Top Posts
Most Shared
Most Discussed
Most Liked
Most Recent
Post Categories:
Control Cyber Security IOT Legacy Networking Risk ThreatPost Likes: 125
By Paula Livingstone on May 30, 2023, 9:19 a.m.
Industrial Internet of Things (IIoT) systems, such as those used in critical infrastructure like power plants and manufacturing facilities, face unique security challenges compared to traditional IT systems. With increased connectivity between operational technology and information technology, IIoT environments have become prominent targets for sophisticated cyber attacks. Recent major cyberattack campaigns against industrial control systems, including Stuxnet and Night Dragon, have demonstrated the growing sophistication of these threats. They have also revealed the need for improved security practices tailored to the specific architecture and constraints of IIoT environments.
While there is some merit in applying conventional IT security controls to IIoT, this alone is insufficient. Traditional practices like firewalls and encryption do not account for the distinct operational processes and priorities of industrial control systems.
This blog post argues for the necessity of rethinking how security controls are applied in IIoT environments. I propose consideration of a new framework for evaluating the effectiveness of controls within IIoT system architectures. This framework can assist security architects in selecting and deploying security measures when designing or upgrading these systems.
Similar Posts
Here are some other posts you might enjoy after enjoying this one.
The Emerging IIoT Threat Landscape
In recent years, the attack surface for Industrial Internet of Things (IIoT) environments has grown exponentially larger due to increased connectivity between information technology systems and operational technology assets. This integration has opened up new vulnerabilities in critical infrastructure that sophisticated cyber attackers are actively working to exploit.
One of the most infamous examples of an attack against industrial control systems is Stuxnet. Discovered in 2010, Stuxnet was an extremely advanced piece of malware designed specifically to target programmable logic controllers (PLCs) and disrupt nuclear enrichment operations in Iran. The malware leveraged zero-day vulnerabilities and other ingenious infection tactics to propagate through systems while remaining undetected.
Another major incident highlighting emerging IIoT threats was the Night Dragon campaign. This attack targeted multiple energy sector companies by compromising web-facing servers using techniques like SQL injection to steal employee credentials. These stolen credentials enabled the attackers to further access operational technology networks to install remote access trojans on critical assets.
Incidents like Stuxnet, Night Dragon, Shamoon, and Dragonfly demonstrate the rising sophistication of cyber threats being deployed against Industrial Internet of Things environments. Attackers are becoming increasingly adept at exploiting vulnerabilities in conventional information technology systems to gain a foothold and pivot into more critical operational technology networks. Legacy industrial systems and insecure communication protocols only exacerbate these risks.
Defending IIoT environments requires going beyond typical IT cybersecurity practices and controls. The unique architecture and operational priorities of industrial control systems necessitate rethinking and tailoring the approach to IIoT security.
Limitations of Traditional IT Security Practices
At first glance, it may seem that existing IT cybersecurity controls and best practices can be applied directly to secure IIoT environments. However, this approach has significant limitations and often provides insufficient protection for industrial control systems.
Legacy industrial systems and embedded devices were designed to prioritize reliability and availability above all else. Many IIoT assets cannot be easily patched, updated, or rebooted without risking critical uptime. They also rely on proprietary or decades-old communication protocols not designed with security in mind.
Additionally, the unique IIoT architecture of highly segmented networks makes enforcing unified security policies and visibility difficult. Typical IT security teams are focused on protecting confidentiality of data, while IIoT operators are most concerned with availability of systems.
Conventional techniques like perimeter firewalls, intrusion detection systems, and encryption provide a degree of security. However, they do not account for domain-specific threats targeting ICS protocols, embedded devices, and legacy assets. They also struggle to provide full visibility across complex, heterogeneous IIoT environments.
In order to effectively secure modern IIoT infrastructure, security strategies need to be tailored to overcome the limitations of traditional IT security practices. This requires taking a systematic approach based on the specific architecture and attack surface of IIoT environments.
An Architecture-Centric Approach to Securing IIoT
To address the gaps left by conventional IT security practices, a more robust framework is needed. This framework should analyse the effectiveness of security controls within the context of IIoT system architectures.
Such an analysis involves first mapping existing security controls to the various levels of a typical IIoT architecture. This provides visibility into where safeguards are being applied within the environment.
Next, major IIoT cyber attacks can be evaluated to identify which controls, if applied appropriately, could have prevented or detected the incident. This reveals potential control gaps or weak points within the architecture.
Studying multiple major IIoT attacks helps derive a ranking of the most important and effective controls at different architecture levels. Controls that could have mitigated many known attacks become clear priorities.
This architecture-centric framework provides vital insights not available by only looking at traditional IT security best practices. It allows organizations to optimize selection and placement of security controls based on their IIoT-specific threat landscape.
Rather than retrofitting conventional IT solutions, this approach accounts for the unique operational constraints and objectives of industrial control systems. It brings security strategy into alignment with IIoT architecture.
Optimizing Control Selection and Placement
Applying an architecture-centric analysis of security control effectiveness reveals valuable findings that can optimize their selection and deployment. Several key insights emerge from studying real-world IIoT attacks against a reference architecture.
First, public-facing systems at the higher levels of the architecture, such as manufacturing operations and enterprise systems, tend to be the most vulnerable. These assets are often the initial entry point or pivot point for attackers trying to infiltrate operational technology. Securing these public-facing systems should be a priority.
Second, threat detection and identification controls are severely underutilized compared to prevention controls. Encryption, firewalls, and access rules serve as critical safeguards, but provide little visibility into sophisticated threats. Deploying more log analysis, intrusion detection, and anomaly detection closes this detection gap.
Third, over-securing low-level devices like PLCs and RTUs can be an inefficient use of resources. While edge assets are critical, they are more difficult and less likely for attackers to directly compromise initially. A balanced defence-in-depth approach works best.
Fourth, older legacy devices and proprietary protocols are often the most vulnerable and should be prioritized for upgrades, patching, or additional monitoring. Newer systems tend to have more modern security capabilities built-in.
These findings demonstrate why tailored, architecture-based security is essential for IIoT environments. The analysis helps organizations deploy controls where they matter most, while avoiding common pitfalls. Architectural thinking leads to optimized, effective IIoT security.
Conclusion
As Industrial Internet of Things environments become increasingly interconnected and targeted by sophisticated adversaries, new security strategies are needed. Traditional IT security controls and best practices provide incomplete protection for operational technology systems.
The unique constraints and priorities of IIoT, including a focus on availability and legacy devices, necessitate a tailored approach. An architecture-centric framework that maps controls and analyzes real-world attacks is proposed to meet these needs.
This methodology reveals crucial insights into optimal control selection and placement specific to IIoT. Public-facing systems and detection controls are frequently under-secured. Over-investing in endpoint security can be counterproductive.
By aligning security programs to the layered nature of IIoT architectures, control effectiveness is maximized. Rather than retrofitting conventional IT solutions, this framework accounts for the domain-specific threats and operational objectives of industrial control systems.
As attacks increase in impact and sophistication, sound architectural security principles will become increasingly important. The analysis helps organizations make data-driven decisions for securing IIoT against modern cyber threats.
Tailoring security to system architecture optimizes defence-in-depth. Architecture thinking leads to strategies where security enables, not inhibits, reliable and safe industrial operations.
Want to get in touch?
I'm always happy to hear from people. If youre interested in dicussing something you've seen on the site or would like to make contact, fill the contact form and I'll be in touch.
No comments yet. Why not be the first to comment?