In an era of digital transformation, more companies are relying on Operational Technology (OT) systems to monitor and control physical processes, devices and infrastructure. OT systems are used in multiple industries and perform a wide variety of tasks ranging from monitoring critical infrastructure (CI) to controlling robots at a warehouse distribution center such as Amazon’s.
Your customers may focus on safeguarding their networks and data while paying little attention to securing their industrial control systems from malicious attacks or cyber threats. According to Fortinet’s 2022 State of Operational Technology and Cybersecurity, based on a global survey of more than 500 OT professionals, only 13 percent of respondents have achieved centralized visibility of all OT activities. And only 52 percent are able to track all OT activities from the security operations center (SOC).
When evaluating security solutions for your clients’ converging networks, ask yourself if the security solution can do the following:
1. Identify assets, classify them and prioritize their value
Any IT pro will tell you that you cannot protect what you cannot see. The right vendor can conduct a threat assessment using a system such as a next-generation firewall (NGFW) that can recognize application protocols and passively observe network traffic, including encrypted traffic.
2. Segment your client’s network dynamically
Network segmentation is one of the most effective means of protecting OT environments. A security vendor can divide your client’s network into a series of “zones” and make each zone accessible only by authorized devices, applications and users.
3. Analyze traffic for threats and vulnerabilities
Once NGFWs divide an OT network into segments and conduits, work with your security technology partner to analyze network traffic for known and unknown threats.
4. Enforce identity and access management
Forty-two percent of OT organizations experienced insider breaches, up from 18 percent in 20201. An OT security solution should enforce role-based access for each user and limit access through integration with the firewall to only appropriate resources and network microsegments. Multi-factor authentication is a must.
5. Secure both wired and wireless networks
In an OT environment, network switches and wireless access points (APs) are two attractive targets for cyberattacks. Both should have security by design, administered from one central interface.
Get your copy of our eBook for more information on best practices for OT security.
1. “2021 State of Operational Technology and Cybersecurity Report,” Fortinet, May 26, 2021.