Page 41 - EE|Times Europe Magazine - December 2020
P. 41

EE|Times EUROPE   41



         SECURITY
        Shifting to Cloud Makes Security More Difficult


        By Ann R. Thryft



              o achieve greater efficiency and   From a business perspective, how do OT cybersecurity risks compare to other business
              access to more data, industrial   risks for your company? (n = 149)
              organizations have shifted data
        T processing and storage, data man-
        agement, and data analytics to the cloud       Significant risk but not   No. 1 business risk
                                                       among the top 10
        — for internet of things (IoT) and industrial
        IoT (IIoT) sensors and devices, operational
        technology (OT), and industrial control
        systems (ICS). There, they can be accessed
        by many more users than ever before.                                         Top 3 business risk
          But while cloud service providers (CSPs)   Top 10 business risk
        assure us that their data centers have better
        security measures than many companies’
        data centers, achieving plant connectiv-   Top 5 business risk
        ity at scale comes at the price of greater
        cybersecurity risks. Moving proprietary
        information and customer data — especially
        personally identifiable information (PII) —   A majority of manufacturing leaders surveyed by Fortinet said OT cybersecurity is at least
        from on-premises equipment to the cloud   a top-five business risk to their company. (Source: Fortinet)
        has vastly increased the potential attack
        surface.
          In survey after survey of cybersecurity
        decision-makers over the past few years, a   OT systems as primary targets, Rick Peters,   “Coupling the access of OT systems to a
        fairly consistent percentage of companies —   CISO operational technology, North Amer-  large array of enabled sensors, and the fact
        around 70% to 75% — report experiencing    ica for Fortinet, told EE Times.  that the majority of OT systems are largely
        a security incident within the previous    The industrial environment is vulner-  dependent on legacy hardware and software,
        year. The No. 1 worry is nearly always about   able to cyberattacks for several reasons.   translates to a significant inherited level
        data loss.                          In addition to all the connected IoT/IIoT   of risk.”
          Since the advent of Covid-19, things have   devices, two others stand out. They are   More than 80% of respondents expect
        only gotten more complicated and much   decades-old OT equipment and control   their budgets for securing OT infrastruc-
        more dangerous. The number of remote   systems that were never designed for   ture to increase in the next 12 months, said
        workers accessing IT systems from outside   exposure to the internet and therefore were   Peters. “What remains to be seen is how the
        the enterprise firewall with often unman-  not designed for security, and a patchwork   manufacturing industry balances invest-
        aged devices and unsecured home networks   of systems from multiple vendors running   ment proportional to the risks incurred via
        has soared, multiplying                         proprietary and non-updat-  digital transformation.”
        cloud security hassles. The                     able software — including
        problem is compounded by                        human-machine-interface   ONE-TWO PUNCH: HUMAN ERROR
        the expansion of remote                         computers with access to   AND IAM
        access to OT and ICS.                           remote terminal units,   The shift to the cloud, plus the unprece-
                                                        supervisory control com-  dented expansion of millions of workers
        TARGETS, AVENUES,                               puters, and PLCs. These   outside the corporate firewall, has acceler-
        OR BOTH                                         are often accompanied by   ated the need for platforms that protect the
        Both OT and ICS are                             insufficient budgets for   cloud and provide control for access to it
        increasingly the focus of                       implementing cybersecu-  by increasingly collaborative, remote, and
        attackers, either as avenues                    rity awareness, monitoring,   mobile users, including employees, suppliers,
        into IT and the rest of                         and prevention technology   and contractors. At the same time, identity
        the enterprise or increas-                      designed for OT and ICS.  and access management (IAM) has become a
        ingly as focuses of direct   Fortinet’s Rick Peters  Securing OT against   top concern, and human error is often seen
        attacks. “Securing Critical                     cyberattacks is now consid-  as one of the top reasons for data breaches
        Operational Technology in Manufactur-  ered at least a top-five business risk by 70%   and malware attacks.
        ing,” a study conducted by Fortinet and the   of OT cybersecurity leaders at large manu-  A recent study of cloud security best prac-
        Manufacturers Alliance for Productivity and   facturers, according to the Fortinet/MAPI   tices commissioned by Tripwire found that
        Innovation (MAPI), found that three out of   study. “Left unprotected, that increased   93% of cybersecurity professionals worry
        five manufacturers experienced breaches   risk to the cyber physical assets upon   human error could cause accidental exposure
        with unauthorized access to data in the   which most OT systems are designed could   of data in their cloud environment.
        past 12 months. Of those incidents, 42%   jeopardize the very foundational principles   The reasons for their worry are very real.
        resulted in operational outages with lost   and top priorities for OT systems: safety   The two main cyberattack vectors are stolen
        productivity, showing a greater interest in   and sustained operations,” said Peters.   credentials and phishing, according to

                                                                                   www.eetimes.eu | DECEMBER 2020
   36   37   38   39   40   41   42   43   44   45   46