Over the past year, cyberattacks on cyber-physical systems (CPS) have cost organizations around the world at least $500,000, highlighting the growing financial and operational risks of compromised security. As artificial intelligence (AI) continues to emerge as a key driver in nearly every sector, the need for trustworthy, secure data becomes even more crucial. To address these challenges, new guidance from U.S. and allied agencies offers critical insights on designing and managing secure operational technology (OT) environments, urging organizations to implement best practices for OT security.
The Growing Threat to Cyber-Physical Systems
Cybersecurity professionals are well aware of the significant threats posed by cybercrime and advanced cyberattacks targeting cyber-physical systems (CPS) – systems that integrate IT and OT components. These attacks, whether state-sponsored or carried out by criminal groups, have increasingly focused on operational technology (OT), the Internet of Things (IoT), connected medical devices (IoMT), and building management systems (BMS). The consequences of these attacks are far-reaching, disrupting critical processes, delaying service delivery, causing data loss or manipulation, and impacting everything from patient care and public safety to national security.
Recent attacks have highlighted the severity of these threats. Advanced persistent threats (APTs) like Russia’s Sandworm group and Iran’s Revolutionary Guard Corps have publicly attacked critical infrastructure, including electricity grids in Ukraine and water treatment facilities in the U.S. and Israel. In the healthcare sector, ransomware continues to be a persistent threat, with hospitals being targeted by malicious actors seeking to hold patient data and medical devices hostage for ransom. A high-profile example is the Change Healthcare attack in February, which underscored the vulnerability of healthcare delivery organizations (HDOs) to these kinds of cyber threats.
Bridging IT and OT: A Strategic Imperative for the Digital Age
As industries increasingly adopt IoT technologies, the convergence of IT and OT is no longer optional but a strategic necessity. I have previously noted that while IT and OT have traditionally operated in silos, the adoption of IoT forces organizations to integrate the two domains to address the challenges of the modern industrial landscape. IoT systems tie IT and OT together, requiring collaboration across previously separate management functions.
Effective cybersecurity in OT environments requires a mix of skills and knowledge from both IT and OT teams. This includes professionals from IT infrastructure and cybersecurity, as well as control system engineers, field operations staff, and asset managers typically found in OT. The collaboration between these diverse groups is essential to support effective OT cybersecurity practices and ensure the security of IoT systems without compromising their speed or flexibility.
New Security Challenges: IoT, AI, and the IT-OT Convergence
The integration of IT and OT through advanced IoT protocols represents a major step forward in securing industrial and healthcare systems. However, this integration introduces significant challenges. I propose a new approach to IoT security that incorporates protocol-agnostic application layer security, lightweight cryptographic algorithms, dynamic key management, and end-to-end encryption, all based on zero-trust network architecture (ZTNA). This approach aims to address both security and efficiency needs in IoT environments, helping bridge the gap between IT and OT systems while maintaining robust protection.
Key components of this approach include:
- Application Layer Security: Signing and optionally encrypting data at the application layer prior to transmission protecting data through multi-node or mesh networks persistently.
- Lightweight encryption to secure data with minimal computational resources.
- Dynamic key management to adapt to constantly changing environments.
- Zero-trust architecture to authenticate every action taken within the network.
By implementing these advanced protocols, organizations can protect both IT and OT systems from external threats while enabling the secure flow of information necessary to fully leverage AI. This integration not only improves security but also optimizes performance, driving greater efficiency and innovation across industries.
Protecting Critical Infrastructure: A Priority for Business Continuity
A recent report, The Global State of CPS Security 2024: Business Impact of Disruptions, underscores the importance of cybersecurity for critical infrastructure organizations. These organizations provide vital services – including water, energy, and transportation – and rely heavily on OT to manage the physical equipment and processes that sustain these services. Therefore, the continuity of these services depends on ensuring the cybersecurity and safety of OT systems.
In light of this, it’s crucial that organizations adopt a security-first approach to the management of both IT and OT. Durand’s proposed IoT security strategy offers a pathway for securing these systems without compromising performance. By using app-level security, lightweight encryption, and dynamic key management, combined with zero-trust architecture, companies can safeguard both internal operations and external communications, ensuring the integrity and safety of critical services.
Overcoming Challenges and Avoiding Pitfalls in Merging IT and OT Management
According to the principles of operational technology cyber security, integrating IT and OT management comes with its own set of challenges. A key strategy for overcoming these challenges is to foster a cyber-safe culture among staff at all levels. This can be achieved by:
- Incorporating cybersecurity into safety assessments, factory acceptance testing (FAT), site acceptance testing (SAT), and the engineering change management process.
- Creating environments that encourage staff to identify and report suspicious behavior, ensuring that field operators are conditioned to consider the possibility of cyber compromise when operational faults occur.
In OT environments, remediation steps must go beyond traditional IT responses. While many IT security measures reset communication links and wipe volatile memory to prevent further compromise, additional processes are needed for identifying, classifying, and investigating cyber threats in OT systems. Furthermore, organizations can benefit from creating unified governance structures and cross-training programs that align the priorities of IT and OT teams. Balancing security with operational uptime is critical, especially as industries increasingly rely on IoT and AI to drive innovation and efficiency.
Conclusion: The Future of IoT Security in the Age of AI
The convergence of information technology (IT) and operational technology (OT) is no longer a theoretical challenge but a pressing reality that is fundamentally transforming industries across the globe. As the Internet of Things (IoT) and other advanced technologies continue to evolve, they are driving profound changes in how businesses operate, manage critical assets, and deliver services. This integration offers significant opportunities for increased efficiency, automation, and innovation, but it also introduces a new set of risks and complexities that organizations must address.
To successfully navigate this evolving landscape, organizations must prioritize the adoption of robust security frameworks and advanced cybersecurity protocols that can safeguard both IT and OT systems from an increasing array of cyber threats. At the same time, fostering a culture of collaboration between traditionally siloed IT and OT teams is essential for ensuring seamless integration and effective risk management. Encouraging cross-functional collaboration and shared knowledge will help break down barriers and align stakeholders toward common goals, ultimately leading to more resilient and adaptive operational environments.
Moreover, as artificial intelligence (AI) continues to play a pivotal role in driving automation and operational efficiencies, the secure convergence of IT and OT will be critical to unlocking the full potential of these technologies. AI-driven insights, predictive maintenance, and real-time monitoring offer unparalleled opportunities to optimize performance, reduce downtime, and improve decision-making across industries. However, these advancements must be underpinned by strong security practices to protect the integrity of critical infrastructure and sensitive data.
In conclusion, the successful integration of IT and OT is not only a technological imperative but also a strategic necessity for organizations seeking to thrive in the digital age. By embracing comprehensive cybersecurity strategies, fostering collaboration, and leveraging the full capabilities of emerging technologies like AI, businesses can harness the benefits of this convergence while mitigating risks and safeguarding the long-term sustainability of their operations.