DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Related

  • Enterprise Data Loss Prevention (DLP) Security Policies and Tuning
  • Security by Design: Building Full-Stack Applications With DevSecOps
  • How GitHub Copilot Helps You Write More Secure Code
  • Proactive Security in Distributed Systems: A Developer’s Approach

Trending

  • Enhancing Business Decision-Making Through Advanced Data Visualization Techniques
  • Can You Run a MariaDB Cluster on a $150 Kubernetes Lab? I Gave It a Shot
  • The Ultimate Guide to Code Formatting: Prettier vs ESLint vs Biome
  • Introduction to Retrieval Augmented Generation (RAG)
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. OT Security Questions and What You Can Learn From Them (Part 1)

OT Security Questions and What You Can Learn From Them (Part 1)

In the first part of this series, see how operational tech needs to take cybersecurity into account and how users can cover their bases.

By 
Tom Le user avatar
Tom Le
·
Sep. 29, 16 · Opinion
Likes (3)
Comment
Save
Tweet
Share
4.6K Views

Join the DZone community and get the full member experience.

Join For Free

In my role at GE/Wurldtech, I spend a lot of time with customers and industry leaders discussing issues related to ICS/SCADA security, which we also refer to as operational technology (OT) cyber security. Over the past several months I’ve noticed a recurring set of questions from customers that I felt needed addressing — practical issues that I believe will help you as you invest in securing your digital future.

Question 1: Are Cyber Security Threats Real?

During the 2016 Security of Things Conference, there was one clear message from attendees: they are appalled at state of security in IoT. Research studies and an increase in media coverage indicate that executives have a growing concern about cyber attacks of all stripes, but increasingly they are concerned with attacks on critical infrastructure.

The Industrial Control Systems Cyber Security Emergency Response Team (ICS-CERT) showed that critical infrastructure in the United States alone experienced a 20% spike in cyber incidents from 2014 to 2015. A study in 2016 commissioned by Wurldtech with YouGov found that over 50% of respondents said they expected to see more attacks on their OT systems in the next 12 months. Most assuredly, cyber security threats are real … and growing.

Digital technologies in industrial settings are enabling a whole new level of performance. The trend I’m seeing in the market is a focus on securing existing infrastructure – assets and equipment that has been in production for years, before security threats were even a discussion. Make no mistake, this is critical. However, there’s an assumption that new equipment being purchased have security built in. This is categorically false.

The pursuit of implementing new technologies to gain competitive advantages is overlooking the need for to ensure new assets are secure. Security is not something you can bolt on, it must be built in … and this is particularly true in the IoT space. Once an asset ships and is implemented, it can be extremely hard to update with security.

Question 2: Who Is Responsible for Implementing Cyber Security?

The “who” in this case is everyone. We all have a role to play in OT cyber security: Whether a person’s role is over people, process, or technology, we are all responsible for driving adoption and implementation.

From our perspective, business leaders need to be ultimately accountable, because OT is primarily a revenue driver — it runs production. That said, operational executives (such as VP of plant operations) should take ownership of cyber security initiatives, but with the understanding that they can’t do it themselves. Most progress is found where there is partnership between OT and IT to drive a holistic cyber security strategy.

In the June 2016 SANS Report, State of ICS Security, researches noticed an increase in roles who were taking ownership of OT security: “Once again this year the largest group of participants hold security administration/ analyst positions (29%). We also saw several encouraging new titles in the ‘Other’ responses, including ICS cyber security program manager, ICS security project manager, IT/OT (IT/operational technology) architect, and director of cyber security for building and facilities systems.”

This is definitely encouraging to see, and I hope this trend continues.

Question 3: What if IT Says They Have Security Covered?

By definition, IT security is focused on protecting information assets … aka data. OT cyber security is focused on protecting process controls, and the critical assets that are driven by those processes. The goal is to protect against unplanned downtime of a critical asset or process due to a cyber event. pro another way, OT is focused on operational assets, where cyber incidents can have physical consequences.

To be sure, loss of data is extremely important, but loss of operation impacts revenue, reputation, and potentially the safety of employees, or even the surrounding community or environment.

Importantly, when you’re protecting data in a traditional enterprise environment, you’ll use a certain set of IT security technologies—like a next-generation firewall, Web and email security, and data loss protection solutions.

But in OT, the tools and technologies are quite different, because the network communications, protocols, and end points are different than what you’ll see in an IT environment. The approach and technologies used to secure these assets must fit the job.

That said, working together, IT and OT can greatly minimize threat vectors that span data and processes.

More To Come

That’s a lot to digest, so I’ll leave here for now. Next time I’ll discuss talent, securing budget and concrete steps to take. 

security

Published at DZone with permission of Tom Le, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Enterprise Data Loss Prevention (DLP) Security Policies and Tuning
  • Security by Design: Building Full-Stack Applications With DevSecOps
  • How GitHub Copilot Helps You Write More Secure Code
  • Proactive Security in Distributed Systems: A Developer’s Approach

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!