0% found this document useful (0 votes)
100 views10 pages

A Guide To Critical Infrastructure Protection

Uploaded by

Clayton Magno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views10 pages

A Guide To Critical Infrastructure Protection

Uploaded by

Clayton Magno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

| A Guide to Critical Infrastructure Protection

WHITE PAPER

A Guide to Critical
Infrastructure
Protection
Understanding the processes and technologies
essential to managing modern-day cybersecurity

1
| A Guide to Critical Infrastructure Protection

SECTION 1.0

Introduction
It’s been a decade since Stuxnet put critical infrastructure cybersecurity on the map. Since then, all 16 critical infrastructure
sectors identified by the U.S. Department of Homeland Security have been forced to adapt to the new normal of maintaining
mission-critical operations and business continuity under constant threat of cyberattack.

Despite the expanded focus on risk reduction, including advanced technology implementation, employee training and the
adoption of enforceable industry and federal security regulations such as NRC, NERC-CIP and HIPAA, attacks targeting critical
infrastructure sectors continue to accelerate in both complexity and frequency. In 2018, 90% of professionals in industrial
control system (ICS) and operational technology (OT) environments reported that their organizations had been negatively
impacted by at least one cyberattack in the past two years, according to the Ponemon Institute.

The control systems that act as the “brain” within mission critical environments are both inherently and increasingly
vulnerable to actions of nation state threat actors, hacktivists and insider threats. Unlike Fortune 500 companies, attacks on
critical infrastructure are sometimes, but not always motivated by financial gain. Reputational and operational disruption, as
well as fear, nation-state espionage, antipathy and ideology are often the drivers.

Within critical infrastructure sectors, cyber risk is most commonly amplified by:

▪ Flawed IT/OT integrations


▪ Complexities of legacy SCADA systems
▪ Lack of asset visibility
▪ Insufficient number of skilled workers
▪ Ineffective people, process and technology policies
▪ Inadequate or unenforced remote worker and bring-your-own-device (BYOD) policies

In far too many situations, more than one of these vulnerabilities is present, threatening the systems that inherently run our
day-to-day lives.

Published August, 2020

2
| A Guide to Critical Infrastructure Protection

SECTION 2.0

Critical Infrastructure Protection ­–


Trust No File. Trust No Device.™
With the proliferation of zero-day attacks and the rapid expansion of the attack surface, to say CIP cybersecurity
professionals are extraordinarily busy is an understatement. To help prioritize workload and mitigate backlogs, both current
and prospective workers must be efficient in the responsibilities and technical proficiencies most applicable to critical
infrastructure environments.

Such responsibilities include, but are not limited to:

Creating and maintaining Ensuring proper device Disarming content that has
secure data exchange posture checks to determine potential for carrying malware
processes between which devices can access from application files or
segregated networks which organization assets emails
and segregated networks

A summary of the 11 technologies required to protect your critical infrastructure is provided on the following pages.

3
| A Guide to Critical Infrastructure Protection

Critical Infrastructure Protection Technology - Trust No File.™

Deep CDR Proactive DLP


Content disarm and reconstruction Data Loss Prevention (DLP) technology
(CDR) breaks a file into its smallest is used to detect and block financial
components and removes any and or personally identifiable information
every potential threat. The technology (PII). Rather than blocking files and
scrubs away hidden files or messages leaving teams high-and-dry, Proactive
maliciously embedded within any file DLP technology suppresses sensitive
type, leaving the final disarmed file information with automatic document
to look and behave exactly as the file redaction, metadata removal, or
should. watermark addition.

Multiscanning File-based Vulnerability


Multiscanning technology provides This technology detects application and
advanced threat detection and file-based vulnerabilities before they
prevention. Multi-scanning exponentially are installed. It allows organizations
increases malware detection rates, to correlate vulnerabilities to software
decreases outbreak detection times, components, product installers,
and provides resiliency to anti-malware firmware packages, and many other
vendor issues by deploying up to 30 anti- types of binary files which are commonly
malware engines. collected from a vast community of
users.

Threat Intelligence Sandbox


Effectively and intelligently analyzing Due to the criticality of maintaining
patterns of malicious content is operational efficiency in critical
paramount to preventing outbreaks or infrastructure environments, sandboxes
stopping them in critical infrastructure are often used to run third-party software
environments. Threat intelligence and untested code as a means to reduce
technology analyzes data from risk. This allows CIP cyber pros to test
thousands of devices, analyzing data content without giving it access to
points for binary reputation, vulnerable mission critical networks and servers.
applications, malware analysis reports,
Portable Executable or PE info, static
and dynamic analysis, IP/URL reputation
and, most importantly, the correlations
between them.

4
| A Guide to Critical Infrastructure Protection

Critical Infrastructure Protection Technology - Trust No Device.™

Endpoint Compliance Endpoint Vulnerability Assessment


Enables organizations to detect, assess Strengthens the security of endpoints by
and remediate device applications that confirming all applications are running
do not comply with a set of security on their most updated versions. Once
and operational policies created and vulnerabilities are identified, automatic
enforced. It helps to minimize the spread patching can remediate them as soon as
of a malware infection and decrease possible. This can also be done manually
the probability of data loss in the by retrieving the available remediations
organization. and choosing the update which best suits
the organizations’ needs.

Endpoint Malware Detection Endpoint Application Removal


Examines the running processes and Allows for the removal of security
their loaded libraries in order to provide applications like AV and firewalls as well
quick assessment of the endpoint and as the removal of potentially unwanted
to determine if any suspicious processes applications (PUA). It allows systems
are currently running. This is especially admins to prevent users from accessing
important for remote facilities with many some popular and legitimate applications
third-party visitors. that are not compliant with the work
environment

Data Protection BEC Attack Detection and Prevention


Incorporating removable media Increase threat detection rates up
protection, anti-keylogger and to 99%, and prevent BEC attacks by
anti-screen capture technologies, deploying an advanced email gateway
data protection technology helps security layer with zero-day prevention
organizations prevent data loss and file- technology. Deploy spam filtering
based attacks on endpoints. It does so and anti-phishing to protect against
by blocking users’ access to removable malware outbreaks.
media, such as USBs or smart phones,
or allowing access to only whitelisted
processes.

5
| A Guide to Critical Infrastructure Protection

SECTION 3.0

Effective Technology – and a


Well‑Trained Staff.
But perhaps no critical infrastructure protection (CIP) vulnerability is greater than the cybersecurity skills gap – an
unprecedented predicament at a time when there is projected to be up to 3.5 million open cybersecurity jobs worldwide by
2021, according to Cybersecurity Ventures.

Why is lack of people such a vulnerability? Within all 16 critical infrastructure sectors, the confidentiality, integrity
and availability of networks, systems and equipment is of the utmost importance. Unexpected downtime is not only
unacceptable, but it can be dangerous, destructive and costly. The same can be said for unauthorized access, as it can
be very difficult to find an adversary’s footprint and root them out once they have bypassed security controls and entered
into a system or network. ICS environments can also serve as a gateway into enterprise and government IT networks, which
frequently maintain incredibly sensitive IP, company and customer data, as well as classified national security information.

Simply put, it is because of such high stakes that critical infrastructure organizations need an abundance of qualified, highly-
skilled cybersecurity pros 24/7/365 to help identify, mitigate and remediate threats of all types.

Within critical infrastructure specifically, there is no universally accepted number of current or projected job openings;
however, an aging OT workforce of non-digital natives combined with the increase in threat frequency and sophistication
suggests that there’s no shortage of opportunities. In fact, a very basic search of Indeed and LinkedIn provides thousands of
open positions.

6
| A Guide to Critical Infrastructure Protection

SECTION 4.0

The CIP Cybersecurity Status Quo Can


No Longer Suffice
To date, several non-profit and company-driven certification and professional training courses have been introduced to
help educate aspiring CIP cybersecurity professionals and retrain the existing workforce with the skills necessary to protect
industrial environments from cyber threats. Unfortunately, such educational opportunities aren’t producing enough job-ready
workers or properly empowering those already in the workforce with empirical knowledge.

One reason is that many existing programs are sector specific. For example, the ISO 28000 certification is specific to the
supply chain, meaning that such distinction would be of little to no importance to a cybersecurity role in the energy sector.
Certifications that aren’t industry specific, like the Global Industrial Cyber Security Professional (GICSP), tend to focus too
much on concepts and theories and not enough on practical workforce training and development.

With demand for skilled critical infrastructure cyber pros at an all time high and growing, the cybersecurity industry
must evolve how it trains the future and existing workforce by focusing more on teaching the practical applications of
technologies, processes and procedures and less on abstract theory and concepts.

To prepare workers for a career in CIP cybersecurity and to help continuously educate existing workers, training programs
must evolve to focus on the practical processes and technologies, as well as interoperability with existing IT security
infrastructures, particularly access control.

The OPSWAT Academy provides a modern-day education and training program to help address the CIP cybersecurity skills
shortage through courses that promote the best practices and practical approaches successfully implemented in the most
secure critical infrastructure environments.

The Academy provides a comprehensive curriculum that is essential to a modern-day CIP cybersecurity training program.

7
| A Guide to Critical Infrastructure Protection

SECTION 5.0

OPSWAT™ CIP Cybersecurity Solutions


At OPSWAT™, our philosophy is Trust No File. Trust No Device.

OPSWAT offers a proven and comprehensive suite of products and services to manage a broad range of CIP use cases –
including Cross-Domain, File Upload, Secure Access, and Secure Storage. All OPSWAT Products are powered by the advanced
technologies covered in this guide. In addition to our industry-leading products, we also offer CIP training through the OPSWAT
Academy and cybersecurity readiness assessments delivered by our global team of experts.

To learn more about the OPSWAT Academy, visit opswat.com/academy and register for your first session.

Ready to take the next step in enhancing your critical infrastructure? Contact us at opswat.com/contact to learn more about
our solutions and how we can help take your cybersecurity protection to the next level.
| A Guide to Critical Infrastructure Protection

SECTION 6.0

About OPSWAT™
OPSWAT is a global leader in critical infrastructure cybersecurity that helps protect the world’s mission-critical organizations
from malware and zero-day attacks. To minimize the risk of compromise, OPSWAT Critical Infrastructure Protection (CIP)
solutions enable both public and private organizations to implement processes that ensure the secure transfer of files and
devices to and from critical networks.

More than 1,500 organizations worldwide spanning Financial Services, Defense, Manufacturing, Energy, Aerospace, and
Transportation Systems trust OPSWAT to secure their files and devices; ensure compliance with industry and government-
driven policies and regulations; and to protect their reputations, finances, employees and relationships from cyber-driven
disruption. OPSWAT. Trust no file. Trust no device.™

Cross-Domain File Upload Secure Malware


Solutions Security Access Analysis

Network
Storage Email For
Access
Security Security Developers
Control

Visit us on LinkedIn, Twitter, Facebook, and YouTube.

9
Trust no file. Trust no device.

©2020 OPSWAT, Inc. All rights reserved. OPSWAT, MetaScan, MetaDefender,


MetaDefender Vault, MetaAccess, the OPSWAT Logo, the O Logo, Trust no file,
Trust no device, and Trust no file. Trust no device. are trademarks of OPSWAT, Inc.
All other brand names may be trademarks of their respective owners.

You might also like