Adopting IIoT, OT Security in 2022: Interconnectivity Makes Work Easier and Security Harder

Find out how to make interconnectivity work and avoid security pitfalls.

October 18, 2022

As the world shifted to remote work, many companies accelerated investments in large amounts of interconnected devices to continue their day-to-day business operations. These devices require enhanced security and extra attention to keep them secure. Stefan Schachinger, product manager of network security at Barracuda, discusses how many organizations aren’t making the proper investments in the industrial internet of things (IIoT) and operational technology (OT) security to keep pace with the current threat landscape, the uncertain geopolitical environment, and the evolving needs of their business as digitalization accelerates. 

According to Barracuda’s market report, The state of industrial security in 2022Opens a new window , over 90% of organizations surveyed experienced a security incident in the last year – with less than a third of those organizations acknowledging completion of IIoT and OT security projects. The silver lining here is that those that reported zero security incidents likely completed some IIoT/OT projects. This emphasizes that IIoT/OT projects seem to be effective. In a world where one attack can stifle or even completely disrupt business operations, organizations need to prioritize IIoT and OT security to ensure their assets are protected.

Challenges Implementing IIoT/OT Security Projects

As technology continues to evolve, the number of IIoT devices connecting to the internet is rapidly increasing. This shows that most organizations have plans or are implementing IIoT/OT security projects, with enterprise organizations leading the way over smaller businesses. However, these organizations face many challenges in doing so – primarily connectivity and scalability issues. 

The healthcare (both public and private), wholesale, oil and gas, agriculture, forestry and fishing industries are experiencing these challenges firsthand. Other interconnectivity security roadblocks involve long implementation times, lack of technical knowledge, high costs, dealing with legacy infrastructure and different vendors, level of security provided by the solution itself and lack of control over external devices joining the network. 

Implementation challenges often lead to failed IIoT/OT security projects.

See More: Why OT Environments Are Getting Attacked And What Organizations Can Do About It

Protect Infrastructure by Stopping Lateral Movement

Intelligent systems connect everything – control systems, sensors, machinery and more—responding to product demands, enabling real-time optimization of supply chain and manufacturing production networks. Increased connectivity has also exposed formerly isolated systems to the inherent dangers posed by the internet.

Devices that were once considered “safe by design” or simply not “worthy” of being hacked have become much more appealing to today’s threat actors. Changing out devices with newer and safer models is not always an option; today’s organizations have way too many devices deployed to make this a reality. Upgrading device firmware isn’t always possible, either. 

Micro-segmentation is the best practice to mitigate the impact of an incident. Isolating potentially vulnerable network devices and only allowing legitimate network traffic is essential to stop lateral movement when an attack hits infrastructure. This involves implementing segmentation between IT and OT and introducing additional segmentation (micro-segmentation) on the OT network, providing the best possible protection by isolating every single device or small groups of devices.

Besides micro-segmentation, organizations should keep the infrastructure and devices fully patched and up-to-date. Security updates can be done manually and internally or via automation through a third-party service provider or a device manufacturer. Every IIoT device also needs a firewall to provide full security and connectivity to industrial control systems, connecting operational technology networks with information technology networks. 

Remote Access Security Requires Robust Security and Authentication

Organizationally, internal and external users access OT environments remotely. This frequent use of remote access mechanisms requires strong security, highly performing endpoint devices and multifactor authentication (MFA) measures. However, many organizations that allow full network access don’t have MFA in place. The state of industrial security in 2022 report found that less than 20% of organizations restrict network access and have MFA in place for remote access into OT networks. This situation should never happen in critical sectors and should be addressed immediately.

Given the sensitive nature of these environments, organizations should take every precaution to keep them as secure as possible. IIoT/OT projects for remote access should use Zero Trust solutions that include MFA as a preferred solution, VPN or SSL-VPN where necessary and only with network traffic inspection and access restrictions. Host access to RDP or other screen sharing tools should be avoided – especially given the implications if their devices are compromised.

The Public Cloud is not a Security Risk

The adoption of the public cloud is widespread in some industries but is still being worked on in others. In the government sector, where the use of IIoT tends to be for managing critical infrastructure, the use of the public cloud is very high. Healthcare, mining and metals, agriculture, forestry and fishing, biotechnology, chemicals and pharmaceuticals, and wholesale verticals are on the other end of the spectrum.

Companies using the public cloud are more willing to adopt new technology and edge computing and invest in security. 

IIoT/OT Security is Vital 

In today’s uncertain geopolitical environment, people and organizations are highly concerned with potential cyberattacks – everything from web application attacks to distributed denial-of-service (DDoS) attacks and everything in between. Just one successful supply-chain attack can have wide-reaching, catastrophic impacts. 

The high level of incidents stresses the need for IIoT/OT security in every sector – to adequately protect all organizations. Unfortunately, IIoT/OT security currently requires a lot of improvement.

Effective solutions to IIoT security challenges are out there – secure endpoint connectivity devices and moderate network firewalls – centrally managed and deployed through secure cloud services. And they’re enabling effective network micro-segmentation and advanced threat protection while providing MFA and implementing Zero Trust Access.

Not without hurdles, IIoT/OT security projects can effectively protect organizations and should be prioritized. 

How do you tackle your interconnectivity security issues and enable IIoT/IoT growth? Share with us on FacebookOpens a new window , TwitterOpens a new window , and LinkedInOpens a new window .

Image Source: Shutterstock

MORE ON IIOT AND OT Security 

Stefan Schachinger
Stefan Schachinger

Product Manager Network Security, Barracuda

Stefan Schachinger has been working with Barracuda in Innsbruck, Austria since 2013 and is currently the Product Manager of Network Security. Prior to Barracuda, Stefan was Project Manager and IT Security Consultant for a managed service provider, and he holds a BSc and MSc in Information Technology and Information Security from the University of Applied Sciences Technikum Wien in Vienna.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.