Loading
Magazine | Cybersecurity
Recent ActivityRecent Activity

Resolving the IT/OT Connection Paradox

How do you increase IT/OT convergence while combating increasing cyberthreats? One answer lies in a simple approach focused on secure worker connectivity.

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail
Female mechanical engineer adorned in PPE works on personal computer while adjusting controls in industrial manufacturing plant. Male coworker is in background also working on machine.
Magazine | Cybersecurity
Recent ActivityRecent Activity
Resolving the IT/OT Connection Paradox
How do you increase IT/OT convergence while combating increasing cyberthreats? One answer lies in a simple approach focused on secure worker connectivity.

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail

By Raj Sharma, Novavax and Chris Sullivan, Nymi

The Colonial Pipeline breach on May 6 was the fourth attack on a U.S. energy company in the last six months. Coincidentally, on May 12, the U.S. government released its long-awaited Executive Order on improving the nation’s cybersecurity.

These events dramatically underscore the severity of the cyberthreats we face. More specifically, it’s urgent to update security strategies to allow digital transformation to continue. We see this clearly in the IT and operational technology (OT) environments of our public and private sector facilities.

So, how did we get here?

Good and Bad Connections

Once upon a time, OT networks were segregated from all other networks, such as IT — specifically to increase reliability. This made sense, given that networks weren’t as reliable as they are today, and like Christmas lights, companies didn’t want — or couldn’t afford — one blown fuse taking out the whole strand.

Fast forward to the present day and much has changed. Enterprise resource planning (ERP), digital transformation (DX), the cloud, and most recently, the need to work remotely have combined to drive companies further along the path of connecting their OT networks with the goal of eliminating operational silos, increasing visibility, and making their employees’ lives easier. In this sense, connections are good.

OT networks control critical operations and infrastructure like manufacturing plants, transportation networks such as trains and planes, nuclear power plants, and so on. IT networks are used for email, cloud apps, legitimate web browsing and, as a result, are susceptible to countless known and unknown attack vectors from any place in the world. When we connect OT to IT, we make them equally vulnerable. So, connections also are bad.

Here are just three examples out of thousands where adversaries compromised credentials on IT networks, and then pivoted to OT through such a connection, resulting in catastrophic business and societal consequences:

  • June 2017: An attack using Petya malware was directed at the Ukrainian government and spread into the IT networks of many global companies. In the case of pharmaceutical giant Merck, it quickly spread to the manufacturing lines (OT), taking them offline for weeks. The company reported $1.3 billion in losses.
  • February 2021: Cyberattackers breached a U.S. city water department and increased the amount of sodium hydroxide (NaOH) in the system by 11,100%. NaOH is used in very small quantities to control acidity, but at these massive levels, it becomes a highly caustic drain cleaner (check the Drano under your sink). Fortunately, the change was noticed and corrected immediately.
  • May 2021: Colonial Pipeline suffered a ransomware cyberattack that shut down 45% of the fuel supply for the Eastern United States for a week and caused extensive ripple effects, including the the public’s panic buying of gasoline.
Grant Geyer, Chief Product Officer at Claroty, wearing white button up shirt and glasses with bookcases in the background.
Podcast
Lessons from the Colonial Pipeline Cyberattack & Steps to Take

The ransomware attack that shut down the Colonial Pipeline on May 7, 2021, is considered the most impactful cyberattack against U.S. critical infrastructure. In this “Automation Chat” podcast episode, Executive Editor Theresa Houck talks with Grant Geyer, Chief Product Officer at Claroty, to examine how the Colonial Pipeline cyberattack happened and its impact.

Also learn about the asset operator’s role as the first line of defense; how converged IT/OT networks are vital for ICS efficiency, but also increase the attack surface available — and what to do about it; the technical and organizational features of a well-thought-out cyber defense; lessons learned that are useful for every industrial firm and critical infrastructure facility. And much more.

Listen on your favorite podcast app or on the web, or watch the conversation on YouTube.

Listen Now Watch Now
The Trillion-Dollar Question

So, what do we do? One possible answer, which is being implemented around the world, is resegmentation. In principle, this means:

  • “Air gapping” high-risk networks.
  • Prohibiting traffic between any secured (OT) environments and the Internet.
  • Restricting connections to only required systems and ports.
  • Prohibiting any trust relationships across network lines that would permit a compromise on an open (IT) network to a locked-down (OT) network.
  • Prohibiting password reuse across networks and/or domains.

But in practice, these controls can't be implemented in most environments because:

  • Data must flow for the enterprise to work.
  • There is no way to enforce password reuse restrictions.

The reality is that enterprises and agencies are realizing that locking down OT is not at all simple. How do you continue to take advantage of the benefits of IT/OT convergence? What do you do with shared printers? Cloud services? Remote access? Can workers function effectively in such an environment? How many strong and unique usernames and passwords can one person remember without re-use or writing them down?

As seen in the examples above and reported in the Verizon Data Breach Investigations Report (VDBIR) every year since its inception, lost, stolen, or compromised identities are at the root of the vast majority of OT breaches. In the words of Bret Arsenault, Microsoft CISO, “Hackers don’t break in. They log in.”

A useful approach is a safe, secure and simple way to verify the user at the edge of the network — local or remote — is actually the person you need them to be. To do this, we need presence, nonrepudiation (can’t be copied), and collusion/coercion prevention and detection. An example of this is biometrics to activate and on-body detection to continue use. 

From an employee perspective, this must all be wrapped in a simple user experience that’s connected to everything — IT, OT, doors and floors, vending machines, printers, DX initiatives, health and safety. People have already experienced the ease and convenience of connection and when we take it away to make strong security their responsibility, they will get fatigued and fail.

eBook
Industrial Security for Machine and Equipment Builders

Enterprise connectivity represents a massive opportunity for both machine builders and their customers. But the risks associated with having a complex, interconnected system — from cybercriminals and competitors — are growing. Almost one in two companies has experienced illicit copying of entire machines. Cyberattacks can cause damage to physical assets, workers or products. Learn how to protect your intellectual property and expand your market with this eBook from Rockwell Automation.

Download Now

As more OT devices are connected to IT networks, and as more threats attack our borders, the more we realize and must accept we are caught in the middle of a connection paradox. A strong option is through a deliberate approach to connecting workers that prioritizes security, privacy, and best user-experience principles all at once. 

Manage IT/OT Convergence

We know the old way doesn’t work. And we know better than to live with unsecure connections between IT and OT. An approach built on a comprehensive connected worker platform can help organizations proactively resolve the IT/OT conundrum by managing and connecting their data, systems and workers in a safe, secure and simple manner.

Nymi™ is a Toronto-based technology company and Technology Partner in the Rockwell Automation PartnerNetwork™ program. The company’s Nymi Band workplace wearable is designed to protect the health, safety and security of connected workers. It provides a platform to achieve zero-trust security principles and biometrics authorization.

 

 

The Journal From Rockwell Automation and Our PartnerNetwork™ is published by Putman Media, Inc.

Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe
Recommended for You
Loading
  • Contact Sales
  • Contact Customer Care
  • Contact Technical Support
  • Phone Support
  • General Questions
  1. Chevron LeftChevron Left United States Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left The Journal Chevron RightChevron Right