![]() |
The specialised security concerns of OT networksAs with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their own. The goal is to improve productivity, efficiency, uptime, and flexibility through better monitoring. ![]() Source: pixabay.com To do this, online sensors and connected systems are replacing traditional serial connections, proprietary protocols, and programmable logic controllers to better manage and control industrial environments. At the same time, the integration of automation, communications, and networking in industrial environments is an integral part of the growing Industrial Internet of Things (IIoT). Specialised security concerns of OT networksAs with IT, the most important – and often overlooked – consideration during this transformation process is security. Many OT systems were never designed for remote accessibility, so the risks associated with connectivity were never considered when the OT architecture was originally engineered. Rather than completely redesigning these environments, OT networks have begun to utilise solutions such as strong segmentation and specialised analytics to ensure the safety and reliability of physical processes and devices. This helps organisations apply some measure of their larger IT cybersecurity practices into their OT environments to address new security risks targeting multi-vector threat landscapes. However, as cybercriminals begin to more aggressively target OT devices and systems, these basic security measures are increasingly inadequate. OT networks need to evolve to address increasing cyber risk. One challenge is that many OT networks are especially delicate, and taking even one sensor or device offline can have serious if not devastating consequences. Even something as basic as actively scanning an OT device or system looking for vulnerabilities or malware can cause them to fail. Which means that many of the traditional tools and protocols used to protect the IT network simply don’t translate over to OT. Instead, it requires specialised security technologies and solutions designed to provide protection without impacting the function of sensitive and highly regulated equipment and systems. Creating a unified security strategyThis convergence of IT, OT and IoT has sent many security practitioners back to the drawing board to rethink security practices and redefine security architectures so that they can align to evolving environments, without compromising the overall integrity of the distributed network. What is becoming apparent, especially as OT emerges as a new target for cybercriminals, is that organisations not only need to be able to apply specialised security solutions and strategies to their OT environment, but they need to also be able to tie them into their larger security framework. This requires a single, cohesive Security Fabric platform that enables security teams to establish true, single-pane-of-glass visibility and control. This approach enables them to seamlessly see and address security risk across multi-vector threat landscapes without overburdening security staff resources or impacting their highly differentiated networked environments. 3 Key considerationsApproaching the development of a unified security strategy that addresses both IT and OT requirements includes the following considerations:
Key takeawayIn today’s new digital economy, the stakes are high. Consumers and end users demand instant access to data and other resources, combined with pervasive protection of their personal data. And for organisations involved in securing operational environments, that risk extends to the personal as well as cybersecurity of employees and citizens. As a result, organisations can no longer afford to be implementing security silos built around isolated legacy security tools that can’t function as an integral component of a larger security strategy. You need specialised OT tools that can be integrated into a comprehensive security strategy. That needs to include a rich ecosystem of technologies from an array of specialised partners. Only this approach will enable you to develop different networking environments, each with their own, unique business functions, that can be secured through a comprehensively integrated security strategy. This strategic approach ensures the confidentiality, integrity, availability, and performance of today’s increasingly complex and interconnected digital networks, while controlling the overhead associated with other approaches to digital transformation. About Doros HadjizenonosDoros Hadjizenonos is Regional Sales Director Southern Africa at Fortinet View my profile and articles... |