The most common OT security weaknesses and what we can do about them
Operational technology is where digital meets the physical world. It is the control system making sure the power plant is running, the oil and gas processing offshore is working, that the dairy plant can ship cheese to the store. It is also the medical technology supporting hospitals in giving care, the traffic control systems onboard a ferry, whether autonomous or not. It may even be the internet connected washer in your home, or the coffee machine that notifies you on your cell phone it is time to clean it.
In this post we talk about security for the more critical control systems, those that have long life times, exist in industrial plants or hospitals - and that would cause great problems in society if they become impossible to trust. Coffee is important, but having power in the outlet you plug in your coffee maker to is perhaps even more so.
A security architecture for your OT network acts as your blueprint for defense. It defines how various security controls – like firewalls, segmentation, and access controls – work together to safeguard your industrial control systems (ICS) from cyber threats. By design, it should minimize risk to acceptable levels while ensuring operational efficiency. This architecture should be a living structure, informed by regular risk assessments and evolving alongside your OT infrastructure.
I have worked on OT network security across many business sectors and firms. Weather you operate railway support system, oil and gas control systems or water purification plants, the following seem to be common weaknesses.
A basis for thinking about network security in OT systems has long been the Purdue model. This model separates the OT functions into different layers, generally separated by function and the time scales they operate on.
For a good introduction to the Purdue model and its history, ZScaler has written a good overview post: What Is the Purdue Model for ICS Security? | Zscaler.
Often we see networks implementing some of the principles of the Purdue model, without thinking too much about zones and security enforcement. One such example is to include a DMZ between enterprise IT and the OT network, but where the network inside the OT zone is flat. This is still better than not having any separation between the environments, or a separation with a firewall but without the DMZ.
Chinks in the Armor: 3 Common OT Network Security Weaknesses
Here are three common security weaknesses that can leave your OT network vulnerable:
There are many factors contributing to weaknesses in OT networks, but a primary driver for fragility here is complexity. Not only are there many different systems that are being interconnected, there is also a lot of complexity in the organizations engineering and operating the systems. Supply chains are deep, and the level of collaboration is often not ideal.
There is lots of guidance for how to secure OT networks, with perhaps the IEC 62443 standard being the most used and accepted. The problems we see are not there because there is no guidance on what good practice looks like. The problems we see exist because of complex value chains, lack of oversight, unclear responsibilities, and a lot of technical debt for historical reasons. While using IEC 62443 is ideal, you may want some quick wins until you get bigger initiatives to bear fruits, and typically getting an overview of the systems you have in your plant, taking stock of the risks and planning some mitigations can take you a big step forward in security maturity. Here’s a post I wrote about how to get started in 2022: Impact of OT attacks: death, environmental disasters and collapsing supply-chains – safecontrols.
Let’s consider the 3 pitfalls from above in some more detail:
Lax access control
There are three common problems with access control and privileges:
Recommended by LinkedIn
Breaking network segregation
Network segregation is an effective security control against lateral movement. The firewall can help you stop an attacker from moving from a low criticality system to a high criticality system. Some common weaknesses here include:
A security level target (SL-T) is a concept in IEC 62443 where a zone is given a target security level from 1-4, with 1 being the least restrictive, and 4 being most restrictive. There are then different requirements to the systems based on the SL-T.
Low detection capability
Observability and detection engineering is often a neglected area in OT systems. Many operators rely on antivirus, without forwarding alerts to real-time monitoring. This makes it possible for an attacker to stay undetected in the network for quite some time, even if the technology detects suspicious activity. It doesn’t help if nobody notices. To remedy the problem, take steps to make staying undetected in the OT network hard:
Words about priorities
Prioritization is important, and not always so easy. The weaknesses described in this post are quite common, and may be a good place to start. These weaknesses typically lead to exploitable vulnerabilities. The good news is that the remedies are not expensive, although they can be more difficult than they seem due to organizational constraints.
When prioritizing, make sure to take both the internal and external context into account.
We need all of these to help us decide which security measures we will implement. Forcing more security than the organization is ready for, will likely lead to production upsets and inefficiencies. My latest safecontrols post is devoted to this topic - you may find some good tips there for prioritization and decision support: The security sweet spot: avoid destroying your profitability with excessive security controls – safecontrols.
Cybersecurity | Network Security | ICS | OT | Information Security | Risk Management | MBA | CISM
6moI will add lack of security training as well.