2. Integration with IT systems. IT and OT networks often need to interact with one another to exchange data and information; however, proper communication between segmented OT networks and an organization's IT infrastructure can be challenging. This process requires collaboration between IT and OT teams, who have rarely worked together, leading to oversights that can cause complexity and duplication of efforts, an increase in operations costs, or exposure to security flaws.
3. Segmentation policies. Implementing effective network segmentation policies in industrial environments can be difficult, error-prone, and expensive to manage and maintain. The process often entails constantly tuning network policies to your unique environment, which leaves room for oversight.
4. Compliance enforcement inconsistencies. Critical infrastructure organizations are subject to multiple complex industry regulations and standards. Many times, monitoring and complying with these regulations requires granular, properly tuned policies that some organizations lack. This can lead to variations in approaches to segmentation and inconsistent enforcement across different organizations.
5. Widespread unsecured remote access. All industrial environments rely on remote access to enable both internal and third-party personnel to maintain assets, but common practices are risky and inefficient. If not managed properly, remote access has the potential to bypass network segmentation measures. It also causes an expanded attack surface, introducing new potential entry points for cyber threats.
5 Tips to Accelerate Network Segmentation
Attacks on ICSs can have devastating impacts beyond reputational damage and financial losses, including public safety and the economy. Successfully protecting these devices poses unique challenges that require a CPS protection platform dedicated to securing critical infrastructure environments.
Here are five tips to properly implement OT network segmentation.
1. Gain visibility. It’s impossible to segment assets you haven’t yet identified. So, the number one step in accelerating network segmentation is to identify all connected devices in your environment, along with their configuration, location and owners. Claroty can help improve visibility by automatically discovering new assets, monitoring communication patterns, and revealing connections including the input/ouputs (I/Os) that run industrial processes.
2. Define the policy and enforcement strategy. Once you achieve full-spectrum visibility, you can start to figure out how to protect it. There are several ways to segment your network, including via existing network access control (NAC), firewalls, switches or other parts of your infrastructure. It’s important to assess your objectives and environment and pick a strategy that will work for both.
3. Classify and group devices. Creating a unique policy for every device is impractical, but segmentation can be effective and scalable by creating policies for device types, or groups of devices, based on how they communicate with one another under normal circumstances. Claroty can assist your security team in defining specific policies for each group of assets and communications between them by creating a smart grouping of related assets in a logical view.
4. Design, test and refine policies. Industrial organizations need to protect their environment without disrupting it. This means designing network policies that align with the communication baselines of the device groups you classified in the previous step. Also, make sure those policies, once enforced, won’t negatively impact operations.
5. Enforce policies. As noted in the previous step, enforcing new policies for OT network segmentation can be a delicate process that, if not done correctly, can risk disrupting operations.
An extensive ecosystem of ready-made integrations with existing NACs, firewalls, switches and more can support one-click enforcement that helps streamline and optimize segmentation for complex OT networks.
Given that segmentation is an ongoing journey — not a tactical activity — it’s essential to continuously monitor and optimize network segmentation as an organization’s OT environment, OT security maturity and priorities evolve over time.
Jumpstart Your OT Network Segmentation
The attack surface for cyber criminals continues to expand as society accelerates its reliance on cyber-physical systems for greater automation, control, efficiency and convenience. As these new attack vectors emerge, we see a stronger need for OT industrial network segmentation.
Although critical infrastructure organizations often have network segmentation initiatives on their ‘to-do’ list, they tend to lack the time, resources, visibility and awareness required to implement them.
Organizations can jumpstart segmentation initiatives by implementing policies that can be easily and automatically enforced via your existing infrastructure. This can accelerate initiatives and enhance cyber and operational resilience.
Based in New York City, Claroty is a Rockwell Automation Technology Partner. The company provides comprehensive cybersecurity solutions for industrial control systems (ICSs) that, combined with Rockwell Automation services, help users reveal, protect and manage their OT, IoT and IIoT assets.
Like this article? Sign up for the digital magazine (4X/year) and e-newsletter from The Journal From Rockwell Automation and Our PartnerNetwork.
The Journal From Rockwell Automation and Our PartnerNetwork™ is published by Endeavor Business Media.