OT security is the process of securing the practices and technologies deployed to monitor, detect, and control changes to operational technology infrastructure, people, and data.
Operational technology (OT) refers to hardware and software systems that execute monitoring and/or control over industrial equipment and processes.
Such industrial processes and equipment include:
The umbrella term “operational technology” encompasses many specialized frameworks, such as:
While operational technology and information technology security share some similarities, OT has characteristics that distinguish it from traditional information processing systems.
Perhaps the most marked difference between IT and OT security is OT’s direct connection to the outside world. In other words, OT has the potential to impact the physical elements of society. Some of these potential impacts include:
OT environments rely on applications and operating systems which could be unconventional to typical IT professionals.
When it comes to the design and operation of OT systems, safety, and efficiency sometimes conflict with security.
The following table compares IT and OT systems requirements for connectivity and security:
Connectivity Mechanisms | Via Telco, Wi-Fi | Via Telco, Radio, Satellite, Powerline Carrier, Wi-Fi |
Security Priority | Data security with high confidentiality | Operational uptime with high availability, safety, and integrity |
Security Standards | ISO-17799, 27001, NIST SP 800-53 | ISA99, NERC CIP 002-009, NIST SP 800-53, NIST SP 800-82 |
Security Patching | Frequent | Slow to impossible |
Cyber Forensics | Available | Limited, if any |
Overall Impact from Security Breaches | Business impacts | Business impacts, process fluctuations, equipment damage, environmental release, personnel safety |
Historically, IT and OT were managed by separate groups in an organization. IT and OT did not share interdependencies. However, in recent years, the paradigm has shifted.
Today, it’s common for OT systems to be provisioned with networking and computational technologies. The worlds of IT and OT are converging, which is laying the groundwork for the Industrial internet of things (IIoT).
Modern OT environments must facilitate the exchange of data between machines and applications. At the same time, OT environments need to be able to scale processes across physical and virtual systems. This is why OT systems are starting to resemble IT systems.
IIoT is set to play a key role in the fourth Industrial Revolution. Converged IT/OT ecosystems will serve as conduits that will deploy IIoT into the 4IR ecosystem
The integration promises numerous benefits:
As the lines of distinction between IT and OT fade, the attack surface of interconnected IT/OT systems widens. The most common attack vector for hackers to infiltrate is via the internet.
ICS sensors, instruments, and OT devices accessible over an OT network are susceptible to weaponization. Botnets can be used to launch targeted attacks on critical infrastructure.
Usually, human-machine interfaces (HMIs) that connect human operators to industrial control systems are also networked to IT infrastructures. The accessibility to HMIs from internet-facing business networks poses a grave risk to ICS security. Consequently, HMIs are susceptible to IP-based vulnerabilities, including:
Attackers typically infiltrate ICS systems with malware. It could be generic, or it could be malware designed to attack critical infrastructure. These infiltrations often result in denial of service (DoS) attacks that paralyze or halt industrial networks and operations.
ICS and IIoT devices are also high-value targets for hackers. Whether malicious actors are looking to collect ransoms or sabotage rival nations by accessing confidential data, this is a target area.
Digital transformation and connectivity in OT environments bring great promise, as well as significant risk. A flood of connected devices will increase opportunities for attack. This is especially true in OT environments because OT devices are vulnerable and exposed.
The dangerous aftereffects of security breaches on ICS differ greatly from typical cyber attacks. Consider the impacts of possible incidents an OT system may face:
According to NIST, there are nine OT security recommendations for forming, implementing, maintaining, and continually improving an OT security program. In implementing and maintaining these best practices, organizations can establish an OT security roadmap for risk management:
Establishing a complete and effective OT security program is a complex undertaking differing from typical cybersecurity strategies. Ultimately, the end goal is to maximize operational uptime by reducing security breaches. Whether environments are partially air gapped or cloud connected, this can be accomplished with a Zero Trust OT security approach. A Zero Trust OT security approach consists of:
1. Least- privileged access control
2. Continuous trust verification
3. Continuous security verification