Paula Livingstone
  • About
  • Blog
  • Contact
  • Login

Top Posts

Categorizing the Self: Why Identity Management Trends Toward Singularity


Stepping Beyond the Postmodern Threshold


Making Sense of Python's Appeal


Why I Chose Django: The Story Behind This Blog's Framework



Most Shared

Ethereum: The World Computer That's Changing the Game


The Industrial Security Paradigm for AI in Critical Systems


Riding the Bitcoin Wave: A roadmap from 2023 and beyond


Unraveling Polkadot: The New Era of Scalable, Interconnected Blockchains



Most Discussed

Categorizing the Self: Why Identity Management Trends Toward Singularity


Stepping Beyond the Postmodern Threshold


Making Sense of Python's Appeal


Why I Chose Django: The Story Behind This Blog's Framework



Most Liked

Categorizing the Self: Why Identity Management Trends Toward Singularity


Stepping Beyond the Postmodern Threshold


Making Sense of Python's Appeal


Why I Chose Django: The Story Behind This Blog's Framework



Most Recent

AI’s Primitive Surge Sparks a Security Storm


The Industrial Security Paradigm for AI in Critical Systems


The Hidden Cybersecurity Challenges of Artificial Intelligence.


Uncovering the Sigmoid Function Step by Step



Post Categories:

Control Cyber Security IOT Legacy Networking Risk Threat


Post Views: 6581

Post Likes: 125


Defence in Depth for IIoT: Balancing Controls Across Architecture Levels

By Paula Livingstone on May 30, 2023, 9:19 a.m.

Tagged with: Monitoring Threat Modeling Operational Technology (Ot) Innovation Privacy Security Technology IIOT Risk Management Information Technology (It) Architecture Threat Detection Critical Infrastructure Network Segmentation Anomaly Detection Attack Surface Availability Control Defence In Depth Infrastructure Legacy Systems Programmable Logic Controllers (Plcs) Industrial Control Systems (Ics) Intrusion Detection Systems (Ids)

Industrial Internet of Things (IIoT) systems, such as those used in critical infrastructure like power plants and manufacturing facilities, face unique security challenges compared to traditional IT systems. With increased connectivity between operational technology and information technology, IIoT environments have become prominent targets for sophisticated cyber attacks. Recent major cyberattack campaigns against industrial control systems, including Stuxnet and Night Dragon, have demonstrated the growing sophistication of these threats. They have also revealed the need for improved security practices tailored to the specific architecture and constraints of IIoT environments.

While there is some merit in applying conventional IT security controls to IIoT, this alone is insufficient. Traditional practices like firewalls and encryption do not account for the distinct operational processes and priorities of industrial control systems.

This blog post argues for the necessity of rethinking how security controls are applied in IIoT environments. I propose consideration of a new framework for evaluating the effectiveness of controls within IIoT system architectures. This framework can assist security architects in selecting and deploying security measures when designing or upgrading these systems.

Similar Posts

Here are some other posts you might enjoy after enjoying this one.

Industroyer2: A Detailed Examination of the Malware
The Hidden Cybersecurity Challenges of Artificial Intelligence.
The Industrial Security Paradigm for AI in Critical Systems
Unmasking the Cyber Threats of 2023
Modbus and the OSI Model in Industrial Communication

The Emerging IIoT Threat Landscape

In recent years, the attack surface for Industrial Internet of Things (IIoT) environments has grown exponentially larger due to increased connectivity between information technology systems and operational technology assets. This integration has opened up new vulnerabilities in critical infrastructure that sophisticated cyber attackers are actively working to exploit.

One of the most infamous examples of an attack against industrial control systems is Stuxnet. Discovered in 2010, Stuxnet was an extremely advanced piece of malware designed specifically to target programmable logic controllers (PLCs) and disrupt nuclear enrichment operations in Iran. The malware leveraged zero-day vulnerabilities and other ingenious infection tactics to propagate through systems while remaining undetected.

Another major incident highlighting emerging IIoT threats was the Night Dragon campaign. This attack targeted multiple energy sector companies by compromising web-facing servers using techniques like SQL injection to steal employee credentials. These stolen credentials enabled the attackers to further access operational technology networks to install remote access trojans on critical assets.

Incidents like Stuxnet, Night Dragon, Shamoon, and Dragonfly demonstrate the rising sophistication of cyber threats being deployed against Industrial Internet of Things environments. Attackers are becoming increasingly adept at exploiting vulnerabilities in conventional information technology systems to gain a foothold and pivot into more critical operational technology networks. Legacy industrial systems and insecure communication protocols only exacerbate these risks.

Defending IIoT environments requires going beyond typical IT cybersecurity practices and controls. The unique architecture and operational priorities of industrial control systems necessitate rethinking and tailoring the approach to IIoT security.

Limitations of Traditional IT Security Practices

At first glance, it may seem that existing IT cybersecurity controls and best practices can be applied directly to secure IIoT environments. However, this approach has significant limitations and often provides insufficient protection for industrial control systems.

Legacy industrial systems and embedded devices were designed to prioritize reliability and availability above all else. Many IIoT assets cannot be easily patched, updated, or rebooted without risking critical uptime. They also rely on proprietary or decades-old communication protocols not designed with security in mind.

Additionally, the unique IIoT architecture of highly segmented networks makes enforcing unified security policies and visibility difficult. Typical IT security teams are focused on protecting confidentiality of data, while IIoT operators are most concerned with availability of systems.

Conventional techniques like perimeter firewalls, intrusion detection systems, and encryption provide a degree of security. However, they do not account for domain-specific threats targeting ICS protocols, embedded devices, and legacy assets. They also struggle to provide full visibility across complex, heterogeneous IIoT environments.

In order to effectively secure modern IIoT infrastructure, security strategies need to be tailored to overcome the limitations of traditional IT security practices. This requires taking a systematic approach based on the specific architecture and attack surface of IIoT environments.

An Architecture-Centric Approach to Securing IIoT

To address the gaps left by conventional IT security practices, a more robust framework is needed. This framework should analyse the effectiveness of security controls within the context of IIoT system architectures.

Such an analysis involves first mapping existing security controls to the various levels of a typical IIoT architecture. This provides visibility into where safeguards are being applied within the environment.

Next, major IIoT cyber attacks can be evaluated to identify which controls, if applied appropriately, could have prevented or detected the incident. This reveals potential control gaps or weak points within the architecture.

Studying multiple major IIoT attacks helps derive a ranking of the most important and effective controls at different architecture levels. Controls that could have mitigated many known attacks become clear priorities.

This architecture-centric framework provides vital insights not available by only looking at traditional IT security best practices. It allows organizations to optimize selection and placement of security controls based on their IIoT-specific threat landscape.

Rather than retrofitting conventional IT solutions, this approach accounts for the unique operational constraints and objectives of industrial control systems. It brings security strategy into alignment with IIoT architecture.

Optimizing Control Selection and Placement

Applying an architecture-centric analysis of security control effectiveness reveals valuable findings that can optimize their selection and deployment. Several key insights emerge from studying real-world IIoT attacks against a reference architecture.

First, public-facing systems at the higher levels of the architecture, such as manufacturing operations and enterprise systems, tend to be the most vulnerable. These assets are often the initial entry point or pivot point for attackers trying to infiltrate operational technology. Securing these public-facing systems should be a priority.

Second, threat detection and identification controls are severely underutilized compared to prevention controls. Encryption, firewalls, and access rules serve as critical safeguards, but provide little visibility into sophisticated threats. Deploying more log analysis, intrusion detection, and anomaly detection closes this detection gap.

Third, over-securing low-level devices like PLCs and RTUs can be an inefficient use of resources. While edge assets are critical, they are more difficult and less likely for attackers to directly compromise initially. A balanced defence-in-depth approach works best.

Fourth, older legacy devices and proprietary protocols are often the most vulnerable and should be prioritized for upgrades, patching, or additional monitoring. Newer systems tend to have more modern security capabilities built-in.

These findings demonstrate why tailored, architecture-based security is essential for IIoT environments. The analysis helps organizations deploy controls where they matter most, while avoiding common pitfalls. Architectural thinking leads to optimized, effective IIoT security.

Conclusion

As Industrial Internet of Things environments become increasingly interconnected and targeted by sophisticated adversaries, new security strategies are needed. Traditional IT security controls and best practices provide incomplete protection for operational technology systems.

The unique constraints and priorities of IIoT, including a focus on availability and legacy devices, necessitate a tailored approach. An architecture-centric framework that maps controls and analyzes real-world attacks is proposed to meet these needs.

This methodology reveals crucial insights into optimal control selection and placement specific to IIoT. Public-facing systems and detection controls are frequently under-secured. Over-investing in endpoint security can be counterproductive.

By aligning security programs to the layered nature of IIoT architectures, control effectiveness is maximized. Rather than retrofitting conventional IT solutions, this framework accounts for the domain-specific threats and operational objectives of industrial control systems.

As attacks increase in impact and sophistication, sound architectural security principles will become increasingly important. The analysis helps organizations make data-driven decisions for securing IIoT against modern cyber threats.

Tailoring security to system architecture optimizes defence-in-depth. Architecture thinking leads to strategies where security enables, not inhibits, reliable and safe industrial operations.


Like & Share

Copy & Share URL
Social Shares

Start the discussion

In order to comment you'll need to login or register if you haven't already done so

Login Register

Post Discussion

No comments yet. Why not be the first to comment?

Reply to
You are replying to the following comment:
Login Required

You must be logged in to interact with this feature.

Login

If you've already registered, click here to login.

Register

If not, click here to register.

Want to get in touch?

I'm always happy to hear from people. If youre interested in dicussing something you've seen on the site or would like to make contact, fill the contact form and I'll be in touch.

Go to Contact Page


CONTACT


Go to Contact Page

MEDIA


For media enquiries please contact Brian Kelly

LATEST WORK


AI’s Primitive Surge Sparks a Security Storm

SOCIAL


Lets connect on social media

All Rights Reserved © 2025. - Site by Me