Modern SCADA Systems Are Exposed to Cybercriminals
For energy and utility companies, securing operational technology was “more about restricting physical access to the environment,” says Carlos M. González, research manager of Internet of Things ecosystems and trends for IDC, because “network connectivity for OT was pretty minimal.”
That’s changed, González says: “Companies are realizing they need better insight into their OT networks to be more flexible, to manage resources, to reduce downtime and to keep up with demand. As a result, they’re now connecting OT devices to IT networks, and often they’re pushing things through that aren’t ready in terms of security.”
Having SCADA networks connected to the outside world presents obvious risks, including ransomware, malware and potential hacks by hostile actors looking to cause chaos. Here are some of the most important tactics that organizations can use to address the risk of IT-OT convergence:
Asset inventory and security assessments. “The No. 1 thing companies need to do is to create an accurate database of all the assets connected to their networks,” González says. “People are constantly surprised when they conduct an inventory and realize they have more devices connected than they thought.” In addition to asset inventories, organizations should consider gap analyses, vulnerability assessments and penetration testing to uncover weaknesses in their defenses and prioritize mitigation steps.
Multilayered security measures. No single solution will be able to shore up all of an organization’s SCADA security gaps. Instead, IT and OT leaders should work together to develop a multilayered security strategy that includes tools such as firewalls, intrusion detection and prevention systems, and endpoint security solutions. It is also important to adopt security analytics and monitoring tools that will help organizations gather real-time insights and spot potential intrusions before attacks have a chance to spread throughout an environment.