Are IoT Devices the Achilles Heel of OT Systems?

hacker working darkness Image by rawpixel.com on Freepik

When implementing cybersecurity measures, IT systems are often the first consideration. Historically, cybercriminals have made IT systems the focus of their attacks in the hopes of hijacking sensitive, private data to hold for ransom or utilise for other nefarious means. Operational technology (OT) systems, on the other hand, have long been considered inherently secure and have received less cybersecurity scrutiny.

Until recently, OT systems, which control industrial, manufacturing and infrastructure systems, were not connected to the internet, which helped shield them from the tremendous volume of cyber threats that have long plagued the IT world. However, with the arrival of Industry 4.0 and the Internet of Things (IoT), the rules have changed.

As OT systems embraced trends in digitalisation and automation, once disparate IT and OT domains have become increasingly linked. While this linkage helps drive efficiency and improve operations in many ways, it also creates more attack openings in OT systems. Unfortunately, cybercriminals are finding and exploiting these openings. McKinsey recently reported that attacks on OT systems have been increasing rapidly since the start of the COVID pandemic, with attacks jumping by 140% between 2020 and 2021. Additionally, a recent study in the U.K. found that 42% of the nation’s manufacturers suffered cyberattacks over a recent 12-month period.

Contributing to the success of these attacks is the fact that OT system operators have not traditionally focused on cybersecurity issues. Unlike IT systems, OT systems are often run by engineers who prioritise goals like physical safety and uptime, relegating cybersecurity to the back burner. However, with the uptick in digitalisation and the implementation of new IoT devices – not to mention the meteoric rise in OT attacks – this approach is clearly no longer viable. Attacks on OT systems have the potential to not only cripple a company financially but also to negatively impact millions of end-users via shutdowns, outages, and threats to public safety. To avoid a potentially devastating attack, today’s OT system operators must prioritise cybersecurity and make cyber protection a lynchpin of their overall business strategy.

Monitor and prioritise

There are a number of steps that organisations can take and best practises to adopt to protect their OT systems. First, a critical step in the fight against cyber risk is to ensure that managers have a holistic view of the OT network – that they are able to see all assets clearly. Effective cybersecurity management requires complete, timely visibility across the entire OT network so that cyber issues can be spotted quickly, no matter where they occur. It’s important to ensure that all updates and additions – whether they result from acquisitions, IoT advancements, or simply organic growth – are visible and immediately added by an always-on asset-monitoring solution.

Additionally, if an attack does occur, it’s critical that managers have the ability to quickly and accurately assess its severity and potential impact. The reality is that most organisations lack the manpower and funding to give every possible risk adequate time and attention. Thus, it is crucial that OT managers have the tools in place to properly prioritise risks, identify which assets are most important to business processes, and adjust their security resources and investments accordingly.

The importance of segmentation

In addition to continuous monitoring and effective prioritisation, one of the most important things OT managers can do is to ensure IT-OT network segmentation. While historically, IT and OT networks operated as two separate environments with distinct purposes, IoT advancements of recent years have changed all that by bringing the two networks closer together, sharing data and access. However, in the process, this has created more overall attack vectors and risks to both networks. There’s no denying that segmenting complex and interconnected networks can be complicated and costly, but it is considered an industry best practise to manage the two networks separately, despite these complications and costs. Indeed, the Cybersecurity and Infrastructure Security Agency (CISA) encourages organisations to segment and separate their networks and functions, as well as minimise any non-critical lateral communications.

Segmentation is effective because it limits the attack surface of each network, making it easier to detect and isolate attacks when they do occur. Cyberattacks have grown in sophistication with more attempts to bridge the two networks by breaching what has become known as the IT-OT “air-gap.” Network segmentation helps close this gap by preventing unauthorised access of one network from the other, thus impeding hackers who attempt to access both networks.

Beyond air-gapping, network segmentation also delivers several other benefits. First, it enables operators to utilise different security measures for each network. Second, it enables easier implementation of security controls over the access of different types of employees and access purposes. Segmentation also focuses OT security management by determining clear ownership and responsibility. Finally, going through the network segmentation process itself often helps uncover unknown or unused devices (assets) that could pose risks that would not have been detected otherwise.

It should be noted, however, that in order for segmentation to work as advertised, networks must be well-maintained with identity-based access controls in place. The standard use of static username and password combinations doesn’t provide the protection required in today’s OT environment and should be upgraded to more modern access controls immediately.

Yet another access-oriented security measure that companies should take falls on the less technical side of the spectrum. With more people working remotely, many organisations have expanded network access to a growing number of employees. So, it should come as no surprise that limiting access as much as possible to select groups of personnel is a key step in maintaining security. This includes restricting both physical and electronic access, putting tight controls in place for and system modifications, and updating security controls across all legacy equipment.

Keeping operations moving

Lastly, as touched upon earlier, a top priority for OT operators is always to ensure continuity of service. With potentially millions of end users depending on a given OT system for crucial amenities and services – like water, electricity, transportation, and more – the importance of reliable, uninterrupted service cannot be overstated. Since it is practically impossible to prevent all cyber breaches, OT cybersecurity measures must be able to preserve as much operational functionality as possible, even when subjected to an attack. This requirement must be  incorporated into any OT cybersecurity strategy.  

Cybersecurity as strategy

Times have changed for OT system operators. Advances in digitalisation and the rise of IoT and Industry 4.0 have helped drive more productive, efficient systems, but they have also brought about new vulnerabilities and exposed OT systems to the threat of cyberattacks. Combatting these threats is doable, but it requires a culture change among OT system operators. Cybersecurity can no longer be an afterthought. Instead, it must be prioritised and made a central component of overall business strategy to protect against potentially devastating attacks. With the right cybersecurity strategy in place, organisations can reap the benefits of industrial digitalisation without suffering cyber setbacks.

Article by Ilan Barda, CEO, Radiflow

Comment on this article below or via Twitter: @IoTNow_

RECENT ARTICLES

Carson City upgrades to Iteris’ advanced Vantage Apex sensors

Posted on: April 26, 2024

Iteris has announced that Carson City, Nevada has chosen to upgrade the city’s intersection detection sensors to Iteris’ Vantage Apex hybrid sensors.

Read more

Make the Intelligent Choice: Embed X103 in Smart City Outdoor Devices

Posted on: April 25, 2024

The adage “less is more” is the current state of digital transformation, starting with existing technology that has already proven successful – and then further adapting and streamlining. The “smart

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more