Blog with auto template – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 06 Jan 2026 06:09:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Blog with auto template – Waterfall Security Solutions https://waterfall-security.com 32 32 Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/cyber-threats-to-the-manufacturing-industry-risks-impact-and-protection-strategies/ Tue, 11 Nov 2025 12:34:11 +0000 https://waterfall-security.com/?p=37134 The post Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies appeared first on Waterfall Security Solutions.

]]>
The manufacturing sector stands at a critical inflection point as digital transformation reshapes production environments worldwide. While smart manufacturing technologies promise unprecedented efficiency gains, they also introduce significant cybersecurity vulnerabilities that threat actors are increasingly eager to exploit. Modern manufacturing facilities have evolved from isolated production environments into interconnected digital ecosystems where operational technology (OT) systems now interface with enterprise IT networks, cloud platforms, and supply chain partners. This convergence creates an expanded attack surface that requires specialized security approaches tailored to manufacturing’s unique operational requirements. 

 Digital Transformation Exposes Manufacturing to New Cyber Risks

The Fourth Industrial Revolution has fundamentally transformed manufacturing through the integration of digital technologies like Industrial IoT, artificial intelligence, cloud computing, and advanced automation. These innovations enable data-driven decision making, predictive maintenance, and flexible production capabilities that provide competitive advantages. However, this digital transformation simultaneously exposes manufacturing operations to cybersecurity risks that traditional industrial environments never had to confront.

Smart Factory Vulnerabilities: Where Digital Meets Physical

The modern smart factory contains numerous potential entry points for cyber attackers that simply didn’t exist in previous generations of manufacturing facilities. Programmable Logic Controllers (PLCs) that directly control machinery were once isolated systems but now often connect to enterprise networks for performance monitoring and remote management. These critical control devices frequently run proprietary firmware with minimal built-in security controls, creating significant vulnerabilities when exposed to network access.
Human-Machine Interfaces (HMIs),the touchscreens and operator panels that control production equipment,represent another substantial vulnerability point. Often running outdated operating systems like Windows XP or Windows 7, these interfaces typically lack endpoint protection, are rarely patched, and frequently use default passwords. Despite their critical role in production operations, HMIs have become favorite targets for attackers seeking to manipulate manufacturing processes.

 Manufacturing-Specific Cyber Attack Patterns and Techniques

Cyber attacks against manufacturing targets have evolved into specialized techniques designed to exploit the unique characteristics of industrial environments. Understanding these manufacturing-specific attack patterns is essential for developing effective defense strategies.

Ransomware’s Evolution to Target Production Systems

Ransomware attacks against manufacturers have evolved dramatically from early variants that primarily targeted IT systems. Modern manufacturing-focused ransomware specifically targets operational technology, with attackers demonstrating sophisticated knowledge of industrial control systems. Recent campaigns have included specific capabilities for encrypting engineering workstations, PLC project files, and SCADA databases, elements that are unique to industrial environments.
These specialized attacks often begin with reconnaissance phases where attackers map OT networks and identify critical production chokepoints. By targeting systems like manufacturing execution systems (MES) or production scheduling databases, attackers can maximize operational disruption while encrypting a relatively small number of systems. This strategic approach increases pressure on victims to pay ransoms quickly to restore production.

Industrial Espionage: Stealing Manufacturing Secrets and Intellectual Property

Manufacturing environments contain valuable intellectual property that makes them prime targets for espionage operations. These attacks focus on exfiltrating data rather than causing disruption and often maintain persistence for extended periods to capture evolving proprietary information.
Sophisticated threat actors target manufacturing process data including machine parameters, formulations, production sequences, and quality control methodologies. This information can allow competitors to replicate manufacturing capabilities without the substantial R&D investment required to develop them. In highly competitive sectors like pharmaceutical manufacturing or advanced materials production, these trade secrets often represent the company’s most valuable assets.

Sabotage Attacks: When Adversaries Target Production Quality and Safety

Perhaps the most concerning attack pattern involves sabotage operations designed to manipulate manufacturing processes to degrade product quality, damage equipment, or create safety incidents. These attacks specifically target the integrity of production systems rather than their availability or confidentiality.
Sabotage attacks often focus on manipulating process parameters to introduce subtle defects that may go undetected until products reach customers. By changing temperature settings, timing parameters, or ingredient proportions by small amounts, attackers can cause quality issues that damage a manufacturer’s reputation and potentially create product liability concerns. These attacks are particularly dangerous because they don’t immediately announce themselves through system outages.
 

 

Industry Segment Attack Types Common Entry Points Average Recovery Time Business Impact
Automotive Ransomware, IP Theft Supplier Connections, Remote Access 7-10 days $1.5M+ per day
Pharmaceuticals IP Theft, Process Manipulation Regulatory Reporting Systems, Research Networks 14+ days FDA Compliance Issues, Formula Theft
Food & Beverage Ransomware, Sabotage Remote Monitoring, Logistics Systems 3-5 days Product Recalls, Spoilage
Electronics IP Theft, Supply Chain Attacks Design Systems, Contract Manufacturers 5-8 days Counterfeiting, Design Theft
Defense Nation-State Espionage Contractor Networks, Email Phishing 30+ days (classified systems) National Security Implications
Chemical Manufacturing Safety System Targeting, Sabotage Process Control Networks, Safety Systems 10-14 days Environmental Incidents, Regulatory Fines

 

The Real-World Consequences of Manufacturing Cybersecurity Failures

The business impact of cyber incidents in manufacturing environments extends far beyond immediate IT recovery costs. Manufacturing-specific effects can damage competitive positioning, compromise product quality, and even create physical safety risks. Understanding these real-world consequences is essential for properly evaluating security investments and prioritizing protection measures.

Production Line Cybersecurity Incidents: Analyzing Recovery Time and Costs

Manufacturing cyber incidents impose immediate financial penalties through production downtime that directly impacts revenue and customer commitments. The average manufacturing cyber incident now results in 8.2 days of production disruption, with full recovery taking significantly longer. At average downtime costs of $1.1 million per day for large manufacturers, these incidents create immediate financial damage that far exceeds typical recovery expenses.
Recovery from manufacturing cyber incidents involves unique challenges not present in other sectors. Production equipment often requires precise calibration and validation before operations can safely resume. Quality control procedures must verify that affected systems will produce conforming products once restored. These manufacturing-specific recovery requirements significantly extend the impact period beyond initial containment.
Case studies illustrate the substantial operational impact these incidents create. A 2023 ransomware attack against a major automotive parts supplier resulted in production stoppage at three manufacturing facilities for 11 days. Beyond the immediate $12 million in lost production value, the company incurred significant overtime costs during recovery and faced contractual penalties from OEM customers whose production lines were affected by component shortages. 

When Cyber Attacks Become Safety Incidents in Manufacturing

The potential for cyber attacks to compromise safety systems represents a unique risk in manufacturing environments where physical processes can create hazardous conditions if improperly controlled. Unlike purely digital environments, manufacturing cyber incidents can directly threaten human safety and environmental protection.
Several documented cases illustrate this dangerous convergence. In 2019, a safety incident at a chemical manufacturing facility was linked to a cyber intrusion that had disabled certain alarm functions, preventing operators from receiving early warnings about an abnormal reaction. While no injuries occurred, the incident resulted in a product batch destruction and a regulatory investigation.
More concerning are targeted attacks against safety instrumented systems (SIS) that provide critical protection against hazardous conditions. The TRITON/TRISIS malware specifically designed to compromise Schneider Electric safety controllers, demonstrates that threat actors are actively developing capabilities to undermine these critical protections. By disabling or manipulating safety systems, attackers could create conditions for serious incidents while simultaneously removing the safeguards designed to prevent them.

Supply Chain Ripple Effects from Manufacturing Cyber Disruptions

The interconnected nature of modern manufacturing magnifies the impact of cyber incidents far beyond the initially affected organization. When a manufacturer experiences operational disruption, the effects propagate through supply chains in both directions, creating cascading impacts across multiple companies.
Downstream impacts affect customers who rely on the manufacturer’s output as inputs to their own processes. In tightly coordinated supply chains, even short disruptions can halt downstream production lines when critical components become unavailable. The 2021 ransomware attack on a major automotive supplier forced five OEM assembly plants to temporarily suspend operations due to component shortages, illustrating how manufacturing cyber incidents can create multiplier effects that far exceed the direct impact on the targeted company.

 

Building Manufacturing-Optimized Security Architecture

Effective manufacturing cybersecurity requires architectural approaches specifically designed for industrial environments. Generic IT security solutions often fail to address the unique operational requirements, legacy systems, and specialized protocols found in manufacturing facilities. A manufacturing-optimized security architecture acknowledges these differences while providing robust protection.

Securing Manufacturing Zones: The Industrial DMZ Approach

Zone-based security architecture provides the foundation for effective manufacturing protection by establishing clear boundaries between networks with different security requirements and operational purposes. This approach implements the Purdue Enterprise Reference Architecture’s concept of hierarchical security zones to control communication between business systems and operational technology.
The industrial demilitarized zone (DMZ) serves as a critical security boundary between IT and OT environments. This intermediary network segment hosts systems that need to communicate with both business and manufacturing networks while preventing direct connections between these environments. Properly implemented industrial DMZs include data historians, OPC servers, and middleware applications that facilitate necessary data flows while limiting potential attack paths.
Within manufacturing environments, further segmentation creates protection zones based on operational function and criticality. Critical safety systems receive the highest protection levels, while monitoring systems may operate in less restricted zones. This functional segmentation prevents an attack that compromises one manufacturing area from spreading throughout the entire operational environment

OT Visibility: You Can’t Secure Manufacturing Systems You Can’t See

Comprehensive asset visibility represents a fundamental challenge in manufacturing environments where diverse equipment from multiple vendors often operates with minimal network monitoring. Many manufacturing organizations lack complete inventories of their operational technology assets, creating significant security blind spots.
Effective manufacturing security requires specialized OT asset discovery tools that can safely identify industrial control systems without disrupting their operation. Unlike IT scanning tools that might crash sensitive OT systems, these solutions use passive monitoring and protocol analysis to build comprehensive asset inventories without sending potentially disruptive active probes.
Beyond basic inventory, manufacturing security requires visibility into system configurations, connections, and communications patterns. Baseline documentation should include PLC programming, HMI configurations, and control system parameters to enable effective change detection. Deviations from these documented baselines often provide the first indication of potential compromise.
Continuous monitoring of industrial network traffic enables early threat detection while providing operational benefits through improved troubleshooting capabilities. Modern OT monitoring solutions use protocol-specific decoders to analyze industrial communications, identifying both security and operational anomalies. These systems can detect unauthorized command sequences, unusual data transfers, or configuration changes that might indicate compromise while helping identify operational issues before they impact production.
The visibility challenge extends to understanding the complex interdependencies between manufacturing systems. Documentation should capture which systems depend on others for normal operation, which safety systems protect specific processes, and what communication paths are necessary for production. This mapping of dependencies enables both more effective security controls and more resilient recovery plans.

Authentication and Access Control in Shared Manufacturing Environments

Manufacturing environments present unique identity and access management challenges due to shift operations, shared workstations, and the frequent need for vendor access to specialized equipment. Traditional IT access controls often fail to address these operational realities, leading to either security compromises or workflow disruptions.
Effective manufacturing access control begins with role-based approaches that align permissions with operational responsibilities. Rather than managing access for individual users, this approach defines permission sets for roles like machine operator, maintenance technician, or process engineer. This simplifies administration in environments with rotating staff while ensuring consistent security controls.
Shared workstation environments require authentication solutions that balance security with operational efficiency. Manufacturing-optimized approaches include badge-based authentication systems that allow quick user switching without disrupting operations. Some facilities implement proximity-based authentication that automatically locks HMI screens when operators move away and grants access when authorized personnel approach with appropriate credentials.

Manufacturing Cybersecurity Without Disrupting Production

The imperative to maintain continuous operations creates unique constraints for security implementation in manufacturing environments. Effective manufacturing security strategies must work within these constraints, enhancing protection without compromising production excellence.

Testing Manufacturing Security Without Risking Operational Disruption

Validating security effectiveness poses particular challenges in manufacturing environments where testing on production systems risks operational disruption. However, leaving security controls unverified creates risks of either inadequate protection or unexpected operational impacts when security systems respond to actual threats.
Digital twin approaches provide a sophisticated testing methodology for manufacturing security. By creating virtual replicas of production environments, organizations can conduct realistic security testing without risking impact to operational systems. These environments allow red team exercises, vulnerability assessments, and security control validation using the same configurations present in production.
Test labs with physical equipment matching production systems provide another validation path, particularly for testing security controls on older equipment that might not be accurately represented in virtualized environments. These test environments should replicate network configurations, control system versions, and communication patterns found in production to ensure realistic testing results.
When direct testing on production systems becomes necessary, careful test scoping and scheduling minimizes risks. Tests should be limited to specific network segments, conducted during periods of lower production criticality, and include explicit backout plans to quickly restore normal operations if unexpected impacts occur. Manufacturing security testing should always include operations personnel who understand production requirements and can immediately identify potential production impacts.

 

Security Patches and Updates: Managing Risk in Production Environments

Patch management represents one of the most challenging aspects of manufacturing cybersecurity. Critical security updates often cannot be applied immediately due to production continuity requirements, vendor qualification processes, or concerns about potential compatibility issues with specialized equipment.
Effective manufacturing patch management begins with comprehensive risk assessment processes that evaluate both the security risk of delaying patches and the operational risk of applying them. This balanced approach acknowledges that both actions and inactions carry potential consequences in manufacturing environments. Critical vulnerabilities with active exploitation in similar environments typically justify expedited patching, while less severe vulnerabilities might be addressed during scheduled maintenance periods.
When patching must be delayed, compensating controls provide interim protection. These might include enhanced network monitoring around vulnerable systems, implementing additional access restrictions, or deploying virtual patching through intrusion prevention systems that can block exploitation attempts without modifying vulnerable systems.
Vendor management plays a critical role in effective manufacturing patch processes. Organizations should establish clear security expectations with equipment vendors, including response timeframes for critical vulnerabilities and testing processes for security updates. Leading manufacturers implement vendor security requirements during procurement processes, ensuring that new equipment includes appropriate update capabilities and security support commitments.
For legacy systems that cannot be patched, lifecycle management becomes an essential security strategy. Organizations must develop clear criteria for when security risks justify equipment replacement, incorporating security considerations into capital planning processes. This approach acknowledges that some systems simply cannot be adequately secured through updates alone and must eventually be replaced to maintain appropriate security postures.

 

Security Control Type Implementation Impact Production Downtime Required Effectiveness Rating Best For
Network Segmentation Medium Minimal (phased implementation) High Isolating critical systems
Unidirectional Gateways Low None (parallel deployment) Very High Critical system protection
Endpoint Protection High Moderate (requires testing) Medium Engineering workstations
ICS Monitoring Low None (passive monitoring) Medium-High Anomaly detection
Access Controls Medium Low (staged implementation) High Limiting privileged access

 

How Waterfall Security Solutions Safeguards Manufacturing Excellence

Manufacturing organizations face the dual imperative of enhancing cybersecurity while maintaining the operational reliability that enables production excellence. Waterfall Security Solutions has developed specialized technology that addresses this challenge, enabling robust protection without compromising the performance, availability, and reliability requirements of industrial environments.
Unidirectional Security Technology: Protecting Manufacturing Without Performance Penalties
Waterfall’s unidirectional security gateway technology provides a fundamentally different approach to manufacturing protection compared to traditional IT security solutions. Rather than relying on software-based controls that can be misconfigured or compromised, these gateways use hardware-enforced security to physically prevent attacks from reaching sensitive manufacturing systems.

 

Conclusion

 

As manufacturing evolves toward increasingly connected and data-driven operations, cybersecurity becomes an essential element of production excellence rather than a separate consideration. The threats targeting manufacturing environments continue to grow in both frequency and sophistication, requiring specialized protection approaches that address the unique characteristics of industrial operations.

 

The post Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies appeared first on Waterfall Security Solutions.

]]>
Top Oil and Gas Security Challenges and Best Practices for Protection https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/top-oil-and-gas-security-challenges-and-best-practices-for-protection/ Tue, 11 Nov 2025 12:16:46 +0000 https://waterfall-security.com/?p=37111 The post Top Oil and Gas Security Challenges and Best Practices for Protection appeared first on Waterfall Security Solutions.

]]>
The oil and gas industry faces a complex maze of cybersecurity challenges as digital transformation continues to reshape operations throughout the entire value chain. From upstream exploration activities to downstream distribution networks, critical infrastructure now depends heavily on interconnected operational technology systems that could spell disaster if compromised, potentially triggering catastrophic consequences for safety protocols, environmental protection, and overall energy security. This comprehensive examination of the sector explores the constantly evolving threat landscape, analyzes the key security challenges organizations face, and provides practical best practices to strengthen the protection of these essential assets.

The Evolving Threat Landscape in Oil and Gas Operations

The widespread digitalization of oil and gas operations has given rise to a sophisticated security environment where cyber threats increasingly zero in on critical infrastructure systems. Modern drilling platforms, refineries, and extensive pipeline networks now depend on advanced automation systems, Industrial Internet of Things devices, and cloud computing technologies to optimize their operations. While these technological advances have dramatically improved efficiency, they have also expanded the potential attack surface exponentially.

Recent Security Incidents in the Oil and Gas Sector

The industry has experienced several devastating high-profile security incidents that underscore just how severe these threats have become. The 2021 Colonial Pipeline ransomware attack stands as perhaps the most prominent example, forcing the complete shutdown of a massive 5,500-mile pipeline system that typically supplies 45% of the East Coast’s fuel supply. This single incident caused widespread disruption and fuel shortages across multiple states, demonstrating how vulnerable these critical systems can be to determined attackers.

Saudi Aramco has also faced numerous cyberattacks over the years, including the notorious 2012 Shamoon malware incident that destroyed over 30,000 computers throughout its network. More recently, the company has dealt with cloud-based attacks specifically targeting their valuable operational data, showing how threat actors continue to adapt their tactics to exploit new vulnerabilities.

The problem extends well beyond major corporations and affects smaller operators too. Throughout 2022, several midsize oil and gas operators reported ransomware attacks that specifically targeted their industrial control systems, with attackers displaying remarkably sophisticated knowledge of operational technology environments. These incidents resulted in production shutdowns lasting several days and, in some particularly concerning cases, compromised safety systems that could have led to catastrophic accidents.

Key Threat Actors Targeting Oil and Gas Infrastructure

Oil and gas facilities face threats from a diverse range of adversaries, each with its own distinct motivations and capabilities. Nation-state actors frequently target these facilities to gain geopolitical advantage, conduct economic espionage, or establish persistent access to critical infrastructure that could potentially be weaponized during future conflicts. Several countries with advanced cyber capabilities have been linked to extensive reconnaissance operations designed to map vulnerabilities in energy infrastructure worldwide.

Criminal organizations have increasingly recognized the significant profit potential in targeting oil and gas companies, particularly because these organizations face tremendous pressure to restore operations quickly during any outage. This business reality has led to the emergence of specialized ransomware operations that explicitly target industrial control systems, with ransom demands frequently exceeding $10 million for larger operations.

Additionally, hacktivists and environmental extremists represent a growing and unpredictable threat vector, with some groups motivated primarily by ideological opposition to fossil fuel operations. These actors typically focus on service disruption or data theft to embarrass companies and generate negative publicity rather than seeking direct financial gain, making their attack patterns significantly less predictable than profit-motivated criminals.

 

Year Attack Type Target System Impact Financial Loss
2021 Ransomware Colonial Pipeline IT systems 6-day pipeline shutdown $4.4 million ransom
2022 Malware European oil terminal OT systems Disrupted loading operations at multiple ports Undisclosed
2023 Supply chain Pipeline monitoring software Backdoor access to SCADA systems $30+ million (estimated)
2024 Zero-day exploit Offshore platform control systems Production shutdown for safety concerns $75+ million (estimated)
2025 Insider threat Refinery control systems Near-miss safety incident $15 million (remediation)

 

Critical Security Challenges Facing Oil and Gas Companies

The oil and gas industry confronts several unique security challenges that significantly complicate protection efforts across its operations. Understanding these specific challenges becomes crucial for developing effective security strategies that are properly tailored to address the sector’s particular operational requirements and constraints.

Convergence of IT and OT Security

Perhaps the most significant challenge facing the industry today involves the rapidly accelerating convergence of information technology and operational technology systems. Traditionally, industrial control systems operated in complete isolation from corporate networks, but ongoing digital transformation initiatives have increasingly connected these previously separate environments to enhance operational efficiency, enable remote monitoring and operations, and facilitate advanced data analytics capabilities.

This convergence creates dangerous security gaps where traditional information technology security approaches prove completely inadequate for operational technology environments. Operational technology systems prioritize availability and safety above all other considerations, making common IT security practices like regular patching schedules and frequent system updates highly problematic for continuous operations. Many security teams currently lack personnel with the specialized expertise spanning both domains, which inevitably leads to significant protection gaps in the critical interfaces between IT and OT networks.

The risks become even more magnified by the expanding use of Industrial Internet of Things devices that frequently lack built-in security controls yet connect directly to critical operational systems throughout the facility. Each new smart sensor or networked controller potentially introduces fresh vulnerabilities that could provide determined attackers with valuable access to essential production systems and processes.

Legacy System Vulnerabilities

The oil and gas industry operates extensive legacy infrastructure that was originally designed and deployed decades before cybersecurity became a significant operational concern. Many production facilities continue to use industrial control systems and SCADA equipment that have been in continuous operation for twenty years or more, running outdated operating systems that vendors no longer actively support with security updates.

These aging legacy systems present substantial and ongoing security challenges throughout the industry. They often cannot be patched with security updates, rely on obsolete communication protocols that completely lack modern authentication mechanisms, and were originally designed with the fundamental assumption of complete air-gapping rather than any network connectivity whatsoever. Replacing these systems involves prohibitive costs that can reach millions of dollars per facility, along with potential production disruptions that could last weeks or months, forcing companies to develop creative compensating security controls instead.

The challenge extends beyond just the technical aspects to include significant documentation gaps, with many organizations lacking complete and accurate network diagrams or comprehensive asset inventories for their older systems. This makes it extremely difficult to identify potential vulnerabilities or detect unauthorized changes to these critical environments during routine security assessments.

Remote Site Security Management

The vast geographical dispersion of oil and gas assets creates substantial security management challenges that are unique to the industry. Remote facilities such as offshore drilling platforms, pipeline compressor stations, and isolated production sites often operate with extremely limited on-site IT support, making comprehensive security implementation and continuous monitoring exceptionally difficult to maintain.

These remote sites frequently depend on satellite or cellular connections that come with significant bandwidth constraints, severely limiting the effectiveness of traditional security monitoring capabilities. Physical security at these remote locations may also be considerably less robust than at major facilities, substantially increasing the risk of both insider threats and physical tampering with critical control systems.

Secure remote access remains one of the most critical challenges for the industry, as maintenance personnel, third-party vendors, and operations teams require reliable access to these systems for ongoing monitoring, troubleshooting, and maintenance activities. Each remote access pathway represents a potential attack vector that must be properly secured and continuously monitored, yet operational requirements often conflict with strict security controls.

Essential Oil and Gas Cybersecurity Best Practices

Protecting oil and gas infrastructure effectively requires a comprehensive approach that incorporates advanced technical controls, well-defined organizational policies, and proven industry best practices. The following strategies provide a solid foundation for enhancing security posture across all types of operations, from small independent operators to major integrated companies.

Implementing Defense-in-Depth Security Architecture

Defense-in-depth architecture continues to serve as the fundamental cornerstone of effective protection for oil and gas infrastructure operations. This proven approach implements multiple layers of complementary security controls throughout the organization, ensuring that if one protective layer fails or is bypassed, additional layers remain in place to protect the most critical assets and operations.

For oil and gas operations specifically, effective defense-in-depth implementation begins with conducting a comprehensive asset inventory and detailed risk assessment to properly identify the critical systems that require the highest levels of protection. Security zones should be carefully established based on operational function and criticality levels, with appropriate controls implemented at each zone boundary to manage and monitor all communications between different areas.

The architecture should incorporate robust physical security measures protecting control hardware and infrastructure, comprehensive network security controls managing all data flows between different zones, application security measures ensuring system integrity at the software level, and detailed procedural controls governing human interactions with all systems throughout the facility.

Advanced monitoring capabilities spanning both IT and OT environments enable early detection of potential threats and suspicious activities, with security information and event management solutions providing correlation across all environments to identify anomalous behavior patterns that might indicate system compromise. Increasingly, artificial intelligence and machine learning technologies enhance these capabilities by automatically establishing normal operational baselines and flagging significant deviations that warrant investigation.

Regular tabletop exercises and comprehensive incident response drills help organizations thoroughly test their defense-in-depth implementation, ensuring security teams understand how layered controls work together effectively during an actual attack scenario and identify potential gaps before they can be exploited by malicious actors.

OT Network Segmentation Strategies

Network segmentation represents one of the most effective security controls available for oil and gas environments, significantly limiting an attacker’s ability to move laterally throughout the network after gaining initial access to any system. However, effective segmentation strategies for OT environments differ significantly from traditional IT approaches and require specialized knowledge of industrial systems and protocols.

The Purdue Enterprise Reference Architecture provides an excellent framework for industrial network segmentation, logically dividing systems into distinct levels ranging from field devices at Level 0, through various control systems at Levels 1 and 2, operations management systems at Level 3, and business systems at Levels 4 and 5. Each boundary between these levels represents a valuable opportunity to implement security controls that carefully restrict and monitor communications between different zones.

Implementing properly configured demilitarized zones at the critical IT/OT boundary allows necessary data exchange for business operations while minimizing direct connections between environments that could be exploited. Within the OT environment itself, micro-segmentation based on operational function, process area, or safety criticality further limits potential attack propagation and contains any successful intrusions.

Unidirectional security gateways provide particularly strong protection at the most critical boundaries, physically enforcing one-way information flow from OT networks to IT networks while completely preventing any control signals or potential malware from traveling in the reverse direction. This hardware-enforced protection effectively eliminates entire classes of network-based attacks while still enabling essential operational data to flow to business systems for analysis and reporting.

 

Regulatory Compliance in Oil and Gas Security

The oil and gas industry operates within a complex and continuously evolving regulatory landscape that increasingly addresses specific cybersecurity requirements for critical infrastructure protection. Understanding and maintaining compliance with these various requirements has become essential for operational continuity and legal protection.

International Standards and Industry Guidelines

Several key frameworks provide comprehensive guidance for cybersecurity practices specifically tailored to oil and gas operations. IEC 62443 offers detailed standards for industrial automation and control systems security, providing guidance that is specifically designed to address the unique needs and constraints of operational technology environments. This framework addresses technical security requirements, organizational processes, and complete system lifecycle security considerations.

The NIST Cybersecurity Framework provides a proven risk-based approach that applies across all industries but has become increasingly referenced in energy sector regulations worldwide. For pipeline operators specifically, the American Petroleum Institute’s Standard 1164 provides detailed and practical guidance on SCADA security practices, including recent updates that address modern threat landscapes and attack vectors.

Regional regulations increasingly impact even global operators who must comply with local requirements in each jurisdiction where they operate. The European Union’s comprehensive NIS2 Directive imposes strict security requirements on essential service providers, including all energy companies, while the U.S. Transportation Security Administration has implemented mandatory security directives for pipeline operators following lessons learned from the Colonial Pipeline incident.

Building a Compliance-Oriented Security Program

Rather than treating compliance as merely a checkbox exercise to be completed annually, leading oil and gas companies successfully integrate regulatory requirements into comprehensive security programs that genuinely enhance overall protection levels. This strategic approach begins with carefully mapping regulatory controls across different frameworks to identify common requirements and streamline implementation efforts across the organization.

Successful compliance programs place emphasis on ongoing risk management activities rather than relying solely on point-in-time assessments that may quickly become outdated. They incorporate regular evaluation of security controls against evolving threat landscapes and changing operational requirements. Documentation and evidence collection become integrated into standard operational processes rather than being conducted as separate, burdensome activities that interfere with daily operations.

Third-party risk management has become an absolutely essential element of compliance programs as regulations increasingly hold operators directly responsible for maintaining security throughout their entire supply chain ecosystem. Leading organizations implement comprehensive vendor security assessment programs and detailed contractual security requirements for all partners with any level of access to operational systems.

Framework /

Standard

Region/Scope Key Requirements Implementation Timeline
IEC 62443 International Secure development lifecycle, zone/conduit models Phased implementation
NIST CSF United States/Global Risk assessment, protection, detection, response Continuous improvement
API 1164 Pipeline operators SCADA security controls, authentication requirements Updated every 5 years
NIS2 Directive European Union Mandatory incident reporting, security measures Full compliance by 2026
TSA Security Directives U.S. pipeline operators Vulnerability management, incident response plans Immediate implementation

 

How Waterfall Security Solutions Protects Critical Oil and Gas Infrastructure

 

As threats to oil and gas infrastructure continue to grow in sophistication and frequency, traditional security approaches based solely on firewalls and software-based controls have proven inadequate for protecting critical operational systems. Waterfall Security Solutions addresses these complex challenges through innovative technology specifically designed to meet the unique protection needs of industrial environments where safety and availability cannot be compromised.

Unidirectional Security Gateway Technology for OT Protection

Waterfall’s flagship Unidirectional Security Gateway technology represents a fundamental paradigm shift in operational technology security, physically enforcing strict one-way information flow to protect critical infrastructure from external cyber threats. Unlike traditional firewalls that can be misconfigured, bypassed, or compromised through software vulnerabilities, Waterfall’s hardware-based approach creates an absolutely impassable barrier against any inbound attacks or unauthorized commands.

The technology utilizes a unique and innovative architecture featuring a transmitter component on the operational technology side connected to a receiver component on the information technology side through dedicated optical fiber connections. This physical configuration enables essential operational data to flow seamlessly to business systems for monitoring, analysis, and reporting purposes while making it physically impossible for malware, attack commands, or any unauthorized communications to travel in the reverse direction. This effectively creates a modern, highly functional implementation of traditional air gap protection while maintaining complete operational visibility and business intelligence capabilities.

For oil and gas operators, this approach successfully resolves the fundamental tension that has long existed between operational connectivity requirements and security imperatives. Critical production data, equipment status information, and performance metrics can flow freely to corporate networks for essential business intelligence purposes while critical control systems remain completely protected from any network-based attacks. The technology provides comprehensive support for all standard industrial protocols, including Modbus, OPC, and OSIsoft PI systems, enabling seamless integration with existing infrastructure investments without requiring costly system replacements.

 

Beyond the core gateway technology, Waterfall’s comprehensive solution suite includes specialized secure remote access options designed specifically for industrial environments, allowing authorized vendors and remote workers to access necessary systems when required without compromising overall security posture. The company’s industrial security monitoring solutions provide detailed visibility into operational technology network activity to detect potential insider threats or anomalous behavior patterns that might indicate compromise.

Conclusion

 

The security challenges facing the oil and gas industry will undoubtedly continue to evolve and become more complex as digital transformation initiatives reshape operations and threat actors develop increasingly sophisticated attack capabilities and techniques. Organizations that proactively implement comprehensive security strategies combining advanced technology, robust processes, and well-trained personnel will be best positioned to protect their critical infrastructure while still enabling the significant operational benefits that modernization can provide.

By carefully applying the proven best practices outlined throughout this article and leveraging specialized security technologies like those provided by Waterfall Security Solutions, oil and gas operators can substantially enhance their overall security posture while ensuring the reliable and safe delivery of essential energy resources to communities and industries worldwide. The investment in robust cybersecurity measures today will prove essential for maintaining operational continuity and protecting both business assets and public safety in an increasingly connected and threatened world.

The post Top Oil and Gas Security Challenges and Best Practices for Protection appeared first on Waterfall Security Solutions.

]]>
Data Diode vs Firewall: Understanding the Key Differences in OT Security https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/data-diode-vs-firewall-understanding-the-key-differences-in-ot-security/ Tue, 04 Nov 2025 09:20:06 +0000 https://waterfall-security.com/?p=37000 The post Data Diode vs Firewall: Understanding the Key Differences in OT Security appeared first on Waterfall Security Solutions.

]]>
When you’re protecting operational technology infrastructure, the security solution you pick could mean the difference between weathering a cyberattack and making headlines for all the wrong reasons. It’s not really about whether you need protection anymore; that ship sailed when hackers started going after power grids and water systems. What matters now is figuring out which technology will actually work when attackers come knocking.

OT security isn’t your typical IT problem. We’re talking about systems that run power plants, manage water treatment facilities, control manufacturing lines, and keep transportation networks moving. When these systems fail, you’re not dealing with stolen passwords or leaked documents. You’re looking at potential physical damage, environmental disasters, or genuine public safety threats. Understanding your security options has never been more critical.

Two technologies dominate the conversation when it comes to creating secure boundaries between OT networks and external threats: data diodes and firewalls. Both handle security, but their approaches are worlds apart. This choice shapes everything: immediate protection, operational flexibility, compliance posture, and how well you’ll handle whatever new threats emerge.

TLDR: Data Diode vs Firewall key differences: 

Aspect Data Diode Firewall
Security Model Hardware, one-way Software, two-way
Attack Surface Minimal, immune to 0-day Larger, exploitable
Maintenance Low, set-and-forget High, ongoing updates
Flexibility Limited, no remote High, supports remote
Performance Low latency, scalable Higher latency may slow
Compliance Simple, physical proof Complex, ongoing checks
Use Cases Critical infrastructure General OT with access

What is a Data Diode? Core Technology and Functionality Explained

A data diode is a cybersecurity device that enforces one-way data transfer between two networks. It allows information to flow out of a secure system without allowing external data to flow back in. Organizations use data diodes to protect critical infrastructure, defense systems, and industrial control networks from cyberattacks.

The technology works by physically severing the return path that network communications typically need. Regular network connections require two-way communication for protocols like TCP/IP to work properly. Data diodes break this requirement at the hardware level, making it physically impossible for external systems to establish connections or push data back into protected networks.

What is The Technical Architecture of Data Diodes?

The hardware creates what’s essentially an air gap with controlled, one-way data transmission. Inside these devices, fiber optic connections carry data from OT networks to external monitoring systems, but the physical design prevents signals from traveling backward. The transmit fiber literally can’t receive signals, and the receive side can’t transmit anything. This isn’t a software setting that could accidentally get changed; it’s baked into the hardware design.

Your OT systems still provide all the data needed for monitoring, reporting, and analytics. Historians keep collecting process data, SCADA systems continue displaying real-time information, and operators maintain full operational visibility. The key difference? This visibility never creates a pathway for attackers to reach critical systems.

Data diodes also eliminate concerns about network protocols being exploited. Since there’s no return communication path, traditional network-based attacks simply can’t function. Malware that depends on command and control communications finds itself cut off from its handlers. Remote access trojans lose their ability to communicate back to attackers.

Security Guarantees Provided by Hardware Enforcement

Hardware enforcement gives you security guarantees that software simply can’t match. With a data diode, protection doesn’t depend on perfect configuration, timely updates, or hoping that nobody’s found an undiscovered vulnerability. The security model is binary: data goes out, nothing comes back.

This approach eliminates entire categories of cyberattacks that need two-way communication to succeed. Advanced persistent threats, remote access trojans, and command-and-control communications all need bidirectional connectivity. By physically preventing this connectivity, data diodes create an impenetrable barrier.

The reliability extends beyond just cybersecurity threats. Data diodes also protect against insider threats who might attempt to establish unauthorized network connections. Even with administrative access to systems, an insider can’t override the physical limitations of the hardware.

Firewall Technology in OT Security Contexts

Firewalls have evolved considerably since their early days, particularly for operational technology environments. Modern OT firewalls include deep packet inspection, protocol-aware filtering, and specialized capabilities for industrial communication protocols. They act as intelligent gatekeepers, examining traffic and deciding what gets through based on predefined rules and policies.

Unlike data diodes, firewalls keep bidirectional connectivity alive while trying to filter out malicious traffic. They analyze packet contents, addresses, protocol types, and application behaviors to determine whether communications should pass or get blocked.

Evolution of Firewall Technology for Industrial Networks

Firewalls were originally built for IT networks, where the main job was to keep malicious traffic out of corporate systems while still allowing employees, servers, and applications to connect to the internet. These early firewalls were not designed with operational technology (OT) in mind. Industrial networks have very different requirements-24/7 uptime, specialized communication protocols, and devices that often remain in service for decades. Applying traditional IT firewalls directly to OT environments often caused disruptions, latency, or outright failures because the firewalls simply didn’t “understand” how industrial equipment communicated.

 

evolution of firewall technology

To meet these unique demands, firewalls for industrial use evolved in several key ways.

First, they became protocol-aware. Industrial control systems rely on communication protocols such as Modbus, DNP3, IEC 61850, OPC, and PROFINET. Unlike typical IT protocols, these are highly specialized and often lack built-in security features. Modern OT firewalls now include deep packet inspection (DPI) for these protocols, meaning they can read and interpret the actual commands and values being exchanged between devices. This allows the firewall not only to block generic suspicious traffic, but also to detect anomalies such as unauthorized control commands or malformed data packets that could indicate tampering.

Second, OT firewalls added segmentation capabilities tailored to industrial environments. In IT, segmentation often means dividing a corporate network into different security zones. In OT, segmentation is even more critical because it can stop a compromise in one part of a plant or facility from spreading to safety-critical or production-critical systems. Modern industrial firewalls enable very granular control, ensuring that only specific devices or applications can talk to each other, and only in very specific ways.

Third, these firewalls evolved to perform application-layer filtering. Instead of just looking at IP addresses and ports, they can analyze the actual applications running on top of communication protocols. This provides deeper security by distinguishing between normal operational commands and malicious activity that might be hidden inside legitimate-looking traffic. For example, a command to “read data” might be allowed, while a command to “change setpoint” from an unauthorized source would be blocked immediately.

Finally, OT firewalls now support high availability and redundancy features designed for industrial use. In environments like power grids, oil refineries, or manufacturing lines, even a momentary network disruption can have costly or dangerous consequences. Industrial firewalls are engineered to handle continuous uptime, support redundant hardware configurations, and tolerate the challenging physical conditions of plant environments, such as electrical noise, temperature extremes, or vibration.

In short, firewalls for industrial networks have matured far beyond their IT ancestors. They are now specialized security devices that combine traditional packet filtering with deep industrial protocol awareness, network segmentation, and resilience features. This evolution reflects the growing recognition that OT environments face distinct threats, and that protecting them requires tools specifically designed for the realities of industrial operations.

Configuration and Management Challenges in OT Environments

Managing firewalls in OT environments creates challenges. Industrial systems often need 24/7 availability, which means maintenance windows are scarce. Configuration changes require careful planning and testing. Firewall rule sets can become incredibly complex, and mistakes can block legitimate traffic or allow malicious activity through.

Another challenge involves keeping up with security updates and threat intelligence. Firewall effectiveness depends heavily on current threat signatures and properly configured rules. This ongoing maintenance requirement can strain resources.

Key Differences: Data Diode vs Firewall Security Capabilities

Data diodes operate on a deterministic security model where the hardware design makes certain attacks physically impossible. Firewalls implement rule-based protection requiring constant management.

The deterministic nature of data diodes means your security posture doesn’t deteriorate over time.  Firewalls, on the other hand, rely on constant vigilance, updates, and adjustments.

data diode vs firewall

 

Maintenance and Operational Requirements

Firewalls need regular updates, rule changes, and monitoring. Data diodes need minimal maintenance once deployed. Firewall management requires cybersecurity expertise; data diodes require more upfront network design work.

Performance and Operational Considerations

Data diodes excel in high-throughput scenarios and handle any IP-based protocol without modification. Firewalls introduce latency due to inspection and require protocol-specific support.

Operationally, firewalls enable remote access while data diodes eliminate it. Organizations must balance between absolute security and operational flexibility.

Data Diodes Regulatory Compliance

Data diodes align closely with critical infrastructure protection standards, offering simple, verifiable compliance. Firewalls can support compliance, too, but require continuous updates and detailed documentation.

Implementation Scenarios

Use data diodes for critical systems that can’t tolerate compromise, such as power generation or chemical processing. Use firewalls when bidirectional communication and remote access are essential, such as in manufacturing. A layered approach using both often makes the most sense.

Waterfall Security’s Unidirectional Security Gateway

Waterfall Security Solutions pioneered hardware-enforced unidirectional protection. Their Unidirectional Security Gateway advances data diode concepts with support for industrial protocols, secure file transfers, and solutions like HERA (Hardware-Enforced Remote Access).

Waterfall Security’s technology provides deterministic security guarantees while addressing practical deployment challenges in industrial networks. With proven deployments in power, oil and gas, water treatment, transportation, and more, Waterfall offers a reliable approach to OT cybersecurity.

Conclusion

When it comes to protecting Critical infrastructure, your choice between data diodes and firewalls does not have to be an either/or decision. While data diodes provide absolute protection through unidirectional communication and firewalls offer flexible, bidirectional connectivity with rule-based security, the most robust OT security strategies often combine both. 

By adding hardware-enforced protection to segment critical networks, organizations can dramatically strengthen their security posture. This layered approach ensures that even if a firewall is compromised, the physical barrier provided by a data diode prevents threats from reaching your most sensitive systems. As cyber threats against OT continue to evolve, combining these technologies delivers resilience and safety for the future.

As cyber threats against OT continue to evolve, understanding these differences ensures resilience and safety for the future.

 

The post Data Diode vs Firewall: Understanding the Key Differences in OT Security appeared first on Waterfall Security Solutions.

]]>
Doing the Math – Remote Access at Wind Farms https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/remote-access-at-wind-farms/ Mon, 22 Sep 2025 12:07:50 +0000 https://waterfall-security.com/?p=36144 The post Doing the Math – Remote Access at Wind Farms appeared first on Waterfall Security Solutions.

]]>
By Andrew Ginter, VP Industrial Security, Waterfall Security

Stuff wears out. Friction is the enemy of moving parts and rotating equipment. Vibration is the symptom of wear – in conventional generators and wind farms both. But the math is different in wind farms. 

In a conventional generator – coal, natural gas, or hydro – you have a turbine that turns steam pressure, chemical energy, or water pressure respectively into rotational energy. The rotating turbine turns a generator, which produces power. The generator rotates as well, but it is the turbine that suffers most of the friction and most of the wear.

So we monitor the turbines for vibrational anomalies, gas turbines we also monitor for heat anomalies. We send a lot of detailed information about these symptoms to the turbine manufacturer, the manufacturer diagnoses the wear and about once a quarter remotes into the turbine management system to adjust the turbine. These adjustments increase runtime between maintenance outages – one way to minimizing the cost of maintaining the turbines.

There is a similar situation for wind farms. There is enormous stress on the bearings and other elements of a wind turbine. These things wear and need adjustment from time to time. So what’s the difference?

The math differs. A large power plant has maybe half a dozen steam or gas or hydro turbines. If the manufacturer remotes in once a quarter for an hour-long adjustment each time, that’s 6 hours of remote access per quarter. Many power plants use unidirectional remote screen view for this – extremely secure attended remote access. An engineer at the plant is on the phone with the turbine support technician, the engineer takes advice, asks questions and moves the mouse on the turbine management system. This cost is acceptable – 6 hours a quarter. The site engineer has the added benefit of supervising and understanding what the vendor technician has done to the site’s 6 very large, very expensive turbines.

The difference is math – a large wind farm has 300 turbines. Each of these smaller turbines wears out roughly as fast as the conventional turbines. Each of these wind turbines needs adjustment, maybe once a quarter as well. That’s roughly 300 hours of remote access sessions per year, adjusting the turbines.

It gets worse. Wind turbine technology is not as mature as 50-year-old conventional turbine technology. In older wind farms, there may be 5-6 vendors involved in supplying different kinds of technology in each turbine, and each of them need to log into each turbine control system roughly once per quarter. That’s 1500-1800 hours of remote access sessions per quarter. Back of the envelope, there are 13 weeks in a quarter and so 13 x 5 x 8 = 520 working hours per quarter, give or take holidays. In these older, larger wind farms, therefore, we’re looking at 3-4 vendor remote access sessions going on simultaneously, to 3-4 different turbines, every working hour of the quarter.

But turbine technology is improving. In modern wind farms, there may be only a couple of vendors, each logging into each turbine roughly once per quarter, to adjust the turbines to minimize wear. That might only be 1 or 2 vendors logged in on average, every working hour of every working day. Either way, attended unidirectional remote access, no matter how amazingly secure, is impractical. The math doesn’t work. 

Renewables are the future of power generation – so we must solve this problem. This math is why Waterfall invented HERA – hardware-enforced remote access – hardware-enforced unattended remote access. Vendors can be logged in constantly, across the Internet, using technology that is much more secure than “secure” software remote access (SRA).

Remote access for renewables is the topic the inventors of HERA will discuss on Waterfall’s next webinar. Join Lior Frenkel, CEO and Co-Founder of Waterfall, with me Andrew Ginter, VP Industrial Security, to look at what’s needed for strong remote access to renewables,and how Waterfall is responding to this need with something brand new – a kind of technology the world has never seen before. We look at how customers showed us what they needed, what we built (HERA), how it works, and how it is dramatically more secure than software remote access / SRA

We invite you to join us. Click here to be part of the hardware-enforced future of OT security in renewable generation.

The post Doing the Math – Remote Access at Wind Farms appeared first on Waterfall Security Solutions.

]]>
How Are OT Hackers Getting IN Today? https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/how-are-ot-hackers-getting-in-today/ Wed, 12 Jul 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/how-are-ot-hackers-getting-in-today/ The post How Are OT Hackers Getting IN Today? appeared first on Waterfall Security Solutions.

]]>

Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes in industries such as energy, manufacturing, transportation, and utilities. OT systems are often used in critical infrastructure and are increasingly connected to the internet, making them potential targets for hackers.

What Is OT Ransomware and Why Should You Care?

In recent years, there has been a sharp increase in cyber attacks targeting OT systems. In our recent 2023 Threat Report, we mapped out 57 cybersecurity incidents that had physical consequences out of 218 reported attacks. These events highlight the vulnerabilities of OT systems, the potential consequences of “successful” attacks, and most importantly, the fact that they are dramatically increasing each year.

OT hackers, also known as industrial control system (ICS) or SCADA (Supervisory Control and Data Acquisition) cyber attackers, typically aim to gain unauthorized access to OT networks and disrupt or manipulate critical processes. Their motivations may vary, including financial gain, espionage, activism, or sabotage.

Here are some general activities OT hackers are busy with these days:

OT hackers typically search for vulnerabilities in ICS and SCADA systems, such as outdated software, weak passwords, or insecure network configurations, as well as using open-source research to find exploits for these vulnerabilities in order to gain unauthorized access.

Finding and Exploiting OT System Vulnerabilities

Here’s an example of Hunting for ICS vulnerabilities by Cody Bernadry:

AI-Generated Malware Targeting OT Hardware

In the past, ICS hackers would require large teams to create the malware payloads that they intended to install once they hacked into the system. Most OT systems are fairly obscure when compared against common technology such as computers and smartphones, so finding hackers that are familiar with each OT system was the biggest obstacle. With the recent advent of AI that can write code, hackers can explain what they need in simple English, and then have the required code generated for them, ready for the attack.

Additionally, AI generated malware is much harder to catch, as it is considered clean when scanned by an IDS or malware detectors, since it is the first time that code is being used anywhere.

Here’s a clip from Cyber News that highlights some examples of using ChatGPT to generate malware, or simply recreating existing malware but with fresh code that can’t be detected as easily:

Social Engineering:

Sometimes, hackers don’t use any software to bypass all the safeguards, rather, they use the weakness of human nature to gain access.

Who would win:

  • The most robust firewall and IDS ever created?
    or…
  • A sweet mom with a crying baby in the background who just needs some help getting back into the system?Have a look:

This crying-baby social engineering hack shown in the video above is largely focused on getting IT credentials and info. The scope of this article is on OT hackers, so it is important to point out that most attacks on OT are initiated via the IT. So, it is totally expected that social engineering techniques focused on penetrating OT defenses would have a kill-chain that runs through the IT department.

Social Engineering Bus Hack:
As machinery and systems become more hardware and less software, does that negate the possibility of it being hacked? This hacker points out how he used knowledge combined with a unique hole puncher and thrown-out stacks of bus transfer tickets to “hack the system” and get free bus rides. Take a look:

 

Supply Chain Cyber Attacks:

Instead of engaging a target directly, hackers sometimes try to target an OT network indirectly by focusing on their supply chain of 3rd party vendors. All it takes is just one of many vendors to miss something to end up providing a “backdoor” to the entire OT network. By compromising the supply chain via 3rd parties, hackers can gain access to the targeted systems indirectly, in ways that are way more cumbersome to audit and prevent.

Here we have some examples of supply chain attacks, including an explanation of Target’s Customer Data Breach which was the result of hackers exploiting the air conditioning ICS because they had only used the free version of the malware software, and not the paid version. Once the HVAC system was hacked, the hackers used that access to install skimming software on each cash register’s credit card reader and recorded the credit card details of all customer transactions.

Have a look:

OT Ransomware: The Ultimate Goal

OT ransomware attacks are where hackers encrypt critical systems, and then demand a ransom (payment) for the decryption key which is needed to unlock everything. The kind of attacks have increasingly targeted OT systems because the “critical” aspects of their purpose are seen as applying pressure for the ransom to be paid.

The BBC did a short piece about a Norwegian company that suffered a costly ransomware attack. Have a look:

It’s important to note that the field of cybersecurity is dynamic, and new attack techniques and methods continuously emerge over time. Organizations that rely on OT systems should keep updated on the latest security best practices.

In conclusion, the activities of OT hackers pose a significant threat to operational technology systems in vital industries. The increasing number of cyber attacks targeting these systems emphasizes the vulnerabilities they face and the potential consequences of successful attacks. OT hackers often employ many other tactics than the ones mentioned above and are able to gain unauthorized access and disrupt critical processes. By understanding the tactics and activities of OT hackers, organizations can better posture their cyber defenses in order to protect their critical infrastructure and ensure the reliability and security of their operations in an increasingly interconnected world.

Real-World OT Ransomware Case Studies

Colonial Pipeline: Lessons from America’s Largest Fuel Disruption

In May 2021, the Colonial Pipeline—which supplies nearly half of the fuel to the U.S. East Coast—was forced to shut down after a ransomware attack compromised its IT systems. While the operational technology (OT) systems controlling fuel flow were not directly encrypted, the company proactively halted operations to prevent the attack from spreading, triggering the largest fuel disruption in U.S. history. Gas shortages rippled across multiple states, panic buying ensued, and the incident highlighted the cascading impact of a cyberattack on critical infrastructure.

The Colonial Pipeline attack exposed several key lessons for industrial organizations. First, IT-OT interdependencies mean that even attacks on corporate networks can halt physical operations if clear segmentation and response plans are lacking. Second, ransomware actors are now targeting critical infrastructure for financial and strategic gain, making proactive security measures essential. Finally, the incident underscores the need for secure remote access, network segmentation, and incident response planning—because when IT is compromised, OT resilience becomes the last line of defense.

Norsk Hydro: Manufacturing Resilience Under Attack

In March 2019, Norsk Hydro, one of the world’s largest aluminum producers, suffered a devastating ransomware attack that spread rapidly through its IT networks. The attack forced the company to halt or switch to manual operations across multiple plants and global facilities, significantly disrupting production. Despite the sudden impact, Norsk Hydro chose not to pay the ransom, instead relying on backups, strong incident response procedures, and transparent communication to recover operations.

The attack on Norsk Hydro highlights the critical importance of operational resilience in industrial environments. Effective segmentation between IT and OT networks, combined with manual fallback procedures, allowed the company to maintain essential functions while restoring its systems. Their response demonstrated that preparation, transparency, and a strong cybersecurity culture are as vital as the technologies themselves. The incident remains a benchmark for how manufacturers can respond to modern cyber threats without capitulating to attackers.

Water Treatment Facility Attacks: Critical Infrastructure at Risk

Cyberattacks on water treatment facilities have become a stark reminder of the vulnerabilities facing critical infrastructure. In 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, attempting to alter chemical levels in the drinking water to dangerous concentrations. Only the quick response of an operator prevented a potentially catastrophic public safety incident. Similar attacks worldwide, often targeting remote access points or outdated industrial control systems, demonstrate how even small facilities can become high-impact targets.

These incidents underscore the urgent need for robust cybersecurity in water and utility operations. Weak or unmonitored remote access, poor network segmentation, and reliance on legacy systems create an open door for attackers. Protecting water treatment infrastructure requires hardware-enforced remote access, continuous monitoring, and layered defenses to ensure that public health and safety are never left to chance.

Regulatory Frameworks and Compliance Requirements

As industrial organizations become increasingly connected, regulatory bodies are raising the bar for cybersecurity. Governments and industry authorities worldwide have issued standards, mandates, and best practices to help critical infrastructure operators strengthen their defenses. Compliance is not only a legal and contractual obligation but also a fundamental step toward reducing risk, protecting operations, and maintaining public trust.

From CISA in the United States to ENISA in Europe and NERC CIP for the energy sector, these frameworks establish the minimum expectations for securing operational technology (OT) environments. Compliance also ensures that your organization can respond effectively to audits, maintain certifications, and demonstrate due diligence in the event of a cyber incident.

Understanding Your Compliance Obligations

The first step toward meeting compliance requirements is knowing which regulations apply to your organization. Obligations may vary depending on your industry, geography, and the type of industrial systems you operate. Key areas often include:

  • Access Control and Authentication – Ensuring that only authorized personnel can access critical OT systems.

  • Network Segmentation and Monitoring – Isolating sensitive OT assets from IT networks and monitoring traffic for anomalies.

  • Incident Response and Reporting – Preparing for and documenting responses to cyber incidents to meet regulatory reporting timelines.

  • Data Privacy and Protection – Safeguarding operational and personal data in line with GDPR, CCPA, or sector-specific laws.

By understanding your compliance landscape and integrating it into your cybersecurity strategy, you reduce risk while avoiding costly penalties and reputational damage.

Implementing Security Controls

Implementing effective security controls is essential for protecting industrial and OT environments against evolving cyber threats. Unlike traditional IT systems, industrial control systems (ICS) and SCADA environments require tailored defenses that prioritize safety, uptime, and reliability. A layered approach—often referred to as defense in depth—ensures that if one control fails, others remain in place to mitigate risk.

Key security controls for industrial networks include:

  • Network Segmentation – Isolate OT networks from IT and external connections to minimize attack surfaces.

  • Strict Access Control – Implement role-based access, multi-factor authentication (MFA), and the principle of least privilege.

  • Continuous Monitoring and Logging – Track network activity, identify anomalies, and enable rapid response to suspicious events.

  • Patch and Vulnerability Management – Regularly update OT systems where feasible and mitigate risks for legacy or unpatchable devices.

  • Secure Remote Access – Replace traditional VPNs and jump hosts with hardware-enforced or unidirectional access solutions.

  • Backup and Recovery Plans – Maintain tested backups to ensure operational resilience in the event of an incident.

By implementing these controls in alignment with regulatory frameworks and industry best practices, organizations can significantly reduce their exposure to attacks while maintaining operational continuity.

Key Takeaways: Protecting Your OT Network from Ransomware

In conclusion, the activities of OT hackers pose a significant threat to operational technology systems in vital industries. The increasing number of cyber attacks targeting these systems emphasizes the vulnerabilities they face and the potential consequences of successful attacks. OT hackers often employ many other tactics than the ones mentioned above and are able to gain unauthorized access and disrupt critical processes. By understanding the tactics and activities of OT hackers, organizations can better posture their cyber defenses in order to protect their critical infrastructure and ensure the reliability and security of their operations in an increasingly interconnected world.

The post How Are OT Hackers Getting IN Today? appeared first on Waterfall Security Solutions.

]]>
The 2023 Threat Report – At a Glance https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/the-2023-threat-report-at-a-glance/ Thu, 15 Jun 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/the-2023-threat-report-at-a-glance/ The post The 2023 Threat Report – At a Glance appeared first on Waterfall Security Solutions.

]]>
The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE. The collaboration reports on credible public disclosures of cyber attacks with physical consequences in discrete manufacturing and process industries world-wide during 2022.

The report also looks at all such cyber attacks since 2010. The report concludes that in the decade 2010-2019, OT cyber threats were a largely theoretical problem. In the current decade however, the problem has become very real and these kinds of attacks are more than doubling annually at exponential growth (see Figure 1). At the current rate, we should expect cyber attacks in 2027 to cause shut-downs or other physical consequences in over 15,000 industrial sites, world-wide.

2023 ot cyber threats blog consequential cyber attacks
Figure 1: Consequential Cyber Attacks

OT Cyber Threats: Major Findings

Ransomware is responsible for most attacks in the report, shutting down physical operations all over the world. These attacks brought about not just physical shutdowns but also financial losses. Some of 2022’s highest-profile incidents include:

  • Outages at well-known car, tire and food & beverage brands and manufacturers,
  • Flight cancellations and delays for tens of thousands of air travellers in four separate attacks,
  • Physical operations impacted in four attacks on metals and mining, with one of the attacks resulting in a fire and material equipment damage,
  • Malfunctions of loading and unloading of cargo containers, fuel, and bulk oil for half a dozen seaports on three continents, and
  • Two of these attacks cited as a significant factor in the bankruptcy of two victim organizations.

The report observes that the most sophisticated ransomware criminal groups are today using attack tools and techniques that were the sole domain of nation-state adversaries less than 5 years ago. The report cites the latest US Administration’s Cybersecurity Strategy report as confirming that nation-state-grade attack tools are now available to purchase by other nation states and criminal actors.

The remaining 10% of attacks in the report were due to hacktivists – “amateur” attackers with a political agenda. All of the year’s hacktivist attacks with physical consequences were associated with two on-going physical conflicts: the Israel / Iran conflict and the Ukraine / Russia conflict.

Good News

The report also highlights defensive developments in the year 2022. The biggest such development was the publication the US Department of Energy’s Cyber-Informed Engineering Strategy. The strategy lays out a plan to gather into one body of knowledge: safety engineering, network engineering and other engineering techniques for mitigating threats to public safety and to physical operations due to cyber threats. These types of techniques are unique to the OT space – these techniques are not represented at all in IT-centric standard such as the NIST Cybersecurity Framework, nor are they represented in even many OT-centric cybersecurity standards such as the widely referenced IEC 62443 standard.

Bottom Line

The joint Waterfall and ICSSTRIVE OT cyber threats report covers year-on-year attack trends to see where we are headed in the global cyber threat environment. To the greatest extent practical, the team behind the report has gathered as much data as available to track the number and frequency of these cyber events – an Appendix to the report for example, contains a complete list of such events in the public record since 2010, with links to public reports of the attacks.

The report also covers important defensive developments, including the CIE, as well as developments in artificial intelligence and global standards and guidelines.


CLICK HERE TO DOWNLOAD THE 2023 THREAT REPORT​

The post The 2023 Threat Report – At a Glance appeared first on Waterfall Security Solutions.

]]>
NIS2 and Its Impact on Operational Technology Cybersecurity https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/nis2-and-its-impact-on-operational-technology-cybersecurity/ Thu, 08 Jun 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/nis2-and-its-impact-on-operational-technology-cybersecurity/ The post NIS2 and Its Impact on Operational Technology Cybersecurity appeared first on Waterfall Security Solutions.

]]>
The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of Internet infrastructures like DNS servers. It does not explicitly mention Operational Technologies (OT) and even categorizes sectors so disparate as energy and banking as equally as critical. NIS2 and its impact can leave OT professionals scratching their heads on how NIS2 affects them.

There is ample information about NIS2 available, and the directive itself can be read here on the European Union’s website. The English version stands at 72 pages, 46 articles, and 3 annexes, and is a great read for those having trouble sleeping. The key takeaway for highly critical OT environments, such as energy, transport, and water management, is that NIS2 establishes a set of rules and minimum requirements to foster EU-wide cooperation and reporting.

Compliance with NIS2 regulations does not guarantee protection against external cyberattacks. The regulations aim to mitigate risks and ensure that operators of essential services and digital service providers take some measures to secure their networks. However, these minimum measures may be inadequate for OT systems, where the impact of a cyberattack could be truly unacceptable.

Beyond the basics, Article 21 of NIS2 states that entities “shall ensure a level of security of network and information systems appropriate to the risks posed.” In this context, we will now examine how NIS2 should be applied to OT systems according to standard focus texts, such as the upcoming Network Security Codes for Electricity in Europe, and what this means for compliance.

NIS2 Basics

After a two-year legislative process, the European Parliament reached a consensus on the updated NIS2 in May 2022. NIS2 replaces the NIS Directive (NISD) enacted in 2016, but the impact on operational technology (OT) security remains unclear. Affected OT sectors include energy, transport, healthcare, drinking water, wastewater, ground installation serving space-based services, and manufacturing (for mid-sized companies and larger).

But why was NISD replaced by NIS2? There are several factors. In my opinion, these are the most important:

  1. Poor cybersecurity investment in the EU: A 2020 study by ENISA found that EU organizations allocate 41% less to information security than their US counterparts, despite having NISD in place for four years.
  2. Lack of clarity in NIS: In the same study, 35% of respondents applying NIS reported unclear expectations, leading to inconsistent application across EU states.
  3. Increase in cyberattacks: Ransomware and other cyberattacks have affected EU infrastructure, with some infrastructures lacking basic protections such as segmentation of the IT/OT interface.
NIS2 and OT cybersecurity NCCS graph
NCCS graph

Articles 21 and 23 are the two primary articles in the NIS2 Directive for OT professionals to act upon. Article 21 addresses the management of cyber risk, while Article 23 pertains to reporting. The NIS2 Directive specifically outlines the penalties for non-compliance with these two articles: The maximum fine is either €10,000,000 or 2% of the entity’s global annual turnover from the previous financial year, whichever amount is greater.

The Meat for Operators: Articles 21 and 23

Understanding how Article 21 will be implemented in OT networks is crucial. Article 21 states that, taking into account the state-of-the-art and relevant European and international standards, organizations must ensure a level of security for network and information systems appropriate to the risks posed. This is further specified in Article 25, which encourages the use of European or international standards.

NIS2 and OT cybersecurity Article 21 and 23
Article 21 and 23

To address the “appropriate” wording in the legislation regarding cybersecurity requirements, asset owners in these industries should prioritize addressing cybersecurity issues present in their OT networks. This need does not apply in many other sectors covered by the NIS Directive, where the primary concern remains the vulnerability of Information Technology (IT) systems. However, upcoming standards and legislation will focus on OT networks, and the wording of NIS2 (which states that protection of assets should match the risks) points in that direction. In this blog, we will explain how the current Network Codes for Cyber Security (NCCS) for electricity illustrate this point.

For mid-sized manufacturing or healthcare sectors, Article 21 will have a significant impact, as cybersecurity standards in these sectors are relatively low and owners and operators in these sectors know that they will be labeled as essential and highly critical. As such affected organizations will need to develop cybersecurity policies to comply with the directive.

Article 23 discusses reporting. Organizations must report any cyber incidents quickly – an early warning must be issued within 24 hours, followed by an incident notification within 72 hours, and a complete incident report within one month.

Additionally, operators should collaborate with established national and EU-wide organizations. EU member states will create national organizations like Computer Security Incident Response Teams (CSIRTs) to supervise the adoption of the directive. These organizations will report to pan-European bodies such as the European Cyber Crisis Liaison Organization Network (EU-CyCLONe).

NCSS: An example of Implementing Article 21 for Operators

For OT operators in critical infrastructure sectors such as energy or transportation, more focused standards and directives should be considered to comply with article 21, such as the upcoming Network Codes on sector-specific rules for cybersecurity aspects of cross border electricity flows (NCCS) or sector-specific standards such as TS-50701 for rail systems. and its likely standard successor IEC63452. NIS2 focuses on reporting, creating agencies, and imposing fines for non-compliance. As consequences become more severe, so should the cybersecurity measures utilized.

The Network Code on Cybersecurity aims to establish a unified European standard for safeguarding cross-border electricity flows’ cybersecurity. This code includes regulations on assessing cyber risks, implementing shared minimum requirements, certifying cybersecurity for products and services, monitoring, reporting, and managing crises.

NIS2 and OT cybersecurity NCCS Rules

The NCCS approach to cybersecurity involves establishing both high-impact and critical-impact perimeters based on the Electricity Cybersecurity Impact Index (ECII). This methodology is likely to categorize systems according to business consequences and reliability/safety consequences.

The minimum cybersecurity controls should be applied to both perimeters, while the critical-impact perimeter should be protected with advanced cybersecurity controls. This requires a strict separation between critical and non-critical impact perimeters, potentially at the IT/OT interface, and utilizing advanced perimeter solutions, including physical segmentation such as unidirectional security gateways. In addition, the minimum and advanced cybersecurity controls and the electricity controls to standards mapping Matrix (ECSMM) will map controls to a selected set of international standards, such as IEC62443. The consequences of cybersecurity attacks must be considered for risk assessment as required by NIS2. These consequences include loss of load, reduction of power generation, loss of capacity in the primary frequency reserve, and loss of capacity for a black start.

Conclusions

NIS2 holds significant implications for OT professionals, especially in critical infrastructure sectors. Although the directive’s emphasis on IT systems might cause some confusion, it is crucial for OT professionals to familiarize themselves with the key articles, create strong cybersecurity policies, and collaborate with relevant government organizations to ensure compliance and reduce risks. As stated in Article 21 of NIS2, risk assessments should be consequence-driven and geared towards more focused cybersecurity standards by sector, such as the Electricity Network Codes, which indicate a strict separation between high-impact and critical-impact areas. This approach is reflected in other recent standards as well, such as TS-50701 for railway networks. Given the emphasis on reporting and consequence-based risk assessments, OT operators in critical sectors like energy, transportation, and water, as well as medium-sized and larger manufacturing companies, should begin strictly segmenting their networks by impact to avoid fines in the event of an incident.

Learn more about how to comply with the recent NIS2 regulation


Get the NIS2 Compliance Guide for OT Systems

The post NIS2 and Its Impact on Operational Technology Cybersecurity appeared first on Waterfall Security Solutions.

]]>
9 Cybersecurity Challenges for Critical Water Infrastructure https://waterfall-security.com/ot-insights-center/water-wastewater/9-cybersecurity-challenges-for-critical-water-infrastructure/ Sun, 28 May 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/9-cybersecurity-challenges-for-critical-water-infrastructure/ The post 9 Cybersecurity Challenges for Critical Water Infrastructure appeared first on Waterfall Security Solutions.

]]>
In recent years, the issue of cybersecurity for vital water infrastructure has become a growing concern worldwide. Water is one of the most critical resources on our planet, and access to clean and safe water is essential for human life. Therefore, protecting water infrastructure from cyber-attacks is of utmost importance. In this article, we will discuss the importance of cybersecurity for vital water infrastructure worldwide, the threats faced by water infrastructure, and measures to prevent cyber-attacks on water infrastructure. Beyond that, we’ll address the challenges that water systems face when it comes to implementing the solutions to guard against cyberthreats.

Importance of Cybersecurity for Vital Water Infrastructure

Water infrastructure plays a crucial role in delivering clean and safe water to people worldwide. This infrastructure includes water treatment plants, distribution systems, dams, and reservoirs. Any disruption to this infrastructure can have severe consequences, including water shortages, public health risks, and even loss of life. Therefore, it is essential to secure water infrastructure from cyberattacks, which can cause grave damage to the system and the societies that depend on it.

Water infrastructure is increasingly connected to the internet, which makes it vulnerable to cyberattacks. Hackers can use malware and other techniques to gain unauthorized access to water infrastructure and disrupt the system’s operation. In recent years, there have been several incidents of cyberattacks on water infrastructure worldwide. For example, in 2021, a hacker had the username and password of a former employee’s Team Viewer account of a water treatment plant in San Francisco and the Bay area. The hacker deleted programs that the water plant used to treat drinking water to try to poison it. A bit later the same year, another hacker attempted to poison the water supply in Oldsmar, Florida.

The Threats Faced by Water Infrastructure

One of the most significant threats for Water Infrastructure are cyberattacks, which can compromise the system’s security and even cause physical damage to the infrastructure. Hackers can use several techniques to gain unauthorized access to water infrastructure, including phishing emails, social engineering, and brute force attacks. Once hackers gain access, they can steal data, disrupt operations, and even cause changes to the water’s chemistry. One of the biggest emerging threats is that once hackers are in, they can then target the OT systems using AI (such as ChatGPT) to generate the obscure code needed for the “payload” which manipulates the system and is the primary goal of the cyberattack. Previously, only hackers with very expensive and large teams could target such systems.

Want to learn how to secure your water facility?

Get our EPA Checklist Critical Water Infrastructure


Get the full checklist

Challenges in Preventing Cyberattacks on Water Infrastructure

Preventing cyber-attacks on water infrastructure requires a multi-pronged approach.

Here are some examples of common IT measures, and why they can’t be applied so easily to industrial OT systems.

1. Conducting Regular Cybersecurity Assessments:

Just like with an office IT department, water infrastructure operators should conduct regular cybersecurity assessments to identify vulnerabilities in the system. These assessments should be conducted by qualified cybersecurity professionals and should include penetration testing, vulnerability scanning, and risk assessments.

The challenge is that such tests are prohibitively expensive, and many assessments require the closing of parts of the water system. Smaller water operators are not able to afford the costs, and larger, citywide water systems (which might be able to afford the costs) have difficulty in finding the right time to shut off everyone’s water in the name of “preventative measures.”

2. Implementing Access Controls:

Just like an IT Dept, water infrastructure operators should in theory implement access controls to limit access to critical systems and data. Access should only be granted to authorized personnel who have undergone background checks and have a legitimate reason to access the system.

The challenge is that providing remote access to OT systems also generates more backdoors for hackers to exploit. The most secure solution for water operators would be to completely airgap their industrial systems from all remote access, which would however create many other issues.

3. Train Employees and Teach Them About Cybersecurity:

Most office-based businesses are eager to train their employees so that they understand the best practices for password management, phishing awareness, and social engineering. This might be a feasible step for large water systems and the big players in the field that have the budgets. But many smaller operations for water systems simply do not have the resources to make this a reality.

4. Encryption:

Most IT departments have encrypted most of the flow of information. The goal is to stop outsiders from easily viewing or accessing sensitive data in transit or at rest. This includes data stored in databases, transmitted over networks, and stored on portable devices. Water infrastructure operators cannot use encryption for many of their OT systems, as they are very unique systems that don’t easily integrate with standard encryption protocols.  Furthermore, the main concern with industrial systems is not that someone will exfiltrate sensitive data, but that they’ll inject something malicious into the system. Encryption doesn’t help much in that regard.

5. Deploying Firewalls:

Hard to imagine that there are any IT departments that have not deployed firewalls to protect their systems from unauthorized access and malicious traffic. While firewalls are great for controlling what information flows in and out of a water facility, they can be bypassed by a talented hacker and therefore do not offer hermetic solutions when it comes to guaranteeing an uninterrupted supply of water. In addition to a classic firewall setup, water infrastructure should also integrate an unbreachable unidirectional gateway in order to be 100% certain that their OT systems can’t ever be breached remotely. This includes segregating the networks so that OT and IT are separated in order to isolate critical systems from the rest of the network. This segregation limits the impact of a cyberattack and prevents attackers from moving laterally within the network, especially lateral movements from the IT environment to the OT environment.

6. Install and update Anti-virus

Installing anti-virus is one of the most basic cybersecurity tasks that IT regularly carries out with ease. But when it comes to industrial control systems, it is much harder. Common antivirus software can’t really be installed on PLCs. And to make matters worse, the anti-virus certificate signatures need to be updated daily, or sometimes twice-a-day. And the anti-virus software itself needs to be updated regularly too. All this updating amounts to a “constant and aggressive change” which makes it very difficult to manage an OT network.

The idea with cybersecurity is that we are supposed to control change to reduce risk to operations. Anti-virus software updates are mistaken sometimes and flawed signature updates risk quarantining parts of the industrial automation. So, while OT systems certainly could use an anti-virus suite, it’s very hard to actually install it on industrial controls.

7. Installing Patches and Update Software:

Any IT worker will stress how important it is to update software regularly, especially when that update contains a security patch. This helps prevent known vulnerabilities from being exploited by attackers. But updating and patching is not as simple when it comes to industrial OT. While in theory it makes sense to apply this logic to industrial control systems, the reality is not so simple. Patches and updates introduce too many frequent changes for an OT system and the cure is as bad as the disease here. Any solution that risks “The Blue Screen of Death” on industrial control systems is not a realistic solution.

8. Develop backups and a Cybersecurity Incident Response Plan:

IT departments will often have an incident response plan in place so that if there is a cyberattack, they can revert everything to how it was before the incident, with frequent backups that can restore everything other than the last few hours/days of work that was done since the latest backup.

Water infrastructure systems are not that simple to backup, and there is a risk that the backup will also restore the malicious code which led to the cyberattack. To realistically restore an OT system, original floppy discs need to be on-hand near the site so that everything can be reset to its original settings. And the best way for a water facility to weather an incident is to have the workforce and the capability to switch to fully manual mode, as the priority will always be to keep the clean water flowing to homes and businesses.

9. Using Multi-factor Authentication

IT departments frequently use multi-factor authentication to secure their systems. Multi-factor authentication requires users to provide two or more forms of authentication, such as a password and a fingerprint scan. While this detail seems trivial and overly simple, it is one of the best ways to block some of the most prevalent hacking methods.

However, when it comes to OT, any kind of remote access is just way too dangerous, as hackers can persist until they get through. The best solution for an industrial system is to be fully air gapped for smaller systems, or to use a unidirectional gateway for larger systems.

So in conclusion – it’s hard, and it doesn’t give us as much protection as we’d like. Threat environments are deteriorating rapidly – and cyber attacks with physical consequences for critical infrastructure and manufacturing facilities are more than doubling annually. New regulations are dropping on us as government authorities have become aware of this situation. In another few years, after another few doublings of attacks, we should expect even more stringent regulations coming down the pipe. In the posts & webinars ahead we will be looking at how to get ahead of these issues by deploying simple, affordable protections today that will stand the test of time. Stay tuned!

Want to learn how to secure your water facility?

Get our EPA Checklist Critical Water Infrastructure


Get the full checklist

The post 9 Cybersecurity Challenges for Critical Water Infrastructure appeared first on Waterfall Security Solutions.

]]>
Water Utility Hacking 101 https://waterfall-security.com/ot-insights-center/water-wastewater/water-utility-hacking-101/ Mon, 22 May 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/water-utility-hacking-101/ The post Water Utility Hacking 101 appeared first on Waterfall Security Solutions.

]]>
Water is life! Water is probably the most important resource for maintaining society and order. It’s easy to take for granted and often dismissed as an easily attainable resource. But when push comes to shove, just a few short days without running water would start to have a profound negative effect on society and economies.

Securing water supplies is important, both practically and symbolically.

Here are some important aspects to consider when securing a water providing utility:

What are the cyber-risks for a Water Utility? 

The idea that hackers will somehow hack into a water utility and poison the water supply is for Hollywood movies. In reality, there are too many physical constraints that make such a hacking goal impossible, including the fact that workers manually check the water before it is released for tap use.

If a hacker did try and poison the water supply, they’d probably just cause a large batch of water that needs to be dumped or diluted.

Want to learn how to secure your water facility?

Get our EPA Checklist Critical Water Infrastructure


Get the full checklist

So, what is the REAL risk to a Water Utility?

There are many more risks that are much more dangerous than poisoning the water supply. Most ongoing operations in Water Utilities consist of orchestrated and automated systems, without a realistic option of switching to full manual operation.

If an attacker comes along and simply disrupts the industrial process in any way, it creates a huge mess! It costs lots of money to keep everyone working overtime to fix everything, and then there is still the issue that they have to do something with all the water. Hackers might also compromise physical systems in a way that can break pipes and pumps, which can cost a fortune to fix.

Many of these kinds of attacks are NOT THAT technically complex, but can cause huge physical damage as a consequence.

The 2 Stages of an ICS cyber-attack:

Stage 1 is when the hacker passes the cybersecurity defenses, either physically, socially engineered, or any way of getting past the firewall.  This 1st stage of the attack includes finding vulnerabilities and exploiting them and would most likely resemble a run-of-the-mill cyberattack on an IT department. Once the hacker is able to get past this part, they’d use that access to then progress into the OT system.

Stage 2 is the actual cyber-attack that the hacker carries out in the Industrial OT environment, often called “The Payload”. So far, 99% of cyberattacks on Water Utilities are usually attempts to encrypt systems for a ransom, or to exfiltrate sensitive data. Only rarely do the attacks introduce malware into the utility’s systems because industrial control systems are very unique, and the hacker(s) would have to be very familiar with each specific system to write a malware script that would work.

So the big new risk in the near future, is that hackers could use an AI (like ChatGPT) to help them write a malware script that the hacker would then inject into a water management facility’s OT, which can then break pumps, rupture pipes, or cause other physical damage that is costly, and will disrupt the water supply for days, weeks, or even months.

Water is a critical infrastructure for other critical infrastructure, such as hospitals and factories. Hackers might target a drinking water plant, with the goal of disabling another target which is using that water, not the water plant themselves -which constitutes a supply-chain attack.

Even though these new AI-driven capabilities seem to be focused on Stage 2, it greatly incentivizes more Stage 1 efforts as hackers will now have what to do once “they’re in”.

Historically, many water infrastructure facilities found comfort over the years in the fact that while their system might get hacked, the hackers would have nothing to do once inside their system, as the obscurity of their system made delivering a custom payload nearly impossible without a large team in place. That comfort is now longer afforded to water facilities.

Want to learn how to secure your water facility?

Get our EPA Checklist Critical Water Infrastructure


Get the full checklist

The post Water Utility Hacking 101 appeared first on Waterfall Security Solutions.

]]>
Segmentation 202: Unidirectional Architectures https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/segmentation-202-unidirectional-architectures/ Sat, 13 May 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/segmentation-202-unidirectional-architectures/ The post Segmentation 202: Unidirectional Architectures appeared first on Waterfall Security Solutions.

]]>
This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are network segmentation solutions that feature at least one Unidirectional Gateway. These architectures may also incorporate other elements such as an additional Unidirectional Gateway, a reversible feature in the unidirectional gateway, or a temporary bypass. A key to unidirectional architectures, in addition to the protection offered by the unidirectional hardware, lies in the software element, which replicates data and data sources unidirectionally.

Despite their growing significance in protecting industrial automation systems, unidirectional architectures are often not well understood, particularly by professionals with IT-centric backgrounds. Unidirectional architectures represent a true revolution in OT network cybersecurity.

Today, we not only have one-way perimeter solutions, but we also have one-way architectures – the adoption of which is undoubtedly increasing. This is especially true with the introduction of strict physical segmentation requirements in pipelines and rail systems, the rise of ransomware attacks, and the emergence of the industrial cloud. I see opportunities for this class of architecture even in many IT-centric verticals, such as banks and financial institutions.

In this article, I will strive to provide a clear explanation of unidirectional architectures and why they are becoming increasingly important in industrial systems.

Traffic flow in OT networks

Before diving into the specifics of unidirectional architectures, we must first understand the basic principles of data flows in industrial systems. In these systems, data is generated and collected by various devices and sensors. It is then processed, analyzed, and potentially sent back to control the industrial processes, modifying interactions with the physical world.

Note: Unidirectional Gateways are generally not deployed within the industrial network – bi-directional traffic between control system HMIs and PLCs are not amenable to this class of protection. The gateways are deployed almost exclusively at connections between industrial networks and external networks such as enterprise networks or the Internet.

As discussed in my previous articles, most OT networks, when connecting with enterprise IT networks, exhibit asymmetric traffic: A significant amount of data is sent outbound for use in the enterprise network or beyond, and some data may be sent back into the industrial network from external sources. In most cases, we can exploit these asymmetric data flows to our advantage, replacing one or more firewalls with unidirectional architectures. Going forward, when I refer to outbound traffic, I am referring to traffic flowing from an OT network, whose worst-case consequences of compromise are unacceptable physical consequences, to an IT network, whose worst-case consequences are lawsuits or other business losses for which we can more easily buy insurance. Inbound traffic refers to data sent in the reverse direction.

In IT architectures, where there is no such clear division, the primary objective is to transfer and process data. Due to this, network segmentation in IT networks historically focuses on preventing applications and specific network addresses from traversing between networks using firewalls. Firewalls have evolved over the years, but the core concept remains the same – filtering packets using software.

Figure (1): Inbound and Outbound at the IT-OT interface
Figure 1: Inbound and Outbound at the IT-OT interface

Inbound and Outbound traffic: Role in security

Inbound data sent to OT networks is responsible for directing and controlling the behavior of various elements in the system. This includes tasks such as firmware updates, communicating new production orders and quality requirements to the production system, and so on. Outbound data, on the other hand, typically consists of quality readings, raw materials and finished goods inventory levels, equipment usage readings and other information sent from the various sensors and devices in the system, as well as from databases and historians. This data is used to monitor the status of the system, detect and diagnose problems, and so on.

The security objectives for these two traffic patterns differ, particularly regarding the criticality of inbound information. Compromising the integrity of outbound data, for example, such as altering quality readings, has business consequences, such as delaying and resampling of a batch of product that is reported as sub-standard. Such compromise generally impacts the business less than tampering with inbound data, such as data determining what the quality requirements for the product are, which might lead to a large batch of unsaleable product actually being produced.

To enhance security and reduce the opportunity for cyber attacks causing serious consequences, our objective should be to decouple inbound and outbound data flows. Unidirectional technologies very naturally and unavoidably separate inbound and outbound traffic. This task is typically performed at the IT-OT interface but could be implemented in other locations within the network.

However, this separation can be challenging, since current applications often use the same protocol and applications to both transmit and receive information on the same connection. This is due to OT networks employing IT products and protocols. For instance, the TCP/IP protocol is the workhorse of modern networking and almost all application layer protocols that use TCP/IP are query/response. Clients send queries into servers that are data sources requesting specific data, and the servers reply on the same connection. This creates a potential attack vector, as the queries could be altered in an attack to manipulate the industrial server, and through the server the rest of the industrial control system. By re-engineering the networks and utilizing replication, this issue can be resolved in almost all cases. Let’s examine the following figure:

Unidirectional Architectures Replacing Firewalls Figure 2: Pure Unidirectional Architecture
Figure 2: Pure Unidirectional Architecture

In the figure, the Unidirectional Gateway is a client of an industrial data source, such as a historian server. The gateway sends queries to the server asking for all new or changed data. On the enterprise network, the gateway logs into the enterprise historian server and inserts the data into that server. Any enterprise users or software applications that need the industrial data can now query the enterprise historian. All of the data that is permitted to be shared with the enterprise is available in the enterprise historian. No queries need be sent back into the industrial network through the gateway any more.

Unidirectional architectures are widely understood as “permitting information to flow in only one direction.” However, this example is just one use case – the most common use case – where we completely cancel inbound traffic. In the following sections, we will explore this and other architectures currently in use.

Unidirectional Architectures

There are five unidirectional architectures in widespread use today:

Pure Unidirectional: Information is replicated in one direction only. Only outbound traffic is allowed, and inbound traffic is physically blocked. This is what most people think of when they hear “unidirectional gateway,” and it is a common implementation for many OT use cases.

Typical use cases include monitoring production levels and equipment usage in refining and power generation. Unidirectional gateways for these use cases are often deployed at the OT-IT interface, where it is easier to differentiate between inbound and outbound traffic. These use cases may include unidirectional Remote Screen View connections, that enable remote support for vendors.

Time-based Unidirectional: Information is replicated outbound-only most of the time, but periodically the unidirectional device reverses orientation. Information and servers can be replicated outbound, or inbound, but never both simultaneously (the direction “flips”). In other words, outbound traffic is active for a certain percentage of the time, while inbound traffic is active for a different percentage.

A typical use case involves sending patches and production orders to the control system on a weekly basis. This is allowed only at specific times and solely in a unidirectional manner by transferring files from IT to OT. After the updates are transferred, the device physically reverses data flow direction again

Unidirectional Architectures Replacing Firewalls Figure 3 - Time-based Unidirectional
Figure 3: Time-based Unidirectional

Time-based Unidirectional and Bidirectional: Information is continuously replicated unidirectionally outbound, but occasional bidirectional exchanges can be enabled at specific times or on demand. In this implementation, a temporary bidirectional data paths exists in parallel with the Unidirectional Gateway, usually terminating in a jump host.

A typical use case involves remote intervention by a vendor according to Service Level Agreements (SLAs). The vendor may require bi-directional remote connectivity for a short period of time. To enable that connectivity, personnel at the site turn a physical key to activate the bi-directional bypass unit for a pre-programmed period of time.

Unidirectional Architectures Replacing Firewalls Figure 4 - Time-based unidirectional and bidirectional
Figure 4: Time-based unidirectional and bidirectional
  • Two Unidirectional Gateways: This approach decouples inbound and outbound traffic using two unidirectional gateways. Information and servers are replicated unidirectionally in both directions. It is important to note that this is different from having bidirectional traffic because the traffic does not generate a loop – application queries do not pass through one device with responses returning on the other – such a design would be no stronger than a firewall. The inbound and outbound Unidirectional Gateways each replicate servers – often different kinds of servers, in each direction.

A typical use case involves load balancing in power generation, where two separate Transmission System Operators (TSOs) want to exchange information about load while minimizing the risk of cascading a cyberattack across networks.

Figure 5 - Two Unidirectional Gateways
Figure 5: Two Unidirectional Gateways
  • Unidirectional ”Shortcut”: In this design, information from deep in a defense-in-depth industrial network must reach an external consumer, and it is impractical to send that information through normal layers of communications to the external consumer.

Use Cases: Industrial mirror ports may need to be replicated to IT-resident OT intrusion detection sensors. Mirror ports typically produce a lot of information and it may not be practical to send that volume of information from many mirror ports deep in an industrial network out through layers of networks to the IT network where the OT IDS sensors are.  A second case – sending substation sensor information directly to the cloud without passing through the control center. This use case is currently being evaluated by the IEC committees overseeing the IEC62443 standard for transmitting data from Layer 2 to the cloud. The control center may still feature a firewall, but it is now less burdened, as most of the heavy data traffic is handled through the unidirectional gateway.

Unidirectional Architectures Replacing Firewalls Figure 6 - Unidirectional Shortcut
Figure 6: Unidirectional Shortcut

Conclusion

Unidirectional architectures offer significant benefits for the segmentation of OT networks and industrial systems, particularly in terms of security and reduced complexity. By replacing firewalls with unidirectional architectures, organizations can better protect their critical infrastructure from cyber threats. The various unidirectional architectures discussed, such as Pure Unidirectional, Time-based Unidirectional, Time-based unidirectional and bidirectional, two Unidirectional Gateways, and Unidirectional Shortcuts, provide different levels of security and flexibility based on specific use cases and requirements. These architectures allow for better isolation and control of data flows, which ultimately leads to improved security and reduced risk of cyberattacks in OT networks.

Moreover, unidirectional architectures can also help reduce the workload in higher-level networks in a defense-in-depth architecture, allowing them to focus on processing critical and time-sensitive traffic. This not only enhances the overall performance of the network but also simplifies network management by minimizing the number of data flows that must be supported through each network. As industrial systems continue to evolve and face increasingly sophisticated cyber threats, adopting unidirectional architectures will play a crucial role in maintaining the security and resilience of critical infrastructure.

For more details, see Waterfall’s guide: Unidirectional Gateways vs. Firewalls.

The post Segmentation 202: Unidirectional Architectures appeared first on Waterfall Security Solutions.

]]>