Top 10 Guidelines to Address Operational Technology Vulnerabilities in Critical Infrastructure Organisations

22nd June 2016

Top 10 Guidelines to Address Operational Technology Vulnerabilities in Critical Infrastructure Organisations

Fortinet – the global leader in high-performance cybersecurity solutions, states that almost 80 percent of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as software misconfigurations from human error and malfunctioning network protocols. Critical infrastructure industries in particular, such as utilities, transportation and natural resource producers, together with the communities and economies they serve, face not only particularly damaging outcomes from cyber security attacks, but also need to deal with significant complexity due to the scale of their operations.

“Organizations across multiple industries today face an evolving threatscape and growing pressure to rethink security strategies for long-term sustainability. A more holistic security approach is required to protect against intentional targeted attacks as well as human error from internal sources,” said Hutton. “Solving ICS (industrial control systems) security issues requires a solution that unifies the best of current OT network security capabilities with an extensive understanding of ICS processes and protocols.”

The machines and technology used to manage and run hydropower dams, oil and gas companies and other infrastructures were never designed to be connected to remote or public networks. As these systems were isolated and physical access often restricted, information security has never been accorded the highest priority.

“But with emergence of Industry 4.0, these environments are now interconnected. Proliferation of open standard and off-the-shelf hardware and software also increases their vulnerability. This means that industrial control systems (ICS) now have a wider footprint for attack,” explained Hutton.

As organizations cannot predict every threat, they must then focus on what they can control. Fortinet has recently issued Top 10 guidelines to help local companies assess their operational technology (OT) vulnerabilities: