IT and OT Cyber Security: United we stand, divided we fall

First published by Cisco.com

Building a converged IT/OT security operations center (SOC) is key to secure business critical IoT/OT networks, but it might not be that simple.

Industrial environments are changing. Technological evolutions such as Industry 4.0 and the Internet of Things (IoT) are Altering Operational Technology (OT). These innovative technologies are far outpacing cybersecurity within industrial networks, and many organizations have already been struggling to retrofit aging environments that were insecure by design. OT and IT have become inextricably linked, and organizations must unify their efforts to better protect themselves.

IoT devices have started to play a major role in OT networks. IP cameras now monitor critical systems, and smart sensors in manufacturing environments transmit valuable data directly to the cloud. These developments have improved quality and made processes run more quickly than ever. However, these developments also carry risks that can leave industrial environments vulnerable.

Many assumptions regarding the best methods for securing industrial networks and critical industrial control systems are no longer valid. Traditional measures such as “security by obscurity,” air gapping, or establishing an industrial demilitarized zone are no longer sufficient to protect industrial environments. Isolating industrial networks is not always effective, and air gaps make data inaccessible and prevent reconfigurations and patching.

The truth is, many of these so-called air-gapped systems are rife with back doors. For example, just think of the vendors and third-party technicians who have set up their own remote access to update systems and devices in OT environments.

As cyber-attacks on industrial environments increase in frequency and complexity, board members and government regulators are pressuring organizations to ensure that these risks are managed and that business critical IoT/OT networks are adequately protected. Accomplishing this task requires a collaborative approach in which IT and OT have an equal footing.

To forge ahead, IT teams need to work alongside OT engineers to ensure that they have a deep understanding and appreciation both of what needs to be protected and how to protect these assets without disrupting production. In order for IT/OT collaboration to be successful, both sides must have something to gain.

United we stand, divided we fall

While the OT environment presents considerable challenges, the key to securing it is breaking down the departmental barriers between the silos. When IT and OT collaborate, they succeed. Instead of building new and disjointed OT security methodologies, it’s vital for organizations to leverage existing tools and investments to better secure OT environments without disrupting production. Securing the industrial enterprise means extending the existing IT security tools (with existing skills, knowledge, and budget) into OT and bringing the OT information (devices, process, events, etc.) and OT engineer’s knowledge into IT.

Making this happen requires IT/SecOps teams to work closely with OT teams, and so the chosen OT security solution must offer benefits to all stakeholders and their specific needs. It must be inherently designed to provide meaningful information to both teams so they share a common understanding of the situation and can start working together toward a common goal.

To learn more, please download the whitepaper on Converging IT OT Security, which explains how IT/SecOps can build a collaborative workflow with operations teams to create a shared vision and gain the deep understanding of industrial processes that they need to effectively protect IoT/OT networks without disrupting production.

Ask a Question

This field is for validation purposes and should be left unchanged.