critical infrastructure – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 09 Sep 2025 06:59:41 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png critical infrastructure – Waterfall Security Solutions https://waterfall-security.com 32 32 Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it https://waterfall-security.com/ot-insights-center/ot-security-standards/webinar-evolving-global-ot-cyber-guidelines-recent-developments-and-what-is-driving-it/ Wed, 06 Nov 2024 08:20:41 +0000 https://waterfall-security.com/?p=28112 Watch the webinar for a look into the recent evolution of OT security standards

The post Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it appeared first on Waterfall Security Solutions.

]]>

Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it

Watch the webinar for a look into the recent evolution of OT security standards.

Watch the webinar for a look into the recent evolution of OT security standards. There are some common themes in the OT cyber security guidance published in recent years around the world. Governments and standards bodies are feeling the pressure to increase the level of protective measures and methodologies when it comes to highly consequential systems and infrastructure.

In this webinar, Andrew Ginter takes us through:

arrow red right Who are the countries and standards bodies leading the way?

arrow red right How Engineering and Security principles are influencing the approach to OT cyber?

arrow red right What are consequence boundaries and how do they inform an OT security strategy?

arrow red right Our prediction on the future of OT cyber best practices.

Meet Your Expert Guide:

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it appeared first on Waterfall Security Solutions.

]]>
How Likely Is That To Kill Anyone? https://waterfall-security.com/ot-insights-center/ot-security-standards/how-likely-is-that-to-kill-anyone/ Thu, 26 Sep 2024 11:40:51 +0000 https://waterfall-security.com/?p=27637 IT teams newly responsible for OT security are often appalled with the results of an initial vulnerability assessment. “Patch everything! Patch it now!” is often the directive issued to engineering teams. The correct response to such a directive is “How likely is that to kill anyone?” Engineering teams cannot proceed with any change to a system until they have a clear understanding of the answer. And the answer is almost never “zero likelihood.”

The post How Likely Is That To Kill Anyone? appeared first on Waterfall Security Solutions.

]]>

How Likely Is That To Kill Anyone?

IT teams newly responsible for OT security are often appalled with the results of an initial vulnerability assessment. “Patch everything! Patch it now!” is often the directive issued to engineering teams. The correct response to such a directive is “How likely is that to kill anyone?” Engineering teams cannot proceed with any change to a system until they have a clear understanding of the answer. And the answer is almost never “zero likelihood.”
Picture of Andrew Ginter

Andrew Ginter

OT Security blog post about how likely a security flaw might end up unaliving someone

Patching or applying security updates to some industrial networks is very hard. Why? Consider a typical refinery. The entire site goes down once every three years for a retrofit where every piece of physical equipment, large and small is inspected. What is worn out is replaced, and what is old may be upgraded. Necessary new systems and upgrades are installed. Control system computers and devices are similarly examined and replaced or upgraded. The entire process incurs enormous change. Engineering teams plan for, study, prototype, analyze and test every change for safety and reliability, sometimes for up to six years prior to the three-year outages. There are frequently two engineering upgrade teams working in parallel, staggering their results into three-year production outages, because there is that much work and analysis involved in these outages.

Every Change Is a Risk

But when everything is re-assembled, do we simply turn everything back on? Well no. Despite up to six years of analysis, we may have missed something. Every change is a risk, and we’ve changed everything. So, what do we do? Typically, all vacations are cancelled. All vendor representatives and services contractors are summoned to the site. Everyone starts putting in 12-hour days, and the plant is started and is brought up to 5% of capacity. Every technician, vendor and engineer is walking around the site, looking at things, listening to them, feeling them if it’s safe to touch them, and sometimes even sniffing at them. The plant operators, their supervisors and the engineers are clicking through the HMI screens, looking at every bit of each screen to see if both the plant and the screens are working as expected. The cyber people are looking at memory usage, network communications, and logs.

Nobody and nothing is perfect. We find problems, and we fix them. We bring the plant up to 25% of capacity. To 50%. And eventually to 100% of capacity. It’s been two weeks. Everyone is exhausted. Most of us haven’t seen our families in all that time, and still, we look for problems. We find fewer and fewer new problems. Each problem is triaged. Low-priority problems are documented and handed off to the team preparing for the next outage, three years from now. We start to stand down. At three weeks, the plant is at full capacity, the vendors have all gone home and we are back to a normal staff. Success!

“Every technician, vendor and engineer is walking around the site, looking at things, listening to them, feeling them if it’s safe to touch them, and sometimes even sniffing at them. “

Patching the System

But wait – on the Tuesday following, Microsoft issues a Windows security update with 17 fixes in it. Do we apply that update? If we do, will we introduce new problems that impact safe operations? Will we introduce a problem that trips the plant? How can we know? We do not have the source code for the changes, and even if we did, we most likely cannot find people who can analyze that much code with the degree of engineering confidence that we need. If we cannot analyze the code, must we shut down again, apply the patches, bring everyone back and start the commissioning process all over again?

Many industrial sites delay security updates. They delay installing updates until they are confident that the update will not impair operations unacceptably. Sometimes it takes months of testing on a test bed to prove that the update is safe. Sometimes the patch is simply delayed until the next outage in three years.

Engineering Change Control vs. Constant, Aggressive Change

Every change is a risk and engineering change control (ECC) is the discipline that engineering teams use to control that risk. Equipment that a vendor has certified for safety at a cost of up to a half million dollars cannot be used with security updates until the vendor re-certifies the equipment using the changed operating system. Other equipment is not updated until the engineering team is satisfied with the risk, and even then, the teams tend to apply the update to the least vital equipment first to see if the patch causes problems. Then they apply it to the machines that serve as backups for vital redundant equipment. Then they switch over to the updated backups. If there are any problems, they switch back to the unpatched primaries, and so on.

This is in sharp contrast with some aspects of enterprise cybersecurity programs that in some domains apply constant, aggressive change to stay ahead of the adversary: the latest security updates, as quickly as practical, the latest anti-virus signatures, and the latest software versions and keys and cryptosystems. These “constant change” practices fly in the face of the ECC discipline. There is simply no way to keep industrial equipment patched as aggressively as we patch enterprise networks. One consequence of this limitation is that most industrial equipment is vulnerable to known exploits for much longer periods of time than is typical of enterprise equipment.

Not All Systems Are Special

While ECC is misunderstood by many IT practitioners, ECC is misapplied by many engineers. Some patches – for example to remote access systems – may be very unlikely to impair safety, or even to impair reliability. Remote access is a convenience at most sites, not an essential element of safe or reliable operations. Worse, remote access systems tend to be among the systems at a site that are the most thoroughly exposed to external cyber attacks. These are the very systems that need to be patched the most aggressively – the IT approach of constant, aggressive change is precisely what we need for these systems.

In short, a truism of OT security is that (a) most IT teams need to learn that many OT systems are special, and (b) most engineering teams need to learn that not all of their systems are special. Yes, we need ECC to manage our most consequential systems, but we need the IT discipline to manage the most exposed systems. And if we discover in our design that any of our most consequential systems are also our most exposed systems, well then we have a very bad design, and we urgently need to change the design.

To dig deeper, click here to request a copy of this author’s latest book, Engineering-Grade OT Security: A manager’s guide.

Want to learn more about Waterfall’s hardware-enforced OT security?
Talk to an expert>>

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post How Likely Is That To Kill Anyone? appeared first on Waterfall Security Solutions.

]]>
Protecting Water Utilities and Wastewater Treatment Plants https://waterfall-security.com/ot-insights-center/water-wastewater/cybersecurity-for-water-utilities/ Wed, 22 May 2024 11:47:41 +0000 https://waterfall-security.com/?p=23129 Water systems cybersecurity expert Mariano Martin Tirado of Acciona shares with Waterfall his insights about protecting Water Utilities and Wastewater treatment plants.​

The post Protecting Water Utilities and Wastewater Treatment Plants appeared first on Waterfall Security Solutions.

]]>

Protecting Water Utilities and Wastewater Treatment Plants

Picture of Mariano Martin Tirado

Mariano Martin Tirado

Tech Leader at Accianoa S. A.

Cybersecurity for Water Utilities Mariano Martin Tirado


The first problem with securing water facilities is that many were built over 20 years ago. None of the common security protocols are in place. No firewalls, no passwords, nothing to prevent cyberattacks. And the reason for this problem is because such capabilities and threats didn’t exist when the water facility was first installed decades ago. So that is the first issue that needs to often be dealt with.

Water utility clients are naturally very concerned about cybersecurity attacks because you only have to watch the news to see the threats cyberattacks pose to water facilities around the world. Nowadays, cyberattacks that try to target these types of facilities do so because of their strategic/critical importance. The attacker’s motivation isn’t for money usually, but rather for clout and bragging rights. There is also a common concern that unfriendly governments will target such facilities as a strategic threat, as well as the common threat of ransomware.

“The first problem with securing water facilities is that many were built over 20 years ago.”

Cyber Threats of Water Utilities

When someone attempts to maliciously access water facilities, there are two main types of motivations. One of them is to SHUTDOWN the facility with the goal of making it not possible to start up again. In water starved areas, this can be a very big problem. The second possible motivation is that someone may try to change the mixing and chemical makeup of the water such as adding too much chlorine, lye, or any other chemicals which can cause a problem to the health of those bathing or drinking the water.

The control systems that run these water systems have many alarms and warnings to make sure the chemicals are within the approved parameters, but if someone takes control of the control systems, they would be able to deactivate these alarms. Manually tested samples are taken from the water too, but usually this is done once a day -not constantly like the automated censors. It could be that the tainted water has already entered the main supply by the time it gets manually tested.

Risks for Wastewater Treatment Plants

Attacks on the wastewater systems are also a big concern. Imagine a big city with the entire wastewater and sewage system not running. It would become a very unpleasant problem very quickly. The motivations and risks from an attack on wastewater systems are similar to an attack on regular water utilities. Concerns are also similar, with the risk of someone breaking or shutting down the wastewater systems, or someone messing with the controls so that sewage is not treated properly, also impacting the health of the people when it is released into the environment.

Water and wastewater are physically separated so that a hacker can’t mix the two, but the wastewater that can’t be treated because of a cyberattack needs to be released by the bypass which then damages the rivers and streams that it is released into.

IT and OT in Water Utilities

The billing of the water facilities is part of the IT system and is kept fully separated from the OT network that ensures the water supply. It is impossible to jump from IT to OT and OT to IT when the systems are properly isolated.

Part of a Supply Chain Attack

There is also a concern of a supply chain attack of someone attacking the electrical systems powering the water utility. With wastewater it is important to not require external power to run. It is very common that solar and clean energy supply part of the energy needs, as well as burning methane that comes off the wastewater. Wastewater treatment plants do use external power, but they don’t rely on it. The newest plants use renewable energy but have a connection to external power just as backup resource. When it comes to water utilities, it isn’t possible to have fully internal power resources. Desalination plants use lots of power that always require external power resources, as well as normal water suppliers that use pumps to move massive water volumes around, which doesn’t apply to wastewater. So supply chain attacks are a threat to Water utilities, but not as much of a threat to wastewater treatment plants.

Keeping Water Infrastructure Secured

The ever-evolving threat landscape requires a proactive approach to securing our water infrastructures. While the age of many facilities presents a challenge, it’s not insurmountable. Upgrading outdated systems with modern security protocols is certainly a step in the right direction, and implementing network segmentation can further secure critical operational technology (OT) networks from the internet and its threats.

About the author
Picture of Mariano Martín Tirado

Mariano Martín Tirado

Mariano is an advanced IT and OT expert with years of experience in Electrical engineering, communication networks, customised software and hardware solutions, and the application of new technology in the industrial sector. He is the technical leader responsible for the digitalization, technology and circular economy department at Acciona for water and wastewater treatment. He is passionate about using his expertise to drive innovation and to make a difference in the future of our planet. He holds degrees in both computer engineering from the college Innovation Luis Vives and in political science from the Complutense University of Madrid.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Protecting Water Utilities and Wastewater Treatment Plants appeared first on Waterfall Security Solutions.

]]>
Cybersecurity For Data Centers https://waterfall-security.com/ot-insights-center/facilities/cybersecurity-for-data-centers/ Thu, 08 Sep 2022 07:08:00 +0000 https://waterfall-security.com/?p=10043 Enabling security monitoring and management of multiple segmented operational networks without adding any cyber risk.

The post Cybersecurity For Data Centers appeared first on Waterfall Security Solutions.

]]>

Cybersecurity For Data Centers

Protecting data center operational networks from evolving cyber threats
Cybersecurity For Data Centers
Data Center Security Solutions

Data center security solutions protect physical and digital assets by combining access control, video surveillance, fire suppression, encryption, and network monitoring. These solutions prevent unauthorized access, detect intrusions, and ensure compliance with regulatory standards like ISO/IEC 27001 and SOC 2.

Customer/ Partner:

A large, multi-site data center corporation in Asia Pacific.

Customer Requirement:

Enable security monitoring and management of multiple segmented operational networks without putting these protected networks at risk.

Waterfall’s Unidirectional Solution:

The Waterfall Unidirectional Security Gateway enables the safe monitoring and remote management of operational networks without risk that enterprise connectivity will “leak” attacks back into protected operational control networks.

Data Centers Growing Need To Protect Physical Operations

Enable safe access to OT files, OPCUA data, Syslog alerts, and OT emailed updates for external IT services. Enable the access for an off-site Security Operations Center which the data for security monitoring purposes, and for other IT systems, which use the operations data for a variety of business automation purposes. Enable all of these integrations safely, without risk to physical operations at the data center.

The Challenge icon
The challenge

Waterfall’s Unidirectional Security Gateways were deployed to protect building automation, access control and electrical systems at a fleet of data centers. Each gateway protects multiple data center operational networks and replicates OPC UA, Syslog and other data through unidirectional hardware. In addition, Waterfall’s Remote Screen View enables off-site management and updates of OT systems without enabling risky remote desktop connections.

Waterfall solution - icon
Waterfall solution

Waterfall’s Unidirectional Security Gateways were deployed to protect building automation, access control and electrical systems at a fleet of data centers. Each gateway protects multiple data center operational networks and replicates OPC UA, Syslog and other data through unidirectional hardware. In addition, Waterfall’s Remote Screen View enables off-site management and updates of OT systems without enabling risky remote desktop connections.

Results and benefits - icon
Results & benefits

Security: No attack from any external, third-party or Internet network can leak back into protected operational networks through the unidirectional gateway hardware.

Simplicity: Unidirectional server replication and emulation make Waterfall’s gateways easy to use. The unidirectional replicas are normal participants in external IT networks.

Efficiencies: By securely enabling access to OT data, the gateways help the business realize SOC-based visibility into OT networks and other business automation and efficiencies – safely.

vertical red line
Theory of Operation
Click to enlarge

Waterfall Unidirectional Security Gateway solutions replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from attacks emanating from external less-trusted networks. Waterfall Gateways contain both hardware and software components. The gateway hardware can transmit information from an industrial network to an external network, but is physically incapable of propagating any virus, DOS attack, human error or any cyber attack at all back into the protected industrial network. Unidirectional Gateway software makes copies of industrial servers, enabling external IT and Internet users to connect the replica servers for access to real-time operational information. At this customer, the Unidirectional Security Gateway copies standard OPC-UA servers, Syslog servers, SMTP servers and file servers from operational networks to the IT network where SOC systems and analysts, as well as other IT business automation systems can access the replicas and their OT data normally. The gateway is also equipped with unidirectional Remote Screen View to enable remote vendor support personnel to see the screen of the Engineering Workstation in order to assist site personnel in diagnosing, adjusting and correcting software and hardware problems.

vertical red line
Unidirectional Security Gateway Benefits:

arrow red rightSafe IT/OT integration, providing access to operations data, without risk of compromise of critical data center operations networks.

arrow red rightSafe unidirectional data transfer to offsite or less trusted networks without introducing cyber threats to the OT environment.

arrow red rightSupports 100+ industrial protocols & applications; from legacy systems to cloud-based platforms.

arrow red rightNo attack, no matter how sophisticated or malicious, can enter the unidirectionally protected network.

arrow red rightEnables secure deployment of IT and outsourced SIEM, SOC, NOC & security monitoring solutions.

vertical red line
Global Cybersecurity Standards Recommend Unidirectional Security Gateways

Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites around the world. The level of protection provided by Waterfall’s Unidirectional Security Gateway technology is recognized as best practice by leading industry standards bodies and authorities such as NIST, ANSSI, NERC CIP, ISA / IEC 62443, the US DHS & CISA, ENISA, TS50701 and many others.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Cybersecurity For Data Centers appeared first on Waterfall Security Solutions.

]]>