Operational Technology (OT) networks are increasingly vulnerable to cyber-attacks as a result of ‘blind spots’ brought on by digital transformation and IIoT – a new report has warned.
The report, published by Yokogawa UK and titled Industrial Cyber Threats: Processes & Protection for Industrial Control Systems, highlights the vulnerability of OT networks in critical infrastructure and industrial applications, such as utilities and petrochemical plants, energy generation, automated manufacturing, pharmaceutical production, and water networks.
Targeting critical infrastructure
Donal Bourke, Manager New Business & Advanced Solutions at Yokogawa UK & Ireland, says digital transformation and IIoT, while having enormous benefits, if not appropriately designed and managed can simultaneously create an acute danger.
Unlike cyber-attacks on IT systems, attacks on OT networks are of significantly higher concern
“Digitalization and the adoption of new technologies that facilitate interoperability, information flow and data insight, can create an OT ‘blind spot’ that can be exploited by state-sponsored action or by highly sophisticated lone-wolf hackers. They are increasingly targeting critical infrastructure with attacks that have the potential to disrupt the normal functioning of a society, such as power generation.”
Vulnerabilities of OT systems
Unlike cyber-attacks on IT systems, attacks on OT networks are of significantly higher concern and can have much graver implications. Mr Bourke continued: “At one time, industrial environments were considered immune to cyber-attack due to employing techniques such as air-gapping which is the physical isolation of networks."
"This is no longer the case as digitalization, which has facilitated the convergence of IT and OT has created a larger threat attack surface for bad actors to gain access to a facility’s integrated control and safety systems. Today’s hackers recognize the vulnerabilities of OT systems and are actively looking for ways to compromize them.”
Security management system
Keeping one step ahead of hackers is difficult, not least because cyber threats are continually evolving"
The report highlights the fact that OT security is in its infancy compared to IT security, despite the magnified risk, and urges government and industry to take a holistic approach. Mr Bourke adds: “There is no technology magic bullet that will mitigate the cybersecurity risk of increasing IT and OT convergence, the threat to control systems and human fallibility."
"The solution lies in taking a more holistic approach that involves awareness training, risk assessments, the development of OT appropriate policies and procedures, and architecting a system which provides an organization with a comprehensive Cyber Security Management System.”
Industrial control systems
Mr Bourke concludes: “Keeping one step ahead of hackers is difficult, not least because cyber threats are continually evolving. Regulation, rightly, looks to maintain the pace but has also made OT cybersecurity a daunting challenge for most organizations. This report simplifies that problem, bringing together all the information necessary to develop an effective OT Cyber Security Management System."
"No system is impregnable, and vulnerabilities will continue to be discovered across the OT domain. Even with generous investment, no plant can completely eliminate its risk exposure. It stands to reason that a holistic approach to cybersecurity is the only way to keep pace with the latest generations of malware tailored to industrial control systems.”