A persistent gap exists between awareness and action regarding investment in OT/ICS cyber defenses.
In 2023, the cybersecurity challenges in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape reached unprecedented levels. Ransomware, increasingly prevalent through new Ransomware-as-a-Service (RaaS) models, became a widespread and costly headache. While some might argue this exaggerates the risk, the growing demand for defenses is not overstated. 2024 continues to be a year full of formidable hurdles, marked by significant increases in both threats to OT systems and the countermeasures implemented by governments and organizations. This blog aims to guide organizations in the use of cybersecurity metrics and Security Key Performance Indicators (SKPI) to both improve OT security maturity levels and keep track of said improvements.
Despite the recognition among leadership within most manufacturing companies of the critical importance of OT/ICS cybersecurity, a persistent gap exists between awareness and action regarding investment in OT/ICS cyber defenses. When OT/ICS departments propose enhancements for security, executives often demand concrete evidence of increased protection—a challenge current cybersecurity technologies struggle to satisfactorily address due to the difficulty that lies in quantifying the Return on Investment (ROI) for cybersecurity measures. Executives expect OT/ICS security departments to establish success based on metrics similar to other operational organizations (manufacturing, distribution, pipelines, etc.), as boards, regulatory bodies, and insurance companies begin to demand measurable improvements within OT environments. Consequently, due to this unclear ROI, such proposals tend to be deprioritized and shelved. The gap persists as the need for action only increases.
Many industrial organizations recognize that their most critical systems—especially those involving networked and physical operations—are not given the same level of cybersecurity attention as their traditional IT counterparts. TXOne’s 2023 annual cybersecurity report reveals that in terms of security maturity, OT/ICS systems significantly lag behind IT systems, far more than initially anticipated.
There are numerous reasons for OT security trailing behind IT security. Many OT systems historically have fewer connections to the external world/internet compared to IT systems, with many industrial organizations still not fully appreciating the risks associated with IT/OT convergence. Operational demands make managing vulnerabilities and security weaknesses challenging, as changes can disrupt uptime and productivity. It’s common for IT security tools and practices to be either ineffective or pose higher risks when deployed in outdated or embedded OT systems. Furthermore, there is a significant knowledge and skill gap in deploying security within OT environments.
These factors underscore the urgent need for marked improvements in OT security posture. To counter the increasing threats, not only is increased spending necessary, but these investments also need to be measurable to satisfy boards, regulatory bodies, and insurance companies regarding the ongoing improvements made by OT organizations towards achieving their objectives.
In response to this challenge, the Cybersecurity and Infrastructure Security Agency (CISA) has published a set of voluntary cross-sector Cybersecurity Performance Goals (CPGs) aligned with the Cybersecurity Framework functions. These goals assist owners of Information Technology (IT) and Operational Technology (OT) from critical infrastructure sectors by providing a prioritized set of security practices, including standards for basic cybersecurity practices. They aim to enhance industrial cybersecurity posture, helping organizations define cybersecurity performance goals, appropriately allocate budgets and take action. Over the past few years, TXOne Networks has worked closely with clients in critical infrastructure sectors to rapidly demonstrate quantifiable improvements in OT security. This approach aligns with CISA’s CPG framework, integrating our unique OT cybersecurity solutions.
Human factors represent a vulnerable link within corporate security management frameworks. Governance, Responsibility Assignment (RACI), and user awareness are essential components of a Security Key Performance Indicator (SKPI) strategy. However, we advocate for a multi-layered protection and detection structure centered around assets, such as the CPSDR model, as a more fitting approach to risk management in OT/ICS environments, especially given the increasing automation within manufacturing lines. It is crucial to define and continuously monitor key cybersecurity metrics to thwart threats, review security postures for risk mitigation, and validate the effectiveness of security controls. The adage, “if you can’t measure it, you can’t manage it” holds particularly true in this context.
Beyond the CPG framework proposed by CISA, several cybersecurity performance goals should be taken into consideration when it comes to providing enterprises with a clear understanding of their security posture and trends. This understanding is vital for determining whether appropriate actions are needed to enhance their security maturity and for supporting secure management and sustainable operations. Metrics that can add to this understanding are as follows:
Immediate asset management involves monitoring unauthorized hardware/software installations on machines and shadow devices within the network, reflecting the state of cyber hygiene. An up-to-date asset inventory is foundational to security management. Organizations are required to regularly update their inventory, at a minimum of once a month. This inventory should encompass all assets, including those that are air-gapped, across both IT and OT domains. Asset inventories can categorize assets into new assets, those nearing the End of Life (EOL), and those already at EOL. This categorization aids in quickly identifying assets that pose a high risk.
These measures aim to proactively identify vulnerabilities and threats and diminish the risk of exploitation.
In the intricate domain of OT and ICS security, managing inbound traffic is critical to safeguarding against malicious transactions/accesses. The perimeter defenses of an OT/ICS network play a pivotal role in this endeavor, acting as gatekeepers to filter out unwarranted activities and ensuring that only essential communications are permitted. This approach includes specifying which IP addresses and ports are allowed and meticulously controlling inter-network communications between IT and OT through intermediaries. These intermediaries, such as firewalls, bastion hosts, ‘jump boxes’, or Demilitarized Zones (DMZs), are essential for maintaining a secure bridge between the networks, subject to rigorous monitoring and logging to permit entry only to approved assets.
Furthermore, organizations are advised to vigilantly track all failed login attempts, with an automated alert system for security teams in cases where multiple unsuccessful attempts were made within a short timeframe, such as five within two minutes. This protocol not only prevents unauthorized access but also contributes to a comprehensive security analysis by logging these incidents for future review.
Firewalls in OT environments can also fail due to vulnerabilities, misconfigurations, or malfunctions, posing significant risks to assets and normal operations. In such cases, deploying endpoint security solutions becomes essential for detecting malicious activities. TXOne Networks advocates that industrial organizations should enhance their detection and response capabilities for Cyber-Physical Systems (CPS) by establishing system policies based on behavioral baselines to disable unnecessary features—such as disabling programs, DLL files, drivers, and scripts that are not explicitly included in the approved application list. Detection and response ensure robust defensive resilience against potential threats. For situations where specific services need to be enabled under certain conditions, a unique policy allows authorized users to maintain operational flexibility while ensuring cybersecurity by allowing them to activate these services on specified assets:
In the realm of cybersecurity, securing outbound traffic from organizational assets, especially those accessible via the public internet, is paramount to preventing exploitation and abuse. This critical aspect of security management involves ensuring that assets do not offer services vulnerable to exploitation without implementing appropriate countermeasures. Furthermore, it emphasizes the importance of deactivating non-essential operating system applications and network protocols on internet-facing assets and restricting OT assets’ connection to the public internet strictly to operational necessities. Any deviations from these best practices must be thoroughly justified, documented, and equipped with enhanced security measures to deter exploitation attempts.
Utilizing external network scanning tools and honeypots for threat detection represents an approach to addressing unknown malicious activities by employing tools and perspectives external to industrial organizations, especially when malicious actors successfully evade internal defense mechanisms. These indicators—honeypot detection, new release URLs/public IPs, and internal client information (source high ports)—serve as key metrics for assessing an organization’s security posture and resilience against network threats. These metrics play a pivotal role in identifying attacks driven by unknown malware and the exploitation of zero-day vulnerabilities, thereby significantly enhancing the organization’s security posture.
TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through adherence to the OT zero trust methodology. At TXOne, while we do not offer solutions for systems at Purdue model levels 4 and 5 and may not meet all the cybersecurity metrics previously mentioned, we provide a comprehensive OT zero-trust solution for defending systems at level 3 and below. We work together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense.
The OT zero trust-based technologies we’ve developed go beyond the limits of traditional cyber defense to streamline management, reduce security overhead, and quickly resolve challenges. We offer both network- and endpoint-based solutions that integrate with the layered arrangements and varied assets common to work sites, providing real-time, defense-in-depth cybersecurity to both mission-critical devices and the OT network as a whole.
The OT cybersecurity metrics discussed above provide crucial insights for enhancing cybersecurity within industrial organizational contexts. Recognizing that each industrial organization may have distinct security objectives and requirements, customizing these SKPIs to align with specific organizational goals becomes imperative. Industrial organizations are encouraged to initiate this customization process by establishing an immediate and comprehensive asset inventory. Possessing a complete asset inventory enables IT and OT security teams to effectively manage available patches, track patch statuses, and identify missing patches, thereby strengthening their cybersecurity framework.
In the era of Zero Trust Architecture (ZTA), it is critical to reinforce perimeter firewall policies to adhere to the principle of least privilege, while also scrutinizing internal network traffic and endpoint behavior for any anomalies that could indicate security vulnerabilities. The investigation of policy violations goes beyond merely detecting threats such as emerging Advanced Persistent Threats (APTs), the top ten malicious software, or the Known Exploited Vulnerabilities (KEV) catalog by CISA, particularly within highly automated manufacturing facilities. It also involves a thorough analysis and response to the attack source, vector, and impacted areas.
By tailoring SKPIs to fit their unique security needs and diligently applying the principles of Zero Trust Architecture, industrial organizations can significantly enhance their defense mechanisms against complex cyber threats. This approach not only protects critical infrastructure but also ensures the continuity and integrity of manufacturing operations in an increasingly digitalized and interconnected world.
Leave a Reply