ICS security in the cloud age
ICS security in the cloud age
Critical infrastructures are not operating in a vacuum anymore. The emergence of the cloud, and the increasing necessity to integrate IT and OT systems, to further boost production or improve processes using analytics, for instance, has accelerated both the IT/OT convergence and the use of modern IT cloud infrastructures to support ICS/OT systems. This has obvious security implications. The increasing attack surface due to the remote connectivity of these traditionally air-gapped systems requires a fundamental change in how we design and deploy these systems to make them as secure as possible from the outset.
Introduction
Industrial control systems (ICS) have been traditionally built as stand-alone, air-gapped systems, non-reliant or connected to the external world. This, however, has become impractical in an interconnected world, where services and resources can no longer be centralized. Telemetry and data traveling to and from these systems is justified by a number of business and technical imperatives. Some examples include security integrations and monitoring, application updates, or inventory and configuration management.
There is obviously a flip side to the increasing connectivity. Adversaries can take advantage of the widening attack surface introduced by these communication channels. In many reported incidents, attackers first gain access to the IT networks or exploit third-party suppliers before a subsequent pivot into the ICS/OT networks. The SANS/Nozomi Networks report, 'The State of ICS/OT Cybersecurity in 2022 and Beyond'1 has concluded that the ‘IT business network remains a common initial intrusion point for adversaries’.
It is then necessary to leverage guidance from the community and leading standards bodies in cybersecurity, such as NIST, or the IEC, to secure increasingly connected networks and systems. IriusRisk implements the IEC 62443, parts 3-3 and 4-2, to help automate the security requirements of ICS environments and their surrounding ecosystems.
Remote connectivity and the XaaS model
Remote connectivity is not intrinsically bad. If done well, it can even contribute to improving the security posture, e.g., remote telemetry monitoring from an outsourced security service provider. What remote connectivity and the XaaS (anything as a service) model do is essentially provide an additional hacking path from the IT network or the cloud to the industrial network. When this is not correctly done, it is indeed potentially devastating.
Weaknesses and vulnerabilities found on the cloud or the corporate information system, coupled with an insufficiently isolated industrial network, can then potentially allow an attacker to pivot and gain a foothold into the critical industrial system. A report from Positive Technologies on attack vectors in industrial systems concluded that ‘ICS security hinges on the effective administration of the network and network equipment’2.
The potential benefit, however, is growing more apparent every year and has outweighed the potential risk. Data analytics, optimization algorithms, advanced security processes, and advanced support and maintenance services, have all been good incentives for critical infrastructure operators to allow for and support external connectivity. All of the major cloud providers have already introduced solutions specifically tailored to industrial automation, although they can be sometimes marketed as IoT given the prevalence of the Internet of Things in every aspect of life nowadays, beyond industrial automation. Some examples include AWS for Industrial3, Azure Industrial IoT4, or the Google Cloud IoT core5.
What security guidelines?
Cloud providers can offer significant advantages in terms of security, where some of the responsibilities can be shifted6, and more internal resources are allocated to securing in-house assets, networks, and external connectivity. Based on the findings of the above-mentioned reports, more focus should be put on securing the network integration and the perimeters.
Two standard families are specifically tailored for industrial automation and control systems; the IEC 62443 and the NIST 800-82. The following table presents these standards, their scope, and how they help secure OT environments and networks. The non-ICS parts might each have specific security needs incorporating additional provisions about cloud-based security for instance. Some example standards and frameworks for IT and cloud environments include the ISO 27001/27002 series7, the NIST Cybersecurity Framework8, and the CSA (Cloud Security Alliance) guidance9.
Conclusion
While cloud integration and the IT/OT convergence trends have immense potential to improve industrial processes, there are still significant barriers to its secure implementation. We believe there is a need to shift the security left for an effective merging and integration of ICS's traditionally siloed networks and processes.
IriusRisk is uniquely positioned to assess the ICS system security, against the IEC 62443 standard series, as well as the risk and extended attack surface associated with its external connectivity with IT and cloud environments. The platform offers all the necessary guidance for this inevitable path ahead of ICS systems deployments.
References
- https://www.nozominetworks.com/downloads/US/SANS-Survey-2022-OT-ICS-Cybersecurity-Nozomi-Networks.pdf
- https://www.ptsecurity.com/upload/corporate/ww-en/analytics/ICS-attacks-2018-eng.pdf
- https://aws.amazon.com/industrial/
- https://azure.microsoft.com/en-us/solutions/industry/manufacturing/iot/
- https://cloud.google.com/iot-core
- https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility
- https://www.iso.org/isoiec-27001-information-security.html
- https://www.nist.gov/cyberframework
- https://cloudsecurityalliance.org/research/guidance/
- https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards
- https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
- https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/draft
- https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final