Build security boundary and leverage existing technology investments to enhance industrial cybersecurity

leverage

Global industrial connectivity supplier Moxa, distributed in Australia by Madison Technologies, introduces the defence-in-depth concept that allows businesses to leverage their existing network infrastructure and investment to build the first line of their network defence. 

The rise of interconnected OT and IT systems is often attributed to how business models have evolved with the purpose of enhancing operational efficiency. For example, SCADA networks deployed along oil pipelines now collect oil output data that is essential to billing and pricing systems. 

This increase in data collection allows companies to predict with higher levels of accuracy not only levels of oil production and output, but also expected revenue. However, it should be noted that these interconnected systems do not only bring benefits. A downside of these systems is that the likelihood of introducing cybersecurity threats to OT systems increases significantly. It is for this reason that newspaper headlines and articles often describe how the compromising of IT systems can have a hugely negative impact on OT systems. What is compounding this complex issue even further is that ransomware attacks are increasing in their severity. This type of malware exploits Windows vulnerabilities and attacks insufficiently protected systems.  

With more and more similar cybersecurity incidents occurring in OT systems,  business owners and regulators are keen to seek solutions that enhance industrial cybersecurity and allow businesses to keep functioning normally. 

Security Boundary 

What Is the Security Boundary Concept? 

When enhancing cybersecurity, it is important to understand how your industrial systems are exchanging data within different systems and how they  connect to IT-level systems. In the most ideal scenario, when traffic crosses different systems, there should be boundaries in place between each system to ensure the traffic has good cyber-hygiene, even if it is authenticated and authorised. However, it is challenging, and often unrealistic to build boundaries between every system, as it involves significant expenditure, and often has a detrimental effect to the efficiency of network communications. It is for these reasons that it is highly recommended to divide OT systems into different digital cells and zones and build up the boundaries to find the right balance between expenditure and acceptable levels of risk. 

Building security boundaries to protect production lines without impacting each other when cybersecurity incidents occur

The defence-in-depth approach, which is recommended by the IEC 62443 cybersecurity standard committee, is widely used across industries, and has a good track record of helping build up multiple layers of protection to fulfil operational requirements. In the picture below, the critical assets and operations are considered the most important. As they perform vital roles for businesses, it is wise to take additional security precautions, such as adding more layers of protection, to secure them further. 

The defence-in-depth security concept is based on multiple layers of security mechanisms that increase the security of the entire system.
Network Segmentation 

Physical layer segmentation 

This is known as air gapping, when two networks are physically isolated. When the operations and security of one system needs to be independently maintained, an air gap is a potential solution. However, as mentioned earlier, it is increasingly difficult to arrange networks this way due to business and operational requirements. 

Data link/network (Layer 2/Layer 3) segmentation 

As industrial control systems may have been built decades ago, one of the key challenges, but also essential requirements for network administrators, is to leverage existing infrastructure while ensuring industrial control systems remain secure. One approach that is frequently deployed is to segregate traffic between different network segments using a VLAN (Virtual LAN), which is one of the functions of managed Ethernet switches. Some Ethernet switches feature Access Control Lists (ACL) at the port level, which can help improve VLAN security as data enters the switch. An alternative is to deploy firewalls to protect industrial applications and data especially when you need to deal with traffic on Layer 2 and Layer 3 networks. 

Layer 4-7 network segmentation 

Further segmentation can be applied through Deep Packet Inspection (DPI). DPI offers granular control over network traffic and helps you filter industrial protocols based on the requirements of the application. When you have multiple devices on the same network, theoretically, the devices can   communicate with each other. However, there are certain scenarios, when for example, Controller A should only communicate with Robotic Arm A at a specific time, then DPI technology can help engineers to define which controllers can perform read/write commands or even the direction of traffic. 

Micro-segmentation 

In some situations, additional protection for critical assets is necessary, and a good way to achieve this is to use an intrusion prevention system to micro segment the network. What makes micro-segmentation particularly helpful for industrial networks is that it can be used to segregate the network into even smaller sub-networks. What is beneficial about this approach is that the virtual patch function of an IPS can help mitigate the risk of known vulnerabilities. For example, some systems might be operating on Windows XP, which Microsoft does not provide security updates for anymore. Under this scenario, even though there are known vulnerabilities, it may not be feasible to perform security updates. 

Secure Remote Access 

According to cybersecurity experts, remote desktop protocols are sometimes exploited to spread malware or conduct unauthorised activity. As remote connections have become more and more prevalent due to the necessity of increasing operational efficiency and the need to perform troubleshooting quickly, it is unsurprising that building security boundaries between two field sites is being talked about more frequently. Instead of using software to build the remote connections, which can easily lead to vulnerabilities in the long term, it is highly recommended to build VPN tunnels and ensure that access control mechanisms are maintained properly. 

As business owners are no longer able to enjoy the benefits and security of completely air-gapped networks, it is imperative for business owners and engineers to enhance security boundaries through different approaches including network segmentation, micro-segmentation, and secure remote access. Each of these approaches fulfills different network requirements and helps enhance cybersecurity not just forming the perimeter protection but also  preventing lateral movement of unauthorised traffic. Moxa’s newly launched EDR-G9010 Series, an all-in-one firewall/NAT/VPN/switch/router, enhances cybersecurity while allowing business owners to leverage existing network infrastructure with some future- proof investments.   

To learn more about how to leverage your existing network infrastructure to enhance your cybersecurity, visit www.madison.tech/moxa or phone 1800 72 79 79 to speak with Madison Technologies’ Customer Connect team.