Page 52 - EE|Times Europe Magazine - December 2020
P. 52
52 EE|Times EUROPE
Data on the Edge: A Common Blind Spot in Industrial Security
SAFEGUARDING FOUR COMMON ATTACK SURFACES environment for performance purposes, the secu-
rity implications are large. Again, it is a mistake
Attack Surface Root Cause of the Problem Solutions and Alternatives to assume that your data and operational systems
Passwords Shared secrets can be harvested by attackers. • Client certificate authentication & PKI
Social engineering is unfortunately a reality. • Multi-factor authentication are protected by default. Thankfully, these
problems can be mitigated with better security
Cloud Configuration Lack of SSH key management, improper • SSH key management configuration and the use of encryption.
security settings in public cloud • Cloud security configuration diagnostics
implementations • Security reviews
CRITICAL IP ON YOUR EMAIL SERVER
CDN Improper security settings in CDN • CDN security configuration diagnostics
implementations • Security reviews Sony suffered a breach in 2014 during which
hundreds of terabytes of data were stolen. The
Email Critical IP and PII contained in emails, stored in • S/MIME certificates for small encryption, U.S. Democratic National Committee (DNC) also
email servers signing, and email server authentication suffered a data breach in 2016. Both breaches led
to sensitive emails being made publicly available
To securely protect data, developers need to be aware of four potential attack surfaces. by WikiLeaks. The implications were important
(Source: Sectigo) enough that Sony’s CEO was fired, and the DNC
suffered political bruises.
(IAM) standpoint, an important example of a needed change is VPN The same is possible for any organization, including industrial orga-
access in industrial environments. VPNs with weak credentials are nizations where critical operational information is shared. Thankfully,
usually “over-privileged,” and access to them is handed out willy-nilly modern email encryption using S/MIME certificates solves this prob-
to contractors. The principle of “least privileges” is a critical concept in lem. Certificate management and automation solve the problems that
cybersecurity. Not everyone should have full administrator privileges, used to be associated with S/MIME email encryption, including device
or lasting privileges, so it’s best to create IAM roles with only the min- provisioning and certificate escrow in case a certificate is lost.
imal privileges required to get a job done and then revoke them when On top of encryption, email signing is an important method of know-
it’s completed. This reduces the potential havoc an attacker can cause ing who emails are from, which can be of great benefit in defending
if credentials are stolen. If your company must utilize a VPN, consider against social engineering. Someone posing as a colleague who does
using credentials with only the necessary privileges, and ensure that not possess the S/MIME certificate will easily stand out from a properly
your VPN is using client certificates for authentication rather than just S/MIME-signed email. The security benefits are substantial.
username/password combinations.
Being diligent with security also requires managing Secure Shell ZERO TRUST: MODERN SECURITY PRINCIPLES
(SSH) keys carefully, which is rarely done. They don’t have expira- NIST recently published the final version of its Zero Trust Architecture
tion dates and often are stored in unsecured places. Consider using guide. All industrial organizations, OT organizations, and IoT vendors,
a commercial SSH management tool, which can wrap the keys into a as well as commercial IoT consumers, should become familiar with
certificate with policies and can be stored in highly specialized, secure the guide’s principles. Because of the trend toward the usage of public
computing environments. Don’t make the attacker’s job easy by leaving clouds and the shift toward resources outside of a traditional behind-
the keys to your kingdom lying around. the-firewall environment, it is best practice to consider every digital
Because of the trend toward using public cloud resources, security asset to be in a hostile network. This is especially important in this
discipline should be top of mind. It is a mistake to assume that your Covid-19 era of remote work.
data and operational systems are protected by default. Additionally, All of the data breaches mentioned above share a common problem:
consider encrypting the data, both at rest and in transit. By using too much trust.
public key infrastructure (PKI) encryption certificates, data can be From the 10,000-foot view, the Zero Trust model assumes that every
stored securely. Mutual authentication via the Transport Layer Security digital asset needs to be considered as its own network edge, with its own
(TLS) protocol accomplishes a secure assurance that your systems are identity that needs to be protected. This is where a confluence of technol-
talking to their intended destination but also creates an encrypted ogies is needed, from modern IAM and PKI for provisioning and managing
tunnel through which communication flows. The analogy is a VPN, but identities to policy engines that make authorization rules scalable.
TLS is lightweight and meant for API calls or communication between Zero Trust is ultimately an expression of the principle of least
devices and the cloud. privileges, which is vital for all organizations to embrace, including
industrial and OT. The traditional assumptions about the behind-the-
WHERE’S MY DATA? A CAN EXAMPLE firewall environment have gotten us into a lot of trouble, and it’s time
Controller area network (CAN) data is often moved to numerous edge to end that mentality.
servers for efficient and fast distribution. This technique has been used
for years, and it is now somewhat rare to see a busy website not using TIME FOR CHANGE
some form of CAN. This can enhance security in the form of distributed In OT environments, attackers have taught us that the concept of an air
DoS (DDoS) protection, but it can be a security risk in the form of less gap and “security through obscurity” are both myths. Are your systems
control over data. exposed to the public internet without your knowing it? It’s vital that
Recently, Intel reportedly suffered a breach of more than 20 GB of you find out before attackers do.
source code and proprietary data. According to the report, the attackers Do you have controllers in your operational network that are
obtained this data from a CAN, which Intel utilized to enhance web configured via a built-in web server? Is that web server exposed to the
application performance. Data is transferred from origin servers to public internet with a weak password? Take inventory of your digital
the CAN, making distribution of the data more efficient. It seems that assets. Where are your crown jewels, and how are they protected? Do
security configuration issues could have been the root cause of the not assume they are protected by default. Weak credentials, security
successful breach. misconfigurations, and lack of knowing what you have at risk are blind
Unfortunately, many organizations may not realize the security spots. Thankfully, they can easily be fixed. ■
implications of utilizing a CAN. If the data is considered secure because
it is behind a firewall but then is replicated outside of the enterprise Jason Soroko is chief technology officer at Sectigo.
DECEMBER 2020 | www.eetimes.eu