Zero Trust, Many Benefits
Zero Trust is crucial for mitigating MFA and other cyberattacks, significantly reducing risk for OT and ICS. It minimizes the attack surface by segmenting the OT network into isolated zones, restricting attackers’ lateral movement even if they bypass MFA. Zero Trust continuously verifies and authorizes every access request, making it harder for attackers to exploit compromised credentials.
Enforcing the principle of least privilege, Zero Trust grants minimal access, limiting potential damage and restricting an attacker's reach to sensitive data. Beyond MFA, Zero Trust integrates various security controls, including micro-segmentation, network monitoring, endpoint protection and vulnerability management, creating multiple hurdles for attackers.
Zero Trust's continuous monitoring allows early detection of suspicious behavior, facilitating faster incident response and containment, minimizing the impact of cyberattacks.
Five Steps to Zero Trust
CISA’s executive order (EO) 14028 encourages IT/OT leaders in the industrial sector to take a stepped approach enforce Zero Trust standards within their organizations and bolster OT cybersecurity to thwart MFA attacks. These steps include:
1. Introduce the Concept of Protect Surfaces
In contrast to conventional security methodologies that often concentrate on the expansive and ever-evolving attack surface, a more intelligent strategy has emerged: the concept of protect surfaces.
Defining protect surfaces involves purposefully safeguarding critical elements such as data, physical equipment, networks, and essential assets. This targeted approach aims to address specific security needs, presenting a more manageable challenge compared to the broader attack surface. By identifying vital assets, including sensitive data and operational technology, organizations can establish a prioritized list for effective security and access management.
2. Map Transaction Flows for Prioritized Protect Surfaces
The next step involves analyzing user access, inter-system interactions, and optimal security conditions, such as multi-factor authentication (MFA), time/location checks and expected tasks. This meticulous analysis lays the groundwork for constructing a Zero Trust environment, one secure surface at a time.
This approach enhances cyber resilience and minimizes risk. For instance, a user's access to terminal services might necessitate MFA, specific time and location criteria and adherence to predefined tasks. Once protect surfaces, priorities and transaction flows are clearly defined, the process moves forward to architecting a Zero Trust environment, starting with the highest priority protect surface.
3. Architect a Zero Trust Environment
Zero Trust isn’t a standalone product but rather a harmonious combination of tools, with MFA, identity and access management (IAM), encryption and tokenization serving as instrumental components.
The key orchestrators in this symphony are smart segmentation and dynamic firewall policies. Envision policies based on factors such as who is requesting access, what resources are being accessed, where the request originates and when the request occurs. This nuanced approach gradually constructs a secure perimeter around critical assets, fortifying cyber defenses step by step.
4. Create a Zero Trust Policy
The establishment of a comprehensive Zero Trust policy is imperative, governing activities such as access controls and firewall rules. This policy should extend beyond intranet postings, incorporating educational programs to instill strong security practices throughout the organization. Regular cyber awareness training plays a pivotal role in reducing risks.
5. Monitor and Maintain the Network
Ongoing monitoring and maintenance are crucial for verifying the functionality of the Zero Trust environment and associated policies. Continuous assessment helps identify any gaps or areas requiring improvement, allowing for prompt course corrections.
Organizations can enhance their security posture by engaging a trusted Managed Security Services Provider (MSSP) with specialized expertise in OT cybersecurity, particularly for deploying and maintaining global-scale security measures.
Trusted Approach
Deloitte's 2023 CFO Insights report highlighted that organizations with mature Zero Trust models experienced $1.51 million lower breach costs compared to those in the early stages of implementation. This suggests Zero Trust effectively limits the spread of attacks within networks, minimizing the impact and facilitating faster containment.
Although not a cure-all, Zero Trust signifies a substantial change in security posture that can greatly enhance the security of OT and ICS environments.
Through the implementation of layered security controls, reduction of attack surfaces and continuous verification of access, Zero Trust significantly raises the difficulty for attackers to exploit vulnerabilities and jeopardize crucial industrial systems. Ultimately, this marks a triumph for manufacturers.
Like this article? Sign up for the digital magazine (4X/year) and e-newsletter from The Journal From Rockwell Automation and Our PartnerNetwork.
The Journal From Rockwell Automation and Our PartnerNetwork™ is published by Endeavor Business Media.