Industrial control systems – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Mon, 21 Jul 2025 18:20:03 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Industrial control systems – Waterfall Security Solutions https://waterfall-security.com 32 32 Andrew Ginter’s Top 3 Webinars of 2024 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/andrew-ginters-top-3-webinars-of-2024/ Tue, 17 Dec 2024 11:38:14 +0000 https://waterfall-security.com/?p=29379 Get up to speed on key trends and strategies in industrial security with Andrew Ginter’s favorite webinars of 2024,

The post Andrew Ginter’s Top 3 Webinars of 2024 appeared first on Waterfall Security Solutions.

]]>

Andrew Ginter’s Top 3 Webinars of 2024

Discover Andrew Ginter’s top picks for the most insightful and engaging webinars of 2024, covering key trends and strategies in industrial security.
Picture of Andrew Ginter

Andrew Ginter

As 2024 comes to a close, it’s traditional to reflect on the and maybe catch up on bits of reading and events that we missed throughout the year because of our busy schedules. To this end, I recommend to you three of this year’s Waterfall webinars, each an overview of Waterfall or other authors’ reports that read faster when we’ve seen an overview, so each of us can skip faster to the material we find most potentially useful.

My Top Three Webinars of 2024:

1) Cyber Attacks with Physical Consequences – 2024 Threat Report

By the numbers –Waterfall & ICS Strive produce the world’s most conservative and most credible OT / industrial security threat report. In this webinar the authors review the numbers – public disclosures of attacks with physical consequences. And we look at what the numbers mean for the practice and future of industrial cybersecurity.

To read further, the threat report is available here.

2) IEC 62443 for Power Generation

The IEC 62443 standards are cross industry, somewhat out of date, and deliberately vague in many areas – and so need to be interpreted to apply them successfully. In this webinar, Dr. Jesus Molina provides an overview of his report that shows how to interpret and apply the standards to conventional electric power plants.

To read further, the IEC 62443 for Power Generation report is available here.

3) Evolving Global OT Cyber Guidelines

This webinar is a favorite of mine because of big turnout and the thoughtful questions and comments from the audience. In this webinar, we explore the latest developments in OT cybersecurity regulations, standards and guidance worldwide and what these developments mean for industries navigating this complex landscape.

If you would like to read more, I recommend the brand new, multi-national Principles of OT Security – it’s good, and with only 9 pages of payload, it’s an easy read over the holidays.

These are my top 3. If you would like to see even more of our videos, I encourage you to subscribe to the Waterfall Youtube channel where we upload new videos regularly.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Andrew Ginter’s Top 3 Webinars of 2024 appeared first on Waterfall Security Solutions.

]]>
Andrew Ginter’s Top 3 Podcast Episodes of 2024 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/andrew-ginters-top-3-podcast-episodes-of-2024/ Mon, 16 Dec 2024 15:12:04 +0000 https://waterfall-security.com/?p=29337 Sit back and enjoy Andrew Ginter's top 3 picks from 2024's Industrial Security Podcast series.

The post Andrew Ginter’s Top 3 Podcast Episodes of 2024 appeared first on Waterfall Security Solutions.

]]>

Andrew Ginter’s Top 3 Podcast Episodes of 2024

As 2024 winds down, kick back and enjoy some of Andrew Ginter's best podcast picks

Andrew GinterOver the past 12 months, it has been a pleasure and a privilege to co-host the Industrial Security Podcast. When I started the podcast 5-ish years ago, bluntly, I did not know if there was enough industrial security content in the world for more than a year or two of episodes. It turns out the OT security space is much broader and deeper than I knew, and I’ve both learned something in every episode and become aware of how much more that I don’t know that every one of my guests do know and give us a few insights based on that knowledge in every episode.

Choosing three from this year’s episodes was hard, but here are three that stood out for me. If you ask me for a theme for these episodes, I’d have to say all three provide insights into high-consequence attacks, risk blind spots, and of course defenses against these attacks. This is all consistent with the perspective of the Cyber-Informed Engineering initiative and with the themes I explore in my latest book, Engineering-Grade OT Security: A Manager’s Guide.

I hope you enjoy listening to these podcasts as much as I enjoyed the interviews and discussions. And stay tuned, we are working on many more guests and discussions in 2025!

My Top Three Episodes of 2024:

Episode #134: Insights into Nation State Threats with Joseph Price

In this episode, Joseph Price nation-state threats and attacks. Nation states are often held up as “bogeymen,” able to do anything to anyone for reasons that are opaque to mere mortals. Joseph peels back a couple layers for us, explaining how to interpret the data is available in the public domain. He walks us through what to expect in terms of attack capabilities, how the world’s superpowers routinely test each other’s defenses, responses and capabilities in both physical and cyber domains, and looks at what this means for both small and large infrastructure sites and defensive programs.

Episode #123: Tractors to Table Industrial Security in the Industry of Human Consumables with Marc Sachs

In this episode, Marc Sachs, Senior Vice President and Chief Engineer at the Center for internet Security, Chief Security Officer for Pattern Computer, and a former White House National Security Council Presidential Appointee, takes a deep dive into the cybersecurity challenges facing the food production industry.

He examines the industry’s growing reliance on automation, from farmers leveraging GPS, drones and self-driving equipment to large-scale food production facilities dependent on interconnected systems. While these advancements have dramatically improved efficiency and productivity, automation has also created important new vulnerabilities. Marc walks us through real-world examples of cyber threats targeting this critical industry, the potential consequences of a future attacks, and practical measures that organizations can take to bolster their defenses.

This episode provides an eye-opening look at how completely automated the high end of agriculture and food production has become, and how this is a problem as more and more operations deploy this kind of automation.

Episode #131: Hitting Tens of Thousands of Vehicles At Once with Matt MacKinnon

In this episode, Matt MacKinnon, Head of Global Strategic Alliances at Upstream Security, looks at a cybersecurity niche in the automotive industry that I did not know existed: protecting the cloud systems that vehicle manufacturers rely on to manage and interact with the vehicles they produce. From passenger cars to 18-wheelers and massive mining equipment, connected vehicles enable everything from diagnostics and updates to real-time remote control.

Matt explains how digital transformation and the pervasive use of cloud systems in automotive and heavy equipment industries has introduced new attack opportunities, with potential consequences ranging from unauthorized manipulation of vehicular systems, data breaches, and potential threats to safe and reliable operations.

How to manage these risks and protect cloud systems connected to vehicles? Matt walks us through protective technology and how it works – technology I did not know existed.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Andrew Ginter’s Top 3 Podcast Episodes of 2024 appeared first on Waterfall Security Solutions.

]]>
Are OT Security Investments Worth It? https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/are-ot-security-investments-worth-it/ Sun, 08 Dec 2024 09:56:23 +0000 https://waterfall-security.com/?p=29186 Spoiler Alert: Yes, investing in OT security is very much “worth it”. It helps prevent financial losses, operational disruptions, and compliance penalties far exceeding initial costs. The average ROI can reach up to 400%, ensuring both protection and operational continuity.

The post Are OT Security Investments Worth It? appeared first on Waterfall Security Solutions.

]]>

Are OT Security Investments Worth It?

Spoiler Alert: Yes, investing in OT security is very much “worth it”. It helps prevent financial losses, operational disruptions, and compliance penalties that far exceed initial costs. The average ROI can reach up to 400%, ensuring both protection and operational continuity.
Picture of Waterfall team

Waterfall team

Are OT Security Investments Worth It?

The Rising Need for OT Security in Industrial Operations

The growing digitization of industrial operations makes safeguarding operational technology (OT) increasingly vital. OT encompasses the hardware and software that detects or controls physical processes, distinct from IT, which focuses on data. One key difference between OT and IT security though, is that a breach of an OT system can have real-world, physically harmful consequences—and those consequences can arise quickly. For example, if a cyberattack gains access to a manufacturer’s OT systems, it could directly (or indirectly) cause an unplanned shutdown of production, damage machinery, or even harm personnel working near the production line.

FACT: 2023 saw a 19% increase in cyberattacks causing physical damage, highlighting the growing threat to OT environments.

One of the major challenges in improving OT security are outdated legacy systems that lack modern security features and complex network architectures that provide many potential entry points for attackers. Another often underestimated factor is the human element.

OT Security factory smog and smokeIn most cases, employees are the first line of defense in cybersecurity efforts. However, inadequate training leaves organizations vulnerable to attacks, as employees are not always equipped to handle the demands of modern cybersecurity operations.

As cyberattacks grow more advanced, all industrial sectors face heightened vulnerabilities. Protecting critical assets is essential, and compliance with regulations alone is no longer sufficient. Comprehensive investment in securing the operational technology that underpins business continuity has become a necessity and is no longer a “nice to have” option.

Neglecting OT security poses significant risks to safety, connectivity, and financial stability. In today’s modern threat landscape, industrial operators understand the need to prioritize security across all processes to safeguard their operations and ensure resilience in the face of growing cyber threats.

Breaking Down the High Costs of OT Security Solutions

The financial burden of securing Operational Technology (OT) is particularly challenging for small and medium enterprises. The expenses include initial investments in hardware and software, as well as ongoing maintenance costs.

“The 2022 Clorox cyberattack inflicted $49 million in damages, underscoring the financial fallout of neglected OT security.”

The secure operation of OT systems is invaluable, as vulnerabilities can threaten worker safety, operational continuity, and system integrity. Research shows that cyberattacks targeting OT environments are on the rise, with a 19% increase in attacks causing physical damage reported in 2023. High-profile incidents, such as the $27 million breach at Johnson Controls, the $49 million damages at Clorox, and the $450 million costs incurred by MKS Instruments, illustrate the financial risks of inadequate OT security.

The factory workers - OT Security Cost Investment AnalysisInvesting in OT security may seem costly upfront, but the risks posed by unprotected legacy systems far outweigh these expenses. Legacy systems, with their outdated protocols, expose both OT and IT networks to attacks due to their interdependent nature. Solutions like advanced anomaly detection, real-time monitoring, and network segmentation are designed to mitigate these risks effectively. By using unidirectional gateways, legacy systems can continue to be used safely and securely, without the need for costly upgrades.

Despite the costs, OT security investments in tools like unidirectional security gateways yield significant returns. Businesses report an average ROI of 400%, primarily through incident prevention. This becomes increasingly critical as cybercriminals evolve their tactics, targeting IT and OT networks to disrupt operations. Robust and proactive security measures are essential to protect organizations from the financial and reputational damage caused by cyberattacks.

Calculating ROI: How OT Security Pays Off

Evaluating the return on investment (ROI) for OT security initiatives involves understanding both tangible and intangible benefits. While traditional business investments aim for revenue growth, security investments focus on risk reduction, helping organizations avoid or mitigate potential losses.

PROTIP: Use the Return on Security Investment (ROSI) formula to compare the cost of security measures versus the reduction in potential losses.

A great method for calculating costs and ROI on OT security investments is to use the ROSI formula, which works like this:

ROSI = (Reduction in potential losses – Cost of safety measure) / Cost of safety measure

For example, a $100,000 security solution that reduces potential losses of $500,000 to $250,000 yields a 150% return. Historical data, such as ransomware incidents costing between $250,000 and $850,000, further supports the financial justification of these investments.

Organizations can refine their calculations by incorporating metrics such as:

  • Single Loss Expectancy (SLE): The financial impact of a single incident.

  • Annual Rate of Occurrence (ARO): The frequency of incidents based on historical data.

  • Annual Loss Expectancy (ALE): The annualized cost of potential incidents, derived from SLE and ARO.

  • Mitigation Ratio: The percentage of incidents prevented by a security measure.

For instance, if a business faces ten annual attacks costing $20,000 each, a $50,000 investment that prevents 90% of these breaches demonstrate clear financial benefits. When using deterministic solutions such as Waterfall’s unidirectional security gateway, the benefit becomes even clearer. See here for more details.

Beyond financial savings, OT security investments safeguard business continuity, customer trust, and reputation. These benefits are critical for companies operating in competitive markets where even minor disruptions can have significant consequences.

Some final words...

Industrial operations today face the dual challenge of addressing increasingly sophisticated cyber threats while managing constrained budgets. Securing OT systems is essential to maintaining a “production-first” approach that underpins modern industrial operations.

OUCH! An unprotected legacy manufacturing machine once allowed malware to move laterally, disrupting operations across an entire company.

Prioritizing resources starts with comprehensive risk assessments. Tools that calculate asset-specific risk scores can help identify critical areas requiring investment. Modernizing infrastructure, such as replacing 10- to 20-year-old equipment, also enhances security by reducing vulnerabilities, but keeping that machine in a way that maintains compliance and enhances security is far more cost effective.

Factory floorCollaboration across OT, IT, and security teams is crucial for cohesive strategies. Cross-functional efforts ensure that cybersecurity measures align with business objectives, resulting in shared ownership of protocols. While moving to proactive solutions like Zero Trust Network Access (ZTNA) enhances security by adhering to the principle of “never trust, always verify.”, it still leaves gaps within OT security. However, a more cohesive approach such as Cyber-informed Engineering, addresses the threats head-on, with a more elaborate solution that saves costs over time by getting OT and IT (and other stakeholders) working together to ensure security from the start, and not as an afterthought.

Investing in OT security, while expensive, is far less costly than the aftermath of a cyberattack. By adopting a risk-based strategy, securing legacy infrastructure, and fostering collaboration, industrial operators can enhance their resilience to cyber threats while maintaining operational efficiency.

Want to learn how to engineer  OT Security into OT systems? Get your complimentary copy of Andrew Ginter’s new book: Engineering-grade OT Security: A Manager’s Guide

FAQs

What is OT security and why is it important for industrial operators?

Operational technology (OT) refers to the systems that control physical processes in industrial operations. Securing OT is essential to prevent breaches that could halt production, damage equipment, or harm workers. As OT systems become prime targets for cybercriminals, protecting them is increasingly critical.

What are some key challenges in implementing OT security?

Common challenges include outdated systems lacking modern security features, complex network architectures with numerous entry points, and human error. Addressing these issues requires securing legacy systems, redesigning network structures, and ensuring employees are adequately trained.

How do cyberattacks affect OT environments in industrial operations?

Cyberattacks on OT systems can cause production downtime, financial losses, equipment damage, and even physical harm to workers.

What are the costs associated with OT security investments?

OT security investments include upfront costs for hardware and software, ongoing maintenance, and compliance expenses. However, these costs are outweighed by the potential financial and operational losses of a cyberattack.

Is OT security investment worth the financial burden?

Yes, the ROI of OT security demonstrates its value. Preventing downtime and damage from cyberattacks saves organizations significant costs, making security investments highly worthwhile.

How can organizations calculate the ROI of OT security measures?

The ROSI formula calculates the financial benefits of security measures by comparing potential losses avoided to the cost of the measures.

What proactive measures can industrial operations take to prioritize OT security?

Industrial operations should conduct risk assessments, secure legacy infrastructure, and adopt strategies like network segmentation between OT and IT. These measures strengthen security and reduce vulnerabilities.

Why is collaboration important for effective OT security?

Collaboration between OT, IT, and security teams ensures aligned strategies and shared ownership of cybersecurity protocols. Approaches such as Cyber-informed Engineering improves communication, fosters cohesive planning, and enhances overall security outcomes.

 

Want to learn how to engineer  OT Security into OT systems? Get your complimentary copy of Andrew Ginter’s new book: Engineering-grade OT Security: A Manager’s Guide

 

Picture of Waterfall team

Waterfall team

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Are OT Security Investments Worth It? appeared first on Waterfall Security Solutions.

]]>
Expert Impressions of Cyber-Informed Engineering https://waterfall-security.com/ot-insights-center/ot-security-standards/impressions-of-cyber-informed-engineering/ Wed, 27 Nov 2024 13:12:36 +0000 https://waterfall-security.com/?p=28595 I recently had opportunity to ask experts @Marc Sachs, @Sarah Fluchs and @Aaron Crow about their experience with the new Cyber-Informed Engineering (CIE) initiative.

The post Expert Impressions of Cyber-Informed Engineering appeared first on Waterfall Security Solutions.

]]>

Expert Impressions of Cyber-Informed Engineering

I recently had the opportunity to ask experts Marc Sachs, Sarah Fluchs and Aaron Crow about their experience with the new Cyber-Informed Engineering (CIE) initiative. Here's what they had to say...
Picture of Andrew Ginter

Andrew Ginter

Expert Impressions of Cyber-informed Engineering

I recently had the opportunity to ask experts Marc Sachs from the Center for Internet Security, Sarah Fluchs, from admerita GmbH, and Aaron Crow from Morgan Franklin Consulting, about their experience with the new Cyber-Informed Engineering (CIE) initiative. For anyone not familiar with the initiative, CIE positions OT security as “a coin with two sides.” One side is cybersecurity – teach engineering teams about cyber threats, cybersecurity mitigations, and the limitations and scope of each kind of mitigation. The other side is engineering – use engineering design elements like overpressure-relief valves and manual fall-back procedures to address cyber threats as well as more conventional threats to safe, reliable, and efficient physical operations.

“CIE positions OT security as “a coin with two sides.’ One side is cybersecurity…the other side is engineering.”

With funding from the US Department of Energy (DoE), Idaho National Laboratory (INL) is assembling a body of knowledge – relevant parts of safety engineering, protection engineering, automation engineering, network engineering, and of course cybersecurity and the NIST CSF. My own experience is that CIE is very often, but not always, received very warmly. I was curious to get another couple of data points as to how other people perceived it, and the reactions they observe in their part of the OT security community. So, I asked…

1) What is your general impression of CIE?

Marcus Sachs - OT Security and Cyber-informed Engineering
Marc Sachs – Cyber-Informed Engineer

Marc responded “Involving the engineering community reframes digital security as a risk area that can be mitigated with engineering principles and practices. Rather than addressing computer science issues within OT or IC systems, engineers can apply physical laws and mathematical principles to design infrastructure resilient to cyber attacks.”

Sarah responded “Cyber-Informed Engineering matters because it emphasizes the need of hearing the engineer’s perspective on cybersecurity. This is both the emphasis on consequence (real-world plant consequence, not some ephemeral CIA triad) and on engineered controls, including aspects that are not in the cyber realm and cyber usually takes for granted or regards as out-of-scope.”

Aaron responded “CIE’s most important contribution is how it fosters collaboration across different domains, creating a culture where stakeholders from engineering, IT, and cybersecurity work together. This collaborative approach elevates threat modeling to the next level because it engages key personnel (like control room leads) who understand real-world operational access points and vulnerabilities.”

These all make a lot of sense to me. CIE calls out powerful tools that engineering teams can use to address cyber risk – tools that are not even mentioned in the NIST CSF, ISO 27001, nor even in the industrial IEC 62443 standards. In my experience, the realization that these engineering risk mitigation tools exist, in addition to cybersecurity mitigations, for the first time brings engineering teams to the cyber risk management table as equals. This makes cooperation easier, puts more options on the table, and results in more effective risk management strategies. And CIE’s emphasis on tackling the highest credible consequences first is consistent with the engineering perspective as well – deal with the “big fish” first and you almost always find that your “big fish” mitigations have already addressed the high-frequency, lower consequence threats as well.

2) What has been the reaction of business, enterprise security and engineering stakeholders to CIE?

Marc“It resonates since most people are not security experts, but many can understand the concept of using engineering principles and practices to mitigate these new risks.”

Sarah Fluchs
Sarah Fluchs – CTO at admeritia GmbH

Sarah“Not surprisingly, it resonates most with engineers. But I found it also makes it easier to connect with business stakeholders because the focus on plant consequences is closer to business risk than what managers usually get from IT security. Enterprise IT is usually the hardest to convince because they’re just not used to thinking about aspects outside of cyber / IT.”

Aaron“The eye-opener comes when they realize the importance of connecting all these individual components into a cohesive process that fully integrates cybersecurity throughout the engineering lifecycle. CIE is a shift in perspective on how security should be part of every engineering and business decision.”

So again, different perspectives – Marc‘s & Sarah’s comments speak to the experience of business decision makers, while Aaron looks more at the reaction of more technical practitioners. My own experience is that the majority (but not universal) reaction can be paraphrased as “What a good idea. Why is this new? This should not be new. Why have we not been looking at the problem this way since the beginning?” Stakeholders observe that we are working with the same puzzle pieces – cybersecurity designs, engineering designs, and so on. But when we arrange the pieces as CIE suggests, there are no longer “gaps” between them – they form a seamless whole.

3) Have you had the opportunity to apply the CIE approach yourself?

Marc“I am currently collaborating with a medium-sized municipal utility to apply the CIE framework to their water and wastewater systems. The staff’s initial impressions are that this is a great way to better understand the risks introduced by the rapid transition to networked control systems. They are already developing new engineering designs to address the issues we have uncovered.”

Sarah“My work has always been very much aligned with CCE / CIE, so I apply portions of it every day. Mostly not the full-blown approach though because its very heavy on resources.”

Aaron C. Crow - Cyber & Strategic Risk Leader
Aaron C. Crow – Cyber & Strategic Risk Leader

Aaron“I’ve been applying a similar approach for over a decade, even before it was formally called CIE, though in a more informal way. A big lesson is how crucial it is to increase awareness of critical system components that may have been overlooked. A simple fix – like training personnel to recover quickly from a failure with something as straightforward as a reboot or hardware swap – can make all the difference. CIE helps bring this level of understanding to the forefront.”

So, the short answer is “yes” – people are applying the methodology and/or the perspective to their projects and decision-making. And I agree with Sarah – CCE (part of CIE) risk assessments for example, are by OT industry standards very comprehensive. And the CIE Implementation Guide contains hundreds of questions we need to be asking of our projects, at every stage of the lifecycle. But picking and choosing or not, the perspective is clearly valuable and being used to one extent or another.

4) Many engineers believe cybersecurity is IT's job. Many enterprise cyber people bemoan the sorry state of OT security. Does or will CIE change any of this?

Marc“Yes, CIE has the potential to change the conversation. It does not take away any responsibilities from the enterprise IT or the OT/ICS teams. It leverages the non-computer-centric viewpoints and experiences of classic engineers and uses their expertise to find new ways to mitigate digital risk.”

Sarah“I believe it doesn’t matter as much who actually does OT security. If CIE can either enable engineers to contribute their perspective to OT security or enable IT security to take the engineers’ perspective, there’s hope.”

Aaron“Absolutely. CIE helps bridge the gap between IT, OT, and engineering by bringing all stakeholders to the table. Ultimately, CIE facilitates shared responsibility, helping engineers realize that OT security isn’t just IT’s job but a collective effort.”

My own experience is that a dialog of equals, asking each other questions, is a powerful tool for changing perceptions. Engineers need cyber attack knowledge from enterprise security, so the engineers can see for themselves why we need to change how we do things. And enterprise security teams need an appreciation of the safety and other considerations that constrain engineering decisions, so enterprise security can see why that “do something” very often cannot be the same thing that we do on enterprise networks.

5) Any other observations?

Marc“CIE represents a shift from treating cybersecurity as a separate IT issue to integrating it within core engineering practices, leading to more resilient and secure critical infrastructure systems. I’m thrilled and honored to have been a part of the CIE team since 2020. It’s a great way to apply 40 years experience in Civil Engineering and network security to a field that is increasingly putting our society at risk.”

Aaron“The key to the success of CIE lies in stakeholder involvement and adoption. Getting everyone at the table – engineers, cybersecurity teams, operations, and management – ensures open communication and collaboration from the start. This shared involvement fosters trust and clarity, which are essential to fully understanding and mitigating risks.”

Said another way, the “coin” has two sides – cybersecurity and engineering. When we spend this “coin” just like any other coin, we do not choose one side of the coin over the other – we spend the whole coin. In practice, the sites and organizations that I see using engineering tools the most thoroughly to address cyber risk also use cybersecurity tools the most thoroughly. Cybersecurity alone was never enough to secure our operations optimally, and CIE shows us the unique contributions that each of our kinds of stakeholders can make to more effective solutions.

And thank you so much to Marc, Sarah, and Aaron for their insights!

Interested in learning more about Cyber-informed Engineering? Get a complimentary copy of my latest book Engineering-grade OT Security: A Manager’s Guide to learn how CIE can be put to use for protecting your systems, operations, and OT.

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Fill out the form and get your complimentary copy

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Expert Impressions of Cyber-Informed Engineering appeared first on Waterfall Security Solutions.

]]>
Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks https://waterfall-security.com/ot-insights-center/oil-gas/checklist-9-best-practices-to-safeguard-upstream-oil-gas-operations-from-cyber-attacks/ Wed, 14 Feb 2024 12:02:50 +0000 https://waterfall-security.com/?p=19269 Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations.

Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations.

The post Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks appeared first on Waterfall Security Solutions.

]]>

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks

Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations.

Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations.

Some highlights of what is covered:

arrow red right  CIE and IT Best Practices that apply to upstream and cyberattacks preparedness.

arrow red right  Onsite security, personnel security, and employe training that goes a long way.

arrow red right Protecting against remote threats without restricting outside connectivity

Download our infographic checklist to make sure that you’ve covered all your bases in securing your upstream operations.

About the author
Picture of Kevin J. Rittie

Kevin J. Rittie

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing. Kevin's innovative contributions include leading the design of a patented control visualization architecture and driving the development of energy management solutions, culminating in the establishment of his own business, RevelationSCS, focused on change management, software practices, and securing critical infrastructure.
Share

Fill out the form and get it by email​

The post Checklist: 9 Best Practices to Safeguard Upstream Oil & Gas Operations from Cyber Attacks appeared first on Waterfall Security Solutions.

]]>
Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations https://waterfall-security.com/ot-insights-center/oil-gas/cyber-informed-engineering-transforms-it-ot-convergence-in-oil-gas-operations/ Thu, 01 Feb 2024 08:17:43 +0000 https://waterfall-security.com/?p=18459 IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over.

The post Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations appeared first on Waterfall Security Solutions.

]]>

Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Join our webinar for an in-depth look at how CIE (Cyber-Informed Engineering) can help in converging IT and OT security for Oil & Gas operations.

Join us on February 28th or 29th 2024.
There will be 2 live streams of the webinar, please pick the date and time that works best for you.

Oil & Gas Webinar

On this webinar, we'll take you through:

IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over. 

However, understanding what “more” means has been the challenge.

Cyber-Informed Engineering (CIE) is a new approach to securing IT/OT convergence – an approach and a perspective that highlights important opportunities. For example, in CIE, worst-case consequences define security requirements for industrial networks, and consequence boundaries define unique spheres of expertise and approaches, including safety engineering, process engineering, the NIST Cybersecurity Framework and leveraging industrial data in the cloud.

Join Kevin Rittie, Andrew Ginter, and Alan Acquatella in this webinar as they introduce a new approach to solving long standing challenges by:

arrow red right Identifying the challenges facing OT engineering as it strives to build secure bridges between operations, corporate, and the cloud in order to satisfy the ever growing need for operational data that drives strategic business growth.  

arrow red right Introducing CIE in a way that it is clear how this approach to secure-by-design engineering can improve the security and operational integrity of both brownfield and greenfield installations.

arrow red right Looking at some practical examples that make tangible how cyber-informed engineering and unidirectional network engineering combine to build safe and secure production environments.

arrow red right Listing some tangible next steps on your continuous cybersecurity journey.

Picture of Kevin Rittie, a Critical Infrastructure Technology Consultant

Kevin Rittie, a Critical Infrastructure Technology Consultant

With over 30 years in the control system market, Kevin Rittie is a seasoned software and cybersecurity professional who has led diverse development groups with budgets up to $10M. He has a comprehensive background, starting as a project engineer and software developer, and has excelled in roles such as Product Management, Cybersecurity, Sales, and Marketing.

Picture of Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter is the most widely-read author in the industrial security space, with over 20,000 copies of his first two books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.

Picture of Alan Acquatella, Industry Expert at Schneider Electric

Alan Acquatella, Industry Expert at Schneider Electric

Alan Acquatella heads the Pipeline & New Energies Infrastructure Segment for Schneider Electric. He brings domain expertise about industry and customer requirements and provides thought leadership and knowledge on valuable technologies and services customers can use to improve their operations and sustainability efforts.

Share

Register Now

The post Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations appeared first on Waterfall Security Solutions.

]]>
5 Ways Waterfall Central™ Improves Situational Awareness  https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/5-ways-waterfall-central-improves-situational-awareness/ Thu, 18 Jan 2024 12:07:55 +0000 https://waterfall-security.com/?p=17756 Introducing Waterfall Central: Come for simple remote monitoring of multiple devices, stay for operational awareness.

The post 5 Ways Waterfall Central™ Improves Situational Awareness  appeared first on Waterfall Security Solutions.

]]>

5 Ways Waterfall Central™ Improves Situational Awareness 

Introducing Waterfall Central™: Come for simple remote monitoring of multiple devices, stay for the situational awareness.
Picture of Waterfall team

Waterfall team

WF Central Situational Awareness

Situational awareness (SA) is one of the most important facets when considering any form of security, and especially cybersecurity. Network Operation Centers (NOC) and Security Operation Centers (SOC) are keen to have a strong grasp of what is going on within their scope of responsibilities. This way, they can be proactive instead of reactive to threats, risks, and general operational incidents.  

Waterfall Central™ is a browser-based solution designed to enable personnel responsible for multiple Waterfall devices to easily monitor all their devices.  

Waterfall Central™ is a browser-based solution designed to enable personnel responsible for multiple Waterfall devices to easily monitor all their devices.  

All Your Waterfall Devices on a Single Pane of Glass

Beyond simply allowing 1 person to monitor multiple Waterfall assets, the Waterfall Central delivers something else: Situational Awareness. If youre an analyst in a NOC (network operating center) or SOC (security operating center) and you need better operational awareness, Waterfall Central™ was designed for you. While Central primarily addresses the increasing demand for monitoring multiple Waterfall appliances, Central can serve other important purposes that facilitate added security. 

5 Examples of Improved Situational Awareness with Waterfall Central™

1. Heartbeat Signal Monitoring

In the event that a Waterfall device stops sending a heartbeat signal, Waterfall Central™ provides immediate awareness. This could be indicative of various issues, such as a loose cable, server room power failure, or a blown fuse. Identifying and addressing such issues promptly can prevent complications.  

2. Real-time Issue Resolution

Waterfall Central™ presents a clear picture of all Waterfall devices on a single screen, allowing for the swift identification and resolution of emerging issues. The built-in wizard generates issue tickets for prompt communication with the OEM, which saves time and helps resolve any issues faster.  

The opposite of situational awareness is ‘being distracted’, so by helping avoid the distraction of chasing down inconsequential incidents and OEM reporting, attention can be applied elsewhere. 

3. Confirmation of OT Connectivity

Central assists in confirming OT connectivity, ensuring that various IT systems are receiving data from Waterfall devices. This feature is particularly valuable when onboarding new solutions to optimize industrial processes, offering a quick way to verify proper integration and functionality. 

4. Automated Alerts for Anomalies

Waterfall Central™ is equipped with built-in alerts that notify users of device failures or abnormalities. These alerts can be configured to draw attention to anomalies that may indicate security incidents or other problems, providing an additional layer of proactive security measures.  

5. Rapid Incident Evaluation

One of the most useful capabilities that comes from having all your Waterfalls on a single pane of glass is knowing that an “incident” is nothing. A good example would be connectivity dropping across many devices at the same time for a few minutes, and then goes back up. Such a scenario is most often just IT resetting an internet router or switch. If such an incident was to be reviewed after-the-fact on each device’s logs, it would probably require a good amount of work before determining it was just an inconsequential event. By seeing all Waterfall devices in real-time, such conclusions can be reached quickly and easily.  

Centralized Security, Better Awareness

By keeping a centralized dashboard for all your Waterfall devices, it is easier to ensure that everything is running smoothly, while reducing the person hours needed to simply confirm certain details and knowing about important issues sooner. And keep in mind this is in addition to the primary benefits that Central has to offer, which is monitoring multiple Waterfalls 

Want to learn more? Contact us

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post 5 Ways Waterfall Central™ Improves Situational Awareness  appeared first on Waterfall Security Solutions.

]]>
Securing Industrial Data Flow to AWS  https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/securing-industrial-data-flow-to-aws/ Tue, 09 Jan 2024 08:45:31 +0000 https://waterfall-security.com/?p=17326 Waterfall is proud to be recognized by Amazon as a validated industry standard for connecting OT systems to the AWS Cloud.

The post Securing Industrial Data Flow to AWS  appeared first on Waterfall Security Solutions.

]]>

Securing Industrial Data Flow to AWS 

Waterfall is proud to be recognized as the industry standard for connecting OT systems to the AWS Cloud.
Picture of Waterfall team

Waterfall team

Connected OT to the Cloud with Waterfall and AWS

As industries embrace the power of the Industrial Internet of Things (IIoT) and other cloud-based technologies to enhance operational efficiencies, a challenge has emerged in bridging the gap between the need for digitization and the importance of securing critical infrastructure systems. The conventional approach of directly connecting Industrial Control Systems (ICS) and Operational Technology (OT) to external networks poses significant cybersecurity risks. After extensive joint lab testing and data validation, Amazon Web Services (AWS) now recommends using Waterfall Unidirectional Gateways as the preferred solution for securely connecting industrial systems to the AWS cloud. 

The delicate balance between digitization and security ​

Waterfall Security and Amazon Web Services both acknowledge the necessity for a balanced approach in advancing digitization, while safeguarding critical infrastructure systems. In line with AWS’s 10 security golden rules for IIoT solutions, AWS recommends deploying security appliances, particularly unidirectional gateways, to regulate the data flow and establish unbreachable one-way connections to external networks and cloud services. This way, data can securely flow to the AWS Cloud for access and function use within AWS’s IoT SiteWise and IoT Core, while any attempt to breach the industrial systems remains physically impossible. 

“AWS recommends deploying security appliances, particularly unidirectional gateways, to regulate the data flow and establish unbreachable one-way connections to external networks and cloud services.”

The power of Unidirectional Gateways

Unidirectional gateways, which are a much more secure alternative to traditional firewalls, ensure a one-way data flow from the OT network to the IT network and the cloud while being physically unable to send traffic in the reverse direction. Unidirectional gateways are compliant with many industry standards such as NERC CIP and ISA/IEC 62443. While deployed behind-the-scenes, these unidirectional gateways play a crucial role in protecting critical infrastructure systems. 

Waterfall Unidirectional Gateway to the AWS Cloud

Option 1 –> Sending OT/IIoT Data to AWS IoT SiteWise: 

Waterfall Security’s Unidirectional Cloud Gateway facilitates the secure transmission of OT/IIoT data to AWS IoT SiteWise. The gateway replicates OPC UA data from an OPC UA server, hosting a replica OPC UA server for the IT network. The AWS IoT SiteWise Edge gateway running on AWS IoT Greengrass collects and sends this data to AWS IoT SiteWise in the cloud, enabling efficient visualization and analysis

OT IIot Data to AWS using SiteWise
Click to enlarge

Option 2 –> Sending OT/IIoT Data to AWS IoT Core: 

Waterfall’s Unidirectional Gateway, acting as an MQTT broker on the industrial network, facilitates the transmission of industrial data to AWS IoT Core using the MQTT protocol. This data can then be routed to various AWS services for processing, such as AWS IoT Events, AWS Lambda, Amazon Kinesis, Amazon Simple Storage Service (Amazon S3), and Amazon Timestream. The Waterfall Unidirectional Gateway ensures a secure and one-way transfer of data, physically removing the possibility of inbound cybersecurity risks. 

Sending IIot data to AWS IoT Core
Click to enlarge

Let the OT data flow to AWS Cloud-based services

In conclusion, Waterfall Security offers a robust solution for securely streaming OT/IIoT data to AWS IoT SiteWise and AWS IoT Core. By leveraging unidirectional gateways, industrial operations can harness the power of AWS cloud services without risks to their ICS/OT environments. This approach not only simplifies OT/IT integration, but also aligns with AWS’s multi-layered security approach outlined in the ten security golden rules for IIoT solutions. Waterfall Security remains committed to enhancing the security of critical infrastructure sectors, providing a foundation for secure, efficient, and digitized industrial operations. 

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Securing Industrial Data Flow to AWS  appeared first on Waterfall Security Solutions.

]]>
All Time Favorite Podcast Episodes: Andrew Ginter’s Top Picks https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/andrews-favorite-podcasts/ Tue, 26 Dec 2023 14:13:34 +0000 https://waterfall-security.com/?p=14973 Andrew Ginter shares with us his top 5 favorite podcast episodes from the Industrial Security Podcast that he co-hosts

The post All Time Favorite Podcast Episodes: Andrew Ginter’s Top Picks appeared first on Waterfall Security Solutions.

]]>

All Time Favorite Podcast Episodes: Andrew Ginter’s Top Picks

Five of Andrew's favorite podcasts to enjoy as 2023 comes to an end, and 2024 begins.
Picture of Waterfall team

Waterfall team

Top 5 Podcast Episode - Happy Holidays

I was asked to put a few words together about my favorite Industrial Security Podcast episodes of all time. I scanned the complete list at https://waterfall-security.com/podcast and came up with these five. The first four were episodes that contributed materially my thinking & the formation of sections and chapters in my latest “gold” book Engineering-Grade OT Security: A manager’s guide.

The fifth didn’t really fit the gold book, but I’m mulling the episode over for possible inclusion in my next book, if there is one. The gold book was all about risk in the context of individual organizations. For the future, I’m wondering if the world needs a bigger picture book of where OT cyber risk fits into the context of “all risks” that modern societies face, from nuclear war and EMPs to massive solar storms and global warming. I dunno for sure, please let me know what you think. 

“If you have time over the Christmas break and are looking for a podcast or five to make you think – full of ideas that will challenge your current understanding of the OT/industrial security space – these are the episodes I recommend.”

My top five episodes:

Episode #28: Unhackable Safeguards with James McGlone

James is a co-author of Security PHA Reviewa brilliantly-written book on using Process Hazard Analysis / HAZOP spreadsheets & concepts to improve cybersecurity with unhackable / engineering-grade mitigations.

 

 

 

Episode #68: Capabilities vs. Probabilities with Mark Fabro
Mark explains capabilities-based risk vs. older and murkier likelihood-based models, and uses capabilities to introduce cyber Design-Basis Threat (cDBT) – a way to eliminate “risk-based” hand waving.

 

Episode #85: Cyber Insurance is Changing Fast with Georgina Williams

Georgina walks us through changes in the insurance industry triggered by NotPetya and the $1.4 billion USD Merck Pharma payout. For many, OT cyber insurance is not the “one stop” solution it once was.

 

Episode #100: Engineering-Grade Security in the CIE Strategy with Cheri Caddy
Cheri led the US DOE / INL Cyber-Informed Engineering Strategy. Feedback I’ve heard from practitioners suggests the CIE Strategy might just be the single best thing to happen to OT cybersecurity, ever.

Episode #96: Consequences Matter with Danielle Jablanski
Danielle walks us through the very big picture. It is not just worst-case consequences that determine government policy & regulations, but also society’s ability to respond to different kinds of worst-case attacks.

 

If you have time over the holidays and are looking for a podcast (or five) to make you think – full of ideas that will challenge your current understanding of the OT/industrial security space – these are the episodes I recommend.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post All Time Favorite Podcast Episodes: Andrew Ginter’s Top Picks appeared first on Waterfall Security Solutions.

]]>
Step 2 Addressing OT Cyber Risk: Asset Inventory & Dependencies https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/ot-cyber-risk-step-2/ Thu, 07 Dec 2023 15:21:24 +0000 https://waterfall-security.com/?p=14397 Managing OT Cyber risk takes on different approaches and expertise depending on the potential consequences of compromise to a particular system. This is why it is important to delve into the distinction and importance of an engineering-centric approach to managing OT cyber risk.

The post Step 2 Addressing OT Cyber Risk: Asset Inventory & Dependencies appeared first on Waterfall Security Solutions.

]]>

Step 2 Addressing OT Cyber Risk: Asset Inventory & Dependencies

Managing OT Cyber risk takes on different approaches and expertise depending on the potential consequences of compromise to a particular system. This is why it is important to delve into the distinction and importance of an engineering-centric approach to managing OT cyber risk.
Picture of Waterfall team

Waterfall team

Step 2 - Addressing Cyber Risk

Moments after the discovery of a ransomware attack on the IT network of the North American Colonial Pipeline, company management responded with shutting down all physical operations out of “an abundance of caution”. As a result of this shutdown, Colonial lost 6 days of operation at 2.5 million barrels per day and paid nearly $5 million in ransom payment. The precautionary shutting down of operations reflected a degree of uncertainty in the cybersecurity controls in place at the time protecting the OT network from cyber attacks propagating through the IT network. The US Transportation Security Administration (TSA) responded by releasing a series of security directives following this event, with a common thread repeated through the series of directives: implement a cyber defense strong enough that, if the IT network is compromised, the OT network can continue operating at necessary capacity. The Colonial attack represents the present-day OT cyber risk scenario that industrial enterprises can no longer avoid; OT networks must be sufficiently protected from attacks arriving via more-exposed or less-consequential networks.

Designing a strong defensive posture to minimize OT cyber risk is a multi-step process, and one of the first places to start is by taking a thorough inventory, not only of industrial and cyber assets, but also of data flows and interdependencies. Physical assets and operations are what we need to protect, but data flows can be the means through which cyber sabotage attacks travel, and interdependencies must be discovered and understood as they complicate the task of how and what we need to protect. Let’s look at each of these in more detail.

“The precautionary shutting down of operations reflected a degree of uncertainty in the cybersecurity controls in place at the time protecting the OT network.”

Inventory Network Assets and Associated Vulnerabilities

In our previous article on step 1 of an OT Cyber Risk Management plan we identified the who; assigning responsibility for OT cyber risk management. Step 2 is identifying the what. This step in managing OT cyber risk is creating and maintaining an accurate asset inventory: the most accurate representation of the physical network. This exercise involves recording both assets and vulnerabilities/attack opportunities. Assets help us understand criticality and vulnerabilities help us understand exposure. An asset assessment accomplishes the goal of considering the worst-case consequences of compromise of each asset and subsequently assigning it a level of criticality. Once criticality is determined, it informs the strength of a security program needed for a system or network.

Taking an asset inventory can be manual (very labor intensive) or automatic. Automatic asset assessments are either passive “sniffing” or active “probing”. Each option has advantages and disadvantages and the type we choose will depend on staffing requirements, budget and the geographical expanse of our industrial sites. Documenting an entire operations network can be challenging, as industrial assets may not stand up well to network and device scanning. After all assets (both hardware and software), applications, endpoints and user accounts and any associated documentation such as vendor information and serial numbers have been recorded and inventoried, they should be grouped and organized in a manner that makes sense from a network architecture, functionality, and criticality perspective. The Purdue Model can serve as a useful starting point.

In addition to the inventory of physical hardware and software assets, taking an inventory of software vulnerabilities and exploitative opportunities helps us assess exposure. Software vulnerabilities can introduce compromise to the information being processed, stored, or transmitted by OT systems. Stolen credentials, weak permissions, weak passwords and other security configuration weaknesses can also be exploited. Assessing exposure to attacks tells us what opportunities attackers have to exploit.

Inventory Data Flows

In addition, if an attacker wants to mis-operate OT systems, he has to connect to those systems to mis-operatre them. Connectivity is how cybersabotage attacks reach targets – all data flows are potential attack vectors. Data flows include both physically carrying the attack information into the site (offline attacks) and exploiting digital connections through remote means (online attacks). Taking an inventory of data flows provides an understanding of how cyber-sabotage attack information can reach the systems we need to protect. The only way OT networks can experience cyber sabotage is for attack information to enter the system, somehow.

A useful way to document data flow inventories is to develop (and maintain) a network data flow diagram. The goal is not to document every data flow in a complex system – such a diagram would be complex beyond understanding. Major internal data flows should be documented or illustrated, but all online and offline data flows through physical or cyber perimeters to less-critical networks must be documented. It is data flows that permit attacks to cross criticality boundaries, such as the IT/OT network perimeter, that most urgently must be documented and understood.

The diagram should indicate bidirectional and unidirectional data flows, inputs/outputs, data storage, and again, data flows through which information and potential attack information from outside the OT network can pass to the inside. Many asset inventory solutions have diagram generating capabilities that can assist in changes to the network environment across time. This will prove advantageous both in designing and implementing appropriate cyber protections as well as in the case of incident response and recovery efforts following an attack.

Inventory Data Flows

Next, the OT cyber risk team must get a handle on network and other dependencies. For the purposes of assessing attack exposure, we must know about all the ways OT assets and physical operations depend on services from more-exposed IT, Internet or cloud networks. More difficult to determine, but just as essential, is that we must understand those tricky dependencies that exist even without communications between IT and OT assets and networks, such as procedural or logistical dependencies. These dependencies are important because IT assets are low hanging fruit for attackers. Even when OT systems or physical operations are the ultimate target of an attack, most OT network attacks begin with compromising IT systems. IT/OT interconnections and dependencies must be identified, protected and the data flow controlled to properly manage OT cyber risk.

For example, Active Directory systems are a common data flow dependency. In many organizations, OT systems need to connect to IT Active Directory servers to enable users to log in. In this scenario, if OT systems cannot connect to Active Directory servers residing in the IT network, OT is crippled. Subtler dependencies can exist; not all dependencies are reflected in information flows.

For example, during the NotPetya cyber attack, Maersk, the world’s largest container shipping company, suffered an operations outage because of a procedural dependency that was not evident in IT/OT information flows. The Notpetya malware crippled the database on the IT network that instructed truck drivers where to transport containers that were unloaded from ships in port. Since the tracking system was down, the drivers were unable to deliver the containers. Sometimes dependencies are complicated and the best way to investigate them is to assemble all stakeholders together to ask and understand – if all IT systems were shut down, could physical operations continue, and if not, why not?

Dependencies on IT systems are one reason that so many ransomware attacks result in outages of OT networks. Ransomware attacks impair IT networks more often than they do OT systems, and if OT networks have multiple dependencies with IT systems that ransomware has impaired, physical operations cannot continue. While it can be very difficult to eliminate all OT dependencies on IT systems, we cannot simply ignore any dependencies that must remain in place. Instead, we must recognize that IT systems which are essential to continued physical operations are in fact reliability-critical components. These reliability-critical systems may be hosted on the IT network instead of the OT network but must be managed and secured in many of the same ways that OT systems are managed and secured.

Wrapping it up

Documenting an asset inventory is a first step in the direction of determining the criticality of OT assets and contributes to understanding of exposure. Data flow inventory, especially of data flows permitting external info into OT networks document exposures (or attack vectors) that need to be eliminated or controlled. Dependencies expose OT systems to external attacks – not because the attacks reach OT systems, but because OT needs to shut down if IT systems that OT depends upon are crippled. The next step in an OT cyber risk assessment, assigning asset criticality, will be much more streamlined if the asset inventory step is carried out successfully.

 

Written by Courtney Schneider

 

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Step 2 Addressing OT Cyber Risk: Asset Inventory & Dependencies appeared first on Waterfall Security Solutions.

]]>