{"id":7472,"date":"2014-11-25T06:00:44","date_gmt":"2014-11-25T14:00:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7472"},"modified":"2015-10-07T15:23:53","modified_gmt":"2015-10-07T22:23:53","slug":"2015-predictions-securing-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/11\/2015-predictions-securing-industrial-control-systems\/","title":{"rendered":"2015 Predictions: Securing Industrial Control Systems"},"content":{"rendered":"<p><em>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2015-predictions\/\" target=\"_blank\">here<\/a>.)<\/em><strong>\u00a0<\/strong><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7442 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg\" alt=\"2015 Predictions Image-01\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-510x300.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Recent years have made Industrial Control Systems (ICS) cybersecurity a very dynamic area, and 2014 was no different. While much progress is left to be made, some milestones like the announcement of the release of version 1.0 of the NIST Framework, show the encouraging progress industry has made in making critical infrastructure protection top of mind.<\/p>\n<p>Other milestones, such as the new and sophisticated APT campaigns targeting ICS, remind us that the bad guys are constantly expanding their capabilities in going after critical infrastructure assets. \u00a0We have also seen more IT-OT integration around mobility and virtualization, technologies that in the past were typically considered too unproven for OT environments.<\/p>\n<p>With the year almost behind us, it is interesting to peer into 2015 to anticipate if and how some of the trends will persist and evolve. Hopefully organizations will consider what kind of security capabilities might be needed to improve control systems security posture as well as operational efficiency. \u00a0Here then are three predictions I think end users will want to pay attention to in 2015:<!--more--><\/p>\n<p><strong>1.\u00a0Projects to Virtualize OT Datacenters Pick Up Steam<\/strong><\/p>\n<p>Up until early 2014, most OT information systems managers I informally surveyed knew of plans to virtualize the corporate datacenter, but had no plans of their own to do the same for operational data centers.\u00a0 In fact, most organizations were vehement in their position to never virtualize these environments, which house critical applications such as MES, EMS, Historians, SCADA Masters and similar automation servers.<\/p>\n<p>There was quite a bit of nervousness around the stability and performance of\u00a0 applications sitting on multiple virtual machines sharing a hypervisor and hardware resources. But starting in the early part of 2014 I started to hear a different view where virtualization became something organizations were \u201clooking at\u201d and for which they even had pilot programs in the works. To be sure, there are already organizations that have virtualized servers in the automation environment.\u00a0 Manufacturing, for example, where the cost pressures are very extreme, has already begun the transformation and started to reap cost and efficiency advantages. But in 2015, I expect more use of this technology even in critical infrastructure environments such as utilities and transportation.<\/p>\n<p>Many organizations segment their operational datacenters off from other networks\/zones within the control center or PCN. With virtualized environments security architects need to now also consider the traffic between virtual machines -- the so-called east-west traffic. \u00a0Maintaining security for virtualized environments could also be quite a burden and organizations need to find solutions that reduce the administrative effort around securing VMs particularly in the effort to ensure that security implementations maintain their integrity as virtual machines get moved around. What\u2019s more, the solution for the virtualized environment should also follow the same framework and management platform as devices for securing the non-virtualized assets.<\/p>\n<p><strong>2. Growing Use of Mobility for HMI and Big-data Applications<\/strong><\/p>\n<p>Earlier in November, I saw a really cool demo from a vendor of solutions for \u201cDigital Oilfields.\u201d\u00a0 The demo involved the use of augmented reality glasses and a tablet device by onsite field personnel to identify assets in the oil field, monitor processes and adjust the control systems, e.g. tuning set points on PLCs. The immediate access to information and the process was very compelling. It made workers more efficient and reduced the risk of errors.<\/p>\n<p>Besides Oil and Gas, mobility solutions are also appearing in other industries such as manufacturing and utilities.\u00a0 Some service providers are also increasing their push of mobility solutions. While there are some valid security risks, the benefits of mobility in terms of providing on-demand access to important information and the ability to apply controls while on the go are just so compelling that it is only a matter of time before these technologies become widely used.<\/p>\n<p>With mobile technologies on hand several new security considerations come to the surface.\u00a0 Are these mobile devices configured properly and are they being used only in business-related ways?\u00a0 Can threats, even zero day threats, introduced via mobile devices be detected and stopped? These are just a couple of considerations when organizations introduce mobility to the automation environment.\u00a0 A solution must be able to not only extend the fixed-environment security to the mobile environment but also be able to secure the new risk vectors that come with a mobile use model.<\/p>\n<p><strong>3.\u00a0The Emergence of General Purpose ICS Exploit Kits with Programming Capabilities<\/strong><\/p>\n<p>Stuxnet already showed that ICS components, e.g. centrifuges, can be damaged via cyberattacks, but that was a very targeted campaign tailored for a specific environment.<\/p>\n<p>But consider the trajectory of a couple of 2014 APTs targeting ICS, including Energetic Bear which used trojanized malware and common ICS protocols, and even Black Energy which used exploits specific to HMI software, and I believe 2015 will bring availability of a general-purpose and commercially-available ICS exploit kit that can be used to control processes, essentially lowering the hurdle for cyberphysical attacks. This will result in some headlines; such a kit would no doubt be used by actors to successfully manipulate an industrial process.\u00a0 As usual, the attack will rely on social engineering techniques and a zero day exploit or two to be successful. With that in place it will then enumerate, monitor and control ICS assets using ICS protocols.<\/p>\n<p>I won\u2019t not feel bad if that prediction doesn\u2019t come to fruition -- I certainly hope I\u2019m wrong. The main message here is the bad guys are getting more sophisticated and organizations need to up their game when it comes to defending industrial control systems against these advanced threats. \u00a0Many operators I talk to still have nothing in place to combat advanced threats and are just not aware of the options.\u00a0 Asset owners really need to revisit their posture to not only detect but also prevent advanced attacks.<\/p>\n<p><strong>Securing ICS in 2015 and Beyond with a Platform<\/strong><\/p>\n<p>As organizations look to revamp their cybersecurity programs for the new year and beyond, an important question is what kind of capabilities are required to better secure ICS and why?\u00a0 We\u2019ve touched on several requirements already, but there are other important ones not covered.\u00a0 In speaking with Mario Chiock, former CISO of Schlumberger and current executive advisor for next generation security and technology Executive, we felt this question to be so important that we decided to collaborate on a white paper titled \u201cDefining the 21<sup>st<\/sup> Century Cybersecurity Platform for ICS\u201d.\u00a0 You can access the whitepaper here today.\u00a0 Here we take a look at several important topics including:<\/p>\n<ul>\n<li>The drivers for improving security in ICS including the nature of advanced threats<\/li>\n<li>The definition of a platform including the 9 key capabilities of a 21<sup>st<\/sup> century ICS security platform<\/li>\n<li>Why these capabilities are important as they pertain to improving security and operational efficiency and key things to look for when selecting a platform<\/li>\n<li>How a 21<sup>st<\/sup> century security platform helps with implementing the NIST Cybersecurity Framework<\/li>\n<li>A self-assessment checklist for decision makers to review as they plan their next generation ICS security architecture.<\/li>\n<\/ul>\n<p>I hope you have a chance to check it out.<\/p>\n<p>With that, I\u2019ll leave you with one last thought which is a quote from Mario Chiock who says, \u201cIt is impossible to stop advanced threats with legacy security.\u00a0 You need a 21<sup>st<\/sup> Century Security Platform to Defend against 21<sup>st<\/sup> Century Threats.\u201d<\/p>\n<p>Have a happy, prosperous and secure 2015!<\/p>\n<p>&nbsp;<\/p>\n<p><em>Securing Industrial Control Systems<\/em>\u00a0<em>is among many focus topics at <a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite 2015<\/a>, where you will tackle your toughest security challenges, get your hands dirty in one of our workshops, and expand your threat IQ.\u00a0<a href=\"https:\/\/ignite2015.paloaltonetworks.com\/portal\/createAccount.ww\" target=\"_blank\">Register now<\/a> to join us March 30-April 1, 2015 in Las Vegas \u2014 the best security conference you\u2019ll attend all year.<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"PAN_IC15_web_logo-1\" width=\"500\" height=\"138\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 &hellip;<\/p>\n","protected":false},"author":46,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[229,566],"tags":[925,921,93],"coauthors":[693],"class_list":["post-7472","post","type-post","status-publish","format-standard","hentry","category-predictions","category-scada-ics","tag-2015-predictions","tag-mario-chiock","tag-stuxnet"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7472"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7472\/revisions"}],"predecessor-version":[{"id":7474,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7472\/revisions\/7474"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7472"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}