Specialists in Industrial Plant Automation Systems

+44 (0) 1423 642 150

Get in Touch
Opensoft Systems Ltd
  • Home
  • About Us
    • Quality Policy
    • Mission Statement
    • Culture Statement
    • Partners
    • Accreditations
    • GDPR
  • Services
    • Site Audits
    • Projects
    • Training
    • Support
  • Case Study
  • Testimonials
  • Clients
  • Careers
  • Contact
  • Home
  • About Us
    • Quality Policy
    • Mission Statement
    • Culture Statement
    • Partners
    • Accreditations
    • GDPR
  • Services
    • Site Audits
    • Projects
    • Training
    • Support
  • Case Study
  • Testimonials
  • Clients
  • Careers
  • Contact
Poorly designed Digital Transformation and IIoT leave OT network vulnerable to cyber-attack

Poorly designed Digital Transformation and IIoT leave OT network vulnerable to cyber-attack

Opensoft Systems Ltd2021-08-20T14:54:01+00:00

While digital transformation and IIoT are massively beneficial, if designed poorly and carried out incorrectly, they can create serious threats.

Poorly designed Digital Transformation and IIoT leave OT network vulnerable to cyber-attack

Digitalisation and the adoption of new technologies that enable networking, information flow and data insight, can create vulnerabilities within the Operation Technology network that can be exploited by hackers who are progressively going after vital infrastructure with attacks that can potentially disrupt people’s daily life, such as power generation. This makes attacks on OT networks more critical and damaging than attacks on IT systems.

In the past, industrial environments were thought safe from cyber-attack as OT networks were physically isolated from public networks such the internet or unsecure LAN. With the introduction of digitalisation, this is no longer the case. Digitalisation has merged IT and OT thus giving attackers a wider target to gain access to a facility’s integrated control and safety systems. Hackers today are well aware of the flaws in OT systems and are actively looking for ways to exploit them.

No system is impenetrable, and vulnerabilities will continue to materialise within the OT field. Despite substantial investment, no plant can eliminate its risk exposure. And there’s no silver bullet technology that can eliminate the cyber security risk of the growing OT and IT convergence and human error. Added to this is the fact that cyber threats are constantly changing. With hackers always a step ahead and regulation trying to keep pace, OT cyber security has become a huge challenge for most organisations.

Manufacturing companies planning on a digital transformation must take a holistic approach to their implementation. The approach must include designing and implementing a comprehensive Cyber Security Management System for OT networks, developing a defined OT security policies and procedures, risk assessment, and awareness training.

For comprehensive cyber security management system, the National Cyber Security Centre (NCSC) has published several guidelines to help organisations design and implement a cyber secure and resilient OT Network systems.

5 Cyber Security Design Principles set by the NCSC

1. Establish the context before designing a system

a. You must have a complete insight into all the elements of your system operation so that your protective measures have no blind spots. It is essential that you have a clear idea of the following:

 What is the system for?
 What is needed to operate it?
 Who operates it?
 Which risks are acceptable?
 Which risks are NOT acceptable?

b. Identify potential threats to your system and the capability level of the attacker to who can carry out the threat.
c. Identify your suppliers’ role in creating and preserving system security.
d. Know all the touchpoints at which data are accessed, controlled, and stored.
e. Be clear about how you control, direct, and convey your cyber security risk management activities.
f. Be clear about the roles and responsibilities of everyone involved in designing and operating your OT network system.

To implement this principle requires involvement from all parts of your organisation, particularly the cyber security engineers, IT engineers, functional safety engineers, process control specialists and process control operators.

2. Make Compromise difficult by applying the following concepts and techniques:

a. Don’t trust any external input. Transforms, validate, or render it.
b. Reduce attack surface by only exposing interfaces needed to operate your system.
c. Ensure your service providers are trustworthy and competent.
d. Ensure services and products deployed are suitably designed, configured, and correctly operated.
e. Reduce risks by removing chances for malware to get entry to the administrator’s device
f. Establish accountability by attributing operations to individuals rather than groups
g. Design your system so it’s easy to maintain. A poorly maintained system is vulnerable.
h. Make it easier for operators to use a secure approach. Security breaches often happen because operators used a temporary fix for system inadequacies.

3. Make disruption difficult by employing the following measures:

a. Deploying standby systems.
b. Doing Data back-ups.
c. Designing for scalability.
d. Identify bottlenecks and plan for outages.
e. Include high load and denial of service to your testing strategy.
f. If you’re relying on third-party service, have a plan to minimise disruption if their service fails.

4. Make compromise detection easier by designing your OT system to spot suspicious activity in real-time.

a. Collect all relevant security events and logs in real-time.
b. Simplify communications flows between devices. This will make security analysis simpler.
c. Keep monitoring independent from the system being monitored.
d. Establish a baseline for normal to detect anomalies in your system.

5. Reduce the impact of compromise by making it difficult for attackers to exploit your system in the event that they gained access to your system.

a. Segment assets on your network to contain the compromise.
b. Remove unnecessary functionality from software or production systems.
c. Be wary of creating management bypass.
d. Design a system that allows you to quickly rebuild to a verified clean state after you’ve resolved the fault that led to the compromise.
e. Anonymise exported data, and don’t rely on reporting tools to carry out the process. Maintain control of the process and implement your controls to anonymise data as close to the source as possible.
f. Don't design functionality or deploy applications that allow arbitrary queries against your data.

For further guidelines and information on cyber security, visit the National Cyber Security Centre.

Digital transformation is inevitable and IIoT is here to stay. Your organisation can embrace it now or later. But you must be prepared for it, all the same.

Reference:

Cyber security design principles. (2019, May 21). National Cyber Security Centre. https://www.ncsc.gov.uk/collection/cyber-security-design-principles/cyber-security-design-principles

A fictional case study exploring the application of our secure design principles. (2020, May 22). National Cyber Security Centre. https://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-tech

Share this post

Facebook Twitter LinkedIn Google + Email

Recent Posts

  • Latest Industry News – 23/09/2022 September 23, 2022
  • Latest Industry News – 16/09/2022 September 16, 2022
  • Latest Industry News – 02/09/2022 September 2, 2022

Categories

  • Cybersecurity (4)
  • Innovation (3)
  • News (22)
  • Technology (4)
  • Training (2)
  • Uncategorized (3)
  • Vacancies (1)
Opensoft Systems Ltd.
Knaresborough Technology Park
Manse Lane
Knaresborough, HG5 8LF
North Yorkshire
United Kingdom
SALES
+44 (0) 1423 642 150

SUPPORT
+44 (0) 1423 642 150
contact@opensoftsystems.co.uk
Visit us on LinkedIn

© Copyright 2023-2030. Opensoft Systems Ltd.

PRIVACY POLICY

Website by GMB

Opensoft Systems Ltd
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Personal data/Cookies may be used for the personalisation of ads.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. We use GA4 (Google Analytics) this does not track your IP address.
Live Chat
We may collect information about your computer, including where available your IP address, operating system and browser type, for system administration purposes. This is statistical data about our users' browsing actions and patterns, and does not identify any individual.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}