks, they worry about a seeming lack of IT experience and
ICSs
potential solutions for rigorous OT needs, including real-time communications and
cybersecurity traditional office solutions can’t provide.
17
IT/OT collaboration must drive digitalization
ing plant and in the field, to ensure only approved devices and systems are commu- Five questions every CISO
should ask about OT
nicating with each other. cybersecurity
critical to the organization and which metrics need improvement. They should focus SolarWinds attack changing
on the unique requirements of production operations while managing risks of down- nature of cybersecurity for
ICSs
time and security. Together, they should consider these questions to identify key
goals for success:
• How can data-driven decisions be integrated within the constraints of existing Five questions every CISO
should ask about OT
practices? cybersecurity
• Wireless communications
• Security requirements.
respective roles and backgrounds — can data flows be optimized over a company’s Five questions every CISO
should ask about OT
core network, the backbone of a fully digitalized industrial enterprise. cybersecurity
Throwback Attack:
Lessons from the Aurora
vulnerability
20
Six reasons why centralized
cybersecurity doesn’t deliver Five questions every CISO
should ask about OT
cybersecurity
value to OT Extend IT security to the
plant floor
M any industrial leaders operate their businesses with a false sense of security. Ran-
somware events such as the ones faced by Norsk Hydro, Hexion, and Momentive
in 2019, which caused considerable operational disruption, serve as a warning to all
The IT/OT Divide: Expert
Interview Series
Throwback Attack:
• 56% of respondents reported at least one shutdown or operational data loss per Lessons from the Aurora
year with many reporting outages, damage, injury, and even environmental conse- vulnerability
quences from incidents involving OT, SolarWinds attack changing
nature of cybersecurity for
ICSs
• Insider threats represented the majority of attacks in OT
While cyber attacks continue to rise, many companies feel ill-prepared to manage OT
cybersecurity risk. The same Ponemon Institute surveys highlighted a lack of alignment
between OT and IT security, difficulties in finding and building industrial cyber skills in
21
Six reasons why centralized cybersecurity doesn’t deliver value to OT
employees, and an incorrect belief that protections designed for IT are effective for OT Five questions every CISO
should ask about OT
as some of the key challenges facing the organizations. The reasons include cybersecurity
Six reasons
why centralized
cybersecurity doesn’t
deliver value to OT
Bridging the IT/OT divide:
Interview with Wayne Dorris
Throwback Attack:
Lessons from the Aurora
vulnerability
23
Six reasons why centralized cybersecurity doesn’t deliver value to OT
Six reasons
There are, however, fundamental differences in the Level of segmentation, trade-offs and why centralized
OT applicability. Courtesy: Resiliant cybersecurity doesn’t
intended use of these two networks. On the IT side,
devices are mostly general-purpose computing devic- deliver value to OT
es (e.g. computers, phones, servers, etc.), network performance variation is more of nui- Bridging the IT/OT divide:
sance than a real disruption to core operations, and standardized endpoint security tools Interview with Wayne Dorris
(e.g. anti-virus) are easily applied and maintained over time. On the contrary, cyber-phys- Throwback Attack:
ical systems connected to OT networks are special purpose devices (e.g. an anesthesia Lessons from the Aurora
vulnerability
machine, computer numerical control [CNC] machine, etc.) installed to function in a
specific manner and support specific processes in operations. Therefore, standardized SolarWinds attack changing
nature of cybersecurity for
endpoint security tools cannot be applied to these special purpose devices without en- ICSs
suring the integrity of their functional performance in the given environment. Further, OT
network performance degradation due to security tools can be operationally disruptive.
sector where attackers use knowledge of an organization’s vulnerabilities, operating Five questions every CISO
should ask about OT
environment, compromised user credentials, etc. In fact, in 70% of the cases, publicly cybersecurity
known vulnerabilities are exploited.
Extend IT security to the
plant floor
This approach also falls short in managing the risk of insider attacks which are on the
The IT/OT Divide: Expert
rise. According to Nucleus Cyber report, 60% of companies experienced insider attacks Interview Series
in 2019. Ill-intending, unskilled or misled insiders can pose big risks to organizations.
IT/OT collaboration must
drive digitalization
2. Granular segmentation may not actually be feasible
Six reasons
Granular segmentation often comes at the expense of network performance. Further,
why centralized
OT environments present considerable diversity in device types, intended functions, cybersecurity doesn’t
and associated processes. Hence, deploying and managing policies for a multitude of deliver value to OT
scenarios adds significant cost in terms of policy management using a highly skilled
Bridging the IT/OT divide:
workforce. Unmanaged policies, at the same time, can either lead to operational dis- Interview with Wayne Dorris
ruptions or security vulnerabilities. When a Midwest-based hospital failed to manage
Throwback Attack:
policies and parameters for their medical devices with needed operational changes, Lessons from the Aurora
the network started to reject genuine medical devices and caused disruptions in pa- vulnerability
tient care. Granular segmentation, therefore, may not be applicable for many OT appli- SolarWinds attack changing
cations. nature of cybersecurity for
ICSs
detection (ATD), micro-segmentation (i.e. software defined network), etc. may fail to Five questions every CISO
should ask about OT
deliver much value to OT cybersecurity in most cases. The key reasons are: cybersecurity
rise. According to Nucleus Cyber report, 60% of companies experienced insider attacks SolarWinds attack changing
in 2019. Ill-intending, unskilled or misled insiders can pose big risks to organizations. nature of cybersecurity for
ICSs
or security vulnerabilities. When a Midwest-based hospital failed to manage policies Five questions every CISO
should ask about OT
and parameters for their medical devices with needed operational changes, the network cybersecurity
started to reject genuine medical devices and caused disruptions in patient care. Granu-
Extend IT security to the
lar segmentation, therefore, may not be applicable for many OT applications. plant floor
Six reasons
why centralized
cybersecurity doesn’t
deliver value to OT
Bridging the IT/OT divide:
Interview with Wayne Dorris
Throwback Attack:
Lessons from the Aurora
vulnerability
OT as it would be in IT. In other words, it is difficult to have standardized responses in Five questions every CISO
should ask about OT
the case of OT devices. Extending IT security practices based on centralization, ear- cybersecurity
ly detection and standardization onto the OT side can result in high costs and large
Extend IT security to the
unmanaged risk. Applied generally, without consideration of the OT devices and en- plant floor
vironment, certainly leads to low ROI while providing a false sense of security to the
The IT/OT Divide: Expert
organization. Interview Series
An optimal solution may include perimeter controls, IDS at the enterprise level to
detect any unusual activities before the OT network is infected, datalink (VLAN) or
network layer segmentation, demilitarized zones (DMZ) where data and services can
be shared, cybersecurity training for all personnel, and active device-level risk manage-
ment using relevant controls. It would ensure effectiveness, efficiency and adaptability
in cybersecurity risk management over time.
31
Six reasons why centralized cybersecurity doesn’t deliver value to OT
Successful execution of the suggested strategy, however, requires a considerable level Five questions every CISO
should ask about OT
of change management. Hence, industrial organizations must make OT cybersecuri- cybersecurity
ty a top business priority, link it to the board of directors’ risk oversight process, and
Extend IT security to the
operationalize a robust cybersecurity program via cross-functional engagement. The plant floor
program needs to be championed by an operating executive who is also accountable
The IT/OT Divide: Expert
for operational excellence. Doing this ensures the right stakeholders are involved and Interview Series
the right trade-offs are made around operational performance, cost, and security. More
IT/OT collaboration must
importantly, it helps institutionalize a culture of security – the best defense mechanism! drive digitalization
This is analogous to Toyota’s approach to quality.
Six reasons
why centralized
Overall, cyber-physical systems together with the Internet of Things (IoT), Big Data and cybersecurity doesn’t
cloud computing in Industry 4.0 can deliver improved productivity, quality and compli- deliver value to OT
ance. According to some experts, increased interconnectedness and digital collabo-
Bridging the IT/OT divide:
ration across the full supply-chain can further reduce operational costs by at least 30% Interview with Wayne Dorris
and reduce inventory requirements by as much as 70%. The exponentially increasing
Throwback Attack:
connectivity, however, also raises concerns around centralized cybersecurity. Hence, Lessons from the Aurora
organizations will have to make OT cybersecurity a core competency to win in today’s vulnerability
digitally connected environment. SolarWinds attack changing
nature of cybersecurity for
This article originally appeared in Resiliant’s Knowledge Center. Resiliant is a CFE Me- ICSs
32
Bridging the IT/OT divide: Interview with Wayne Dorris
cybersecurity doesn’t
deliver value to OT
33
Throwback Attack: Lessons from
the Aurora vulnerability Five questions every CISO
should ask about OT
cybersecurity
L essons can be learned from prior cybersecurity efforts, even older ones, as this 2007
demonstration showed. Are you aware of the eight ways to mitigate the Aurora
vulnerability?
Extend IT security to the
plant floor
Generators for large installations use circuit breakers controlled by a system of pro-
34
Throwback Attack: Lessons from the Aurora vulnerability
tective relays. Protective relays are a science unto themselves; they monitor what is Five questions every CISO
should ask about OT
happening on the wiring connected to the generator and protect it from damage from cybersecurity
anomalous conditions on the grid or in the generator.
Extend IT security to the
plant floor
Among those conditions are overcurrent, undercurrent, undervoltage, phase imbal-
The IT/OT Divide: Expert
ance, loss of synchronism and ground fault. Each relay has an American National Stan- Interview Series
dards Institute (ANSI) designated device number and must be periodically checked
IT/OT collaboration must
and calibrated to avoid damage to the generator or to the distribution system. When a drive digitalization
protective relay senses a condition it is designed to monitor, the relay trips the circuit
Six reasons why centralized
breaker and disconnects the generator or connected equipment from the line. cybersecurity doesn’t
deliver value to OT
The point of these protective systems is to keep the power grid stable and operat- Bridging the IT/OT divide:
ing by detaching faulted devices from the system, leaving as much of the distribution Interview with Wayne Dorris
system operating as possible. In the United States and the rest of North America, the
Throwback Attack:
power grid operates at 60 Hz. For any power grid to function properly, all the generat- Lessons from the
ing plants connected to it must be synchronized by voltage, phase and frequency. Aurora vulnerability
SolarWinds attack changing
If any of the generators are out of synchronization, there will be an imbalance in the nature of cybersecurity for
system, which could damage a generator, the distribution system or other connected ICSs
equipment. If a generator were to fall out of synchronization, the phase imbalance pro-
tective (synchronism) relays would trip and disconnect the generator from the line. If
this did not happen, then the tremendous force of the system would attempt to resyn-
chronize the machine.
The generator’s electrical and physical characteristics would naturally resist this, and
large torques would be exerted on the driving shaft and high currents produced in the
35
Throwback Attack: Lessons from the Aurora vulnerability
generator windings. These current spikes can and will damage other equipment, such Five questions every CISO
should ask about OT
as transformers and motors. cybersecurity
Prior to initiating the test, the generator was synchronized to the grid and operating
as expected. Upon commencement of the test, the protective systems first checked for
36
Throwback Attack: Lessons from the Aurora vulnerability
synchronism; then they disconnected the generator from the grid. Being unloaded, the Five questions every CISO
should ask about OT
generator naturally accelerated. Then, the circuit breaker was closed again, tying the cybersecurity
generator back into the grid. The generator was violently thrown back into synchroni-
Extend IT security to the
zation by the overwhelming force of the grid; the force of the other connected genera- plant floor
tors and devices pulled the small mass of the test generator back to synchronism with
The IT/OT Divide: Expert
the 60 Hz grid frequency. Interview Series
Methods of cyberattack
Connecting a generating source to the electric grid requires frequency, voltage and
37
Throwback Attack: Lessons from the Aurora vulnerability
phase rotation to be matched for a proper and safe connection to the grid. Protective Five questions every CISO
should ask about OT
relays monitor each of these parameters to ensure a successful connection; if any of cybersecurity
these parameters exceed tolerance, the machine is disconnected to prevent damage
Extend IT security to the
to the machine or the grid. plant floor
Throwback Attack:
The root cause of the Aurora vulnerability is poor physical security and poor cybersecu- Lessons from the
rity. Designers and operators must consider cybersecurity at the outset and plan for all Aurora vulnerability
possible modes of attack, including physical attacks on the facility. The aurora vulner-
SolarWinds attack changing
ability, if not mitigated, can extensively damage much of the equipment connected to nature of cybersecurity for
the grid, and could cause extended power outages. The attack does not have to hap- ICSs
pen at the generator or the substation; it can be initiated from anywhere.
As higher value options are hardening their defenses, critical infrastructure and in-
dustrial control systems (ICSs) are becoming prime targets. Most attacks are remotely
conducted. However, poorly-secured facilities also can provide opportunity for on-the-
ground physical attacks.
38
Throwback Attack: Lessons from the Aurora vulnerability
Direct hacking is a mode of attack that physically accesses protective relay systems and Five questions every CISO
should ask about OT
reprograms the devices to affect the anomaly – directly hacking the protective relay. cybersecurity
This requires physical access and both power system and hacking knowledge. This
Extend IT security to the
attack implies it could be performed by an insider or someone who has breached the plant floor
physical security of the facility.
The IT/OT Divide: Expert
Interview Series
Anyone with physical access to the substation could open and close the breaker man-
IT/OT collaboration must
ually and achieve the same result – manual switching bypasses any automatic control drive digitalization
or protective systems. This attack falls under the “disgruntled employee” or malicious
Six reasons why centralized
vandalism category. cybersecurity doesn’t
deliver value to OT
Compromised communication channels are a common access method for remotely Bridging the IT/OT divide:
attacking a wide variety of control systems. In fact, it is the most common attack vector Interview with Wayne Dorris
given the physical location of most threat actors is offshore. As with any other attack,
Throwback Attack:
the chief culprits for allowing a successful breach are poor cyberhygiene, poor pass- Lessons from the
word policy and poor network architecture and protection. The human element also Aurora vulnerability
plays a large part in the mitigation of this risk and should not be ignored.
SolarWinds attack changing
nature of cybersecurity for
A third, and increasingly common attack vector, is infiltrating the supply chain. If an ICSs
attacker can access the protective systems during manufacturing or at any point prior
to installation, embedded code can be injected into the device that will trigger on a
specific date or event. This attack has been seen in recent events where software integ-
rity has been compromised while in the supply chain between vendor and end users
(SolarWinds, for example).
39
Throwback Attack: Lessons from the Aurora vulnerability
3. Encrypt and protect communication channels. Use a firewall with virtual private
network (VPN) capability for any outside access requirements. Institute a secure
40
Throwback Attack: Lessons from the Aurora vulnerability
and encrypted (and unadvertised) backup communications channel for use if the Five questions every CISO
should ask about OT
primary channel is compromised. cybersecurity
8. Audit and strengthen physical security. Threat actors who can infiltrate a facility Five questions every CISO
should ask about OT
and physically access equipment can perpetrate an enormous amount of damage. cybersecurity
attacks; transformers and substations were damaged using similar techniques. Five questions every CISO
should ask about OT
Learn from cybersecurity mistakes, demonstrations cybersecurity
43
SolarWinds attack changing
nature of cybersecurity for ICSs Five questions every CISO
should ask about OT
cybersecurity
T he SolarWinds attack has been in the news a lot lately due to the widespread
scope of the attack, which went beyond one company or one specific target indus-
try. The SolarWinds attack affected more than four-fifths of the Fortune 500 companies
Extend IT security to the
plant floor
The actors behind the SolarWinds attack, Byres said, were very professional and very Throwback Attack:
well-organized in their attack. It was likely financed and backed by a nation-state, and Lessons from the Aurora
vulnerability
they played the long game, initiating a multi-stage attack that lasted more than 18
months. SolarWinds attack
changing nature of
cybersecurity for ICSs
This kind of attack might seem like the kind of thing manufacturers might not have to
worry about. It’s all information technology (IT), right? Not so, according to Byres. Op-
erational technology (OT) has just as much, if not more, to worry about.
Industrial control systems (ICSs) and the supply chain, Byres said, are the next wave of
cybersecurity threats. Supply chain attacks in these areas in 2020 were up 430% com-
pared to 2019. This is not going to stop. Why? Because they’re effective.
44
SolarWinds attack changing nature of cybersecurity for ICSs
Throwback Attack:
Lessons from the Aurora
vulnerability
Cybersecurity attacks that take The SolarWinds attack were likely financed and
backed by a nation-state, initiating a multi- SolarWinds attack
advantage of trust stage attack that lasted more than 18 months, changing nature of
“They’re taking advantage of the trust we [in- according to Eric J. Byres of aDolus. Courtesy: cybersecurity for ICSs
aDolus, ARC Advisory Group
dustrial companies] have with our vendors,”
Byres said.
Industrial control systems supply chains are easy targets. Many supply chains are a mix
of different programs, codes and standards. Finding an exploitable weakness isn’t that
hard because there are many potential gaps in the networks.
45
SolarWinds attack changing nature of cybersecurity for ICSs
And like companies, the actors behind these attacks seek a good return on investment Five questions every CISO
should ask about OT
(ROI). Given the level of sophistication of the SolarWinds attack and the depth of the cybersecurity
infiltration, it’s safe to say they got their money’s worth. Hitting a company’s supply
Extend IT security to the
chain and stealing information is no different. plant floor
Byres advocated a software bill of materials (SBOM), which is a nested inventory and a
list of ingredients that make up software components. An SBOM, like a regular BOM,
identifies and lists components, information about the components and the relation-
ships between them.
Byres listed three things that are needed for SBOMs to work:
46
SolarWinds attack changing nature of cybersecurity for ICSs
Throwback Attack:
Lessons from the Aurora
For a software bill of materials (SBOMs) to work,
vulnerability
1. Cloud-based aggregation.
they need cloud-based aggregation, machine
SolarWinds attack
learning and graph database technology.
2. Machine learning for correlating multiple Courtesy: aDolus, ARC Advisory Group
changing nature of
databases.
cybersecurity for ICSs
• For ICS vendors, they help track dependencies and component-based issues. They Five questions every CISO
should ask about OT
also help vendors track and detect evolving third-party security issues. cybersecurity
48
IT/OT Cybersecurity:
The Great Divide
Content Archive Thank you for visiting the IT/OT Cybersecurity: The Great Divide
eBook!
Threats &
Vulnerabilities
If you have any questions or feedback about the contents
in this eBook, please contact CFE Media at
customerservice@[Link]
49