Securing federal OT requires ecosystem visibility
May 18, 2021
May 18, 2021
The National Security Agency is warning Pentagon agencies and private sector defense contractors to better secure their operational technology (OT) equipment — the special computer systems that run industrial machinery. The warning highlights the increasingly numerous and dense connections between OT equipment and regular IT networks, saying that each such connection increases the risks to OT.
The Defense Department is a huge user of OT. It is, for instance, one of the largest fuel handling organizations in the world — all of its refueling depots rely on OT.
But the NSA warning should serve as a wakeup call for all federal agencies. OT is everywhere in the federal enterprise — HVAC and entry control systems are in every government building, for example. And OT systems are vital to many critical infrastructure sectors — starting with energy and oil and gas, but including water and sewage, pharmaceuticals, and manufacturing.
The stakes were revealed this year when a hacker obtained remote access via the public internet to an OT system that controlled the water system for the town of Oldsmar, Fla., and attempted to poison it.
The NSA warning points out that many government OT systems are “stagnant … past end-of-life and operated without sufficient resources.”
Federal agencies need to start thinking about the security of their OT systems the same way they look at their IT networks — vulnerabilities have to be mitigated, risk management decisions must be made, and investments have to be planned.
Federal agencies have spent years getting on top of their cybersecurity issues, but securing OT is a very different challenge. OT systems are often designed to be in place for decades, and they’re not built to be updated the way conventional software IT is. Increasingly, these systems, designed to operate on a standalone or air-gapped basis, are in practice accessible online through the business IT networks of the agencies that operate them.
Many federal CIOs have an “uh-oh” moment when they first see the traffic from their “isolated” or “air-gapped” OT systems flowing across their business IT networks — and realize they’re sometimes accessible from the public internet.
<<< Start >>>
<<< End >>>
That creates a large and, in many organizations, poorly understood attack surface. Agencies may not have a good idea of all the risks they could be facing because they don’t have visibility of the entire attack surface, and the vulnerabilities of OT systems are not well understood except by expert specialists.
At Operation: Next, a recent OT security conference staged by Accenture, Guy Delp, VP of Global Information Security at Pfizer, discussed building a security operation to protect OT assets. Pfizer is currently using its OT assets to manufacture COVID-19 vaccines.
Delp offered seven takeaways that are highly relevant for federal agencies.
Different agencies are at different stages on their OT security journey. But few have the visibility they require into the connectivity of their OT. And fewer still are in a position to leverage that visibility with specialized OT security expertise to properly assess their risk.
“A significant shift in how operational technologies (OT) are viewed, evaluated, and secured within the U.S. is needed,” warns the NSA, “to prevent malicious cyber actors from executing successful, and potentially damaging, cyber effects.”
The threat to OT systems is real, and agencies need to have a plan to defend themselves.