Critical infrastructure protection (CIP) involves securing networks, assets, and systems that must operate continuously to ensure the health and safety of regions, countries, or economies.
Due to the continuous development of machine to machine (M2M) networks and the Internet of Things (IoT), devices in industrial environments are increasingly connected to the Internet and can exchange data. M2M and IoT systems are valuable, but in many cases, are not sufficiently secure.
Industrial Control Systems (ICS) are used in many areas of critical infrastructure. They control everything from nuclear power plants and other utilities to heating, ventilation, and air conditioning (HVAC), robotics, and many aspects of physical facilities. Many of these systems have limited computing resources and connectivity. Therefore, network security was not considered a serious issue when they were designed.
However, today it is better understood that ICS systems face severe security issues. On the one hand, because they are critical systems, it is difficult to perform software updates. Antimalware measures may not be implemented due to limited computing resources. Additionally, more than 80% of these systems are owned and managed by the private sector, complicating government security operations.
In this article, you will learn:
Core infrastructure is similar in most countries due to the basic requirements of modern life, but can vary depending on the needs, resources and level of development of the country.
The U.S. Department of Homeland Security (DHS) has identified 16 critical infrastructure areas, including communications, electrical utilities, critical manufacturing, defense systems, chemical manufacturers, emergency services, financial services, healthcare, food and agriculture, transportation systems, and water systems.
All these critical services are at risk of cyber attack. These threats can have catastrophic consequences, endangering entire regions and the global economy. The success of critical infrastructure protection programs depends on strong partnerships between government and business organizations. Success also depends on the security solutions used to manage and implement these plans.
It is important to be aware of the risks that can compromise the integrity of critical infrastructure systems. When considering system and network security, it is common to think about threats from hackers and terrorists. But other threats such as equipment failure, human error and natural causes (for example, the eather) should also be considered. It is important to consider as many of these risks as possible, when choosing a solution that detects and identifies security risks and anomalous behavior.
In the Global Risks Report by the 2020 World Economic Forum, cyberattacks on critical infrastructure are identified as a top priority. According to the WEF, attacks on critical infrastructure are now commonplace across many industries including energy, healthcare and transportation.
The new reality is that almost all critical infrastructures operate in a digital environment, and as information technology continues to evolve, vulnerabilities too are evolving. Global connectivity, the IoT and the advent of smart cities further increases the global threat surface and creates new opportunities for attackers. Threat actors, including nation states, terrorists and organized crime, have become more sophisticated, and see critical infrastructure as a priority target.
A few recent examples of recent cyber attacks against critical infrastructure:
There are many ways to improve the security of critical infrastructure and operational technology (OT) systems. Here are a few key best practices.
An important but often overlooked part of OT security is a well-developed and well-executed crisis response plan. There are four key elements to OT incident response:
Insider threats to critical infrastructure are not new, but have changed significantly in the past few decades.
Vendors, contractors, and business partners who have not passed security clearance are often used at critical infrastructure facilities to reduce costs. These individuals have direct access to critical infrastructure, and represent a major risk. In addition, the growing use of cloud services, remote access and web technologies makes it easy for malicious insiders, or attackers with ownership of a compromised user account, to inflict harm.
There are two important ways to address these vulnerabilities:
Improving visibility into industrial networks and the risks they face is key to improving resilience and operational reliability of critical infrastructure. Effective visibility requires real-time infrastructure monitoring and an constantly updated inventory of network assets.
Equally important is achieving visibility across regional or global facilities. This requires close coordination, and using the same monitoring and security tools, across facilities. Unified visibility reduces maintenance overheads, speeds problem resolution, and improves staff efficiency. It enables decision making based on the most accurate and up-to-date information from across the enterprise.
XDR is a new approach that improves management, automation, and response of cyber threats. It is well suited for effectively connecting IT and OT, and protecting the networks of critical facilities.
Most organizations today operate endpoints like desktops, servers, and laptops, as well as IT equipment like switches, routers and firewalls, and operational technology (OT) entities like industrial machinery, smart building infrastructure, or IoT devices. According an IBM report, OT attacks increased in 2020 by 2,000% year over year.
XDR security technology goes beyond traditional security information and event management (SIEM) and endpoint detection and response (EDR). It extends protection beyond endpoints, providing detection and response across a wider range of systems and networks. This includes cloud services, local data centers, IT, OT and Internet of Things (IoT) networks.
XDR enables security teams to detect, investigate, and respond to threats across all these systems in one unified interface. It also provides advanced automation features which can help identify and react to complex threats faster.
Looking at embedded devices is quite different than looking at servers in the IT space, it is common that there is no packages or information on the device to tap into for identification of assets to perform security analysis. Based on our vision that follows the NERC-CIP and IEC 62443 requirements, industrial device security has 2 main phases, the first phase is pre-market and the second is post-market. The approach to device security is fundamentally different at every phase. It is imperative to have proper security mechanisms and controls built-in and not bolt on the device from the early stages to mitigate the risks of every phase in the device’s lifecycle, especially if the device is mission critical and human safety might be at stake due to its failure.
During the development phase of the device, security focus is required on multiple aspects such as hardware security, identity of the device, cryptography and vulnerability analysis and assessment activities of its components. Companies are using various tools and open source projects to achieve results on this multiple aspects. Getting significantly successful results is complex taking in account we don’t have unlimited resources and effort we can put into this part of the development work. The first stage focusing on automated successful security program is to gain visibility into the device’s SBOM (Software Bill of Material) and runtime context as fundamental capabilities.
Once we achieve that we can advance to continuous vulnerability monitoring, security gap assessment, and most important vulnerability prioritization aka VPT. We can’t stop here. We need to be able to perform this every time when we change even one line of code in our application or change in a library and it has to be done for every device model in our product lines and every build of the firmware. We are looking at hundreds of such assessments per day. This can be only achieved by DevSecOps approach. Adding to your CI/CD pipeline continuous modeling of the device’s security posture enriching the data with threat intelligence indications of compromise, correlating with vulnerability information, and augmented by deep knowledge of the device’s operational context to understand the threat relevance. All this and more could be provided by utilizing Cybeats IoT security platform.
March 19, 2024
Tern is an open source software composition analysis and SBOM generation tool that generates SBOMs from container images. However, upon running this tool and generating a CycloneDX SBOM, a problem arose.
Read More →March 4, 2024
As a member of the PCAST Working Group on Cyber-Physical Resilience, I was involved in crafting the recent report outlining crucial steps to fortify the intricate systems that underpin our daily lives. One of our key recommendations, "Recommendation 4B: Promote Supply Chain
Read More →December 15, 2023
Notably, the Health Information Sharing and Analysis Center (Health-ISAC) is entering into a partnership with Cybeats, a leading software supply chain intelligence company, marking a substantial advancement in healthcare cybersecurity.
Read More →