A Guide To Critical Infrastructure Protection
A Guide To Critical Infrastructure Protection
WHITE PAPER
A Guide to Critical
Infrastructure
Protection
Understanding the processes and technologies
essential to managing modern-day cybersecurity
1
| A Guide to Critical Infrastructure Protection
SECTION 1.0
Introduction
It’s been a decade since Stuxnet put critical infrastructure cybersecurity on the map. Since then, all 16 critical infrastructure
sectors identified by the U.S. Department of Homeland Security have been forced to adapt to the new normal of maintaining
mission-critical operations and business continuity under constant threat of cyberattack.
Despite the expanded focus on risk reduction, including advanced technology implementation, employee training and the
adoption of enforceable industry and federal security regulations such as NRC, NERC-CIP and HIPAA, attacks targeting critical
infrastructure sectors continue to accelerate in both complexity and frequency. In 2018, 90% of professionals in industrial
control system (ICS) and operational technology (OT) environments reported that their organizations had been negatively
impacted by at least one cyberattack in the past two years, according to the Ponemon Institute.
The control systems that act as the “brain” within mission critical environments are both inherently and increasingly
vulnerable to actions of nation state threat actors, hacktivists and insider threats. Unlike Fortune 500 companies, attacks on
critical infrastructure are sometimes, but not always motivated by financial gain. Reputational and operational disruption, as
well as fear, nation-state espionage, antipathy and ideology are often the drivers.
Within critical infrastructure sectors, cyber risk is most commonly amplified by:
In far too many situations, more than one of these vulnerabilities is present, threatening the systems that inherently run our
day-to-day lives.
2
| A Guide to Critical Infrastructure Protection
SECTION 2.0
Creating and maintaining Ensuring proper device Disarming content that has
secure data exchange posture checks to determine potential for carrying malware
processes between which devices can access from application files or
segregated networks which organization assets emails
and segregated networks
A summary of the 11 technologies required to protect your critical infrastructure is provided on the following pages.
3
| A Guide to Critical Infrastructure Protection
4
| A Guide to Critical Infrastructure Protection
5
| A Guide to Critical Infrastructure Protection
SECTION 3.0
Why is lack of people such a vulnerability? Within all 16 critical infrastructure sectors, the confidentiality, integrity
and availability of networks, systems and equipment is of the utmost importance. Unexpected downtime is not only
unacceptable, but it can be dangerous, destructive and costly. The same can be said for unauthorized access, as it can
be very difficult to find an adversary’s footprint and root them out once they have bypassed security controls and entered
into a system or network. ICS environments can also serve as a gateway into enterprise and government IT networks, which
frequently maintain incredibly sensitive IP, company and customer data, as well as classified national security information.
Simply put, it is because of such high stakes that critical infrastructure organizations need an abundance of qualified, highly-
skilled cybersecurity pros 24/7/365 to help identify, mitigate and remediate threats of all types.
Within critical infrastructure specifically, there is no universally accepted number of current or projected job openings;
however, an aging OT workforce of non-digital natives combined with the increase in threat frequency and sophistication
suggests that there’s no shortage of opportunities. In fact, a very basic search of Indeed and LinkedIn provides thousands of
open positions.
6
| A Guide to Critical Infrastructure Protection
SECTION 4.0
One reason is that many existing programs are sector specific. For example, the ISO 28000 certification is specific to the
supply chain, meaning that such distinction would be of little to no importance to a cybersecurity role in the energy sector.
Certifications that aren’t industry specific, like the Global Industrial Cyber Security Professional (GICSP), tend to focus too
much on concepts and theories and not enough on practical workforce training and development.
With demand for skilled critical infrastructure cyber pros at an all time high and growing, the cybersecurity industry
must evolve how it trains the future and existing workforce by focusing more on teaching the practical applications of
technologies, processes and procedures and less on abstract theory and concepts.
To prepare workers for a career in CIP cybersecurity and to help continuously educate existing workers, training programs
must evolve to focus on the practical processes and technologies, as well as interoperability with existing IT security
infrastructures, particularly access control.
The OPSWAT Academy provides a modern-day education and training program to help address the CIP cybersecurity skills
shortage through courses that promote the best practices and practical approaches successfully implemented in the most
secure critical infrastructure environments.
The Academy provides a comprehensive curriculum that is essential to a modern-day CIP cybersecurity training program.
7
| A Guide to Critical Infrastructure Protection
SECTION 5.0
OPSWAT offers a proven and comprehensive suite of products and services to manage a broad range of CIP use cases –
including Cross-Domain, File Upload, Secure Access, and Secure Storage. All OPSWAT Products are powered by the advanced
technologies covered in this guide. In addition to our industry-leading products, we also offer CIP training through the OPSWAT
Academy and cybersecurity readiness assessments delivered by our global team of experts.
To learn more about the OPSWAT Academy, visit opswat.com/academy and register for your first session.
Ready to take the next step in enhancing your critical infrastructure? Contact us at opswat.com/contact to learn more about
our solutions and how we can help take your cybersecurity protection to the next level.
| A Guide to Critical Infrastructure Protection
SECTION 6.0
About OPSWAT™
OPSWAT is a global leader in critical infrastructure cybersecurity that helps protect the world’s mission-critical organizations
from malware and zero-day attacks. To minimize the risk of compromise, OPSWAT Critical Infrastructure Protection (CIP)
solutions enable both public and private organizations to implement processes that ensure the secure transfer of files and
devices to and from critical networks.
More than 1,500 organizations worldwide spanning Financial Services, Defense, Manufacturing, Energy, Aerospace, and
Transportation Systems trust OPSWAT to secure their files and devices; ensure compliance with industry and government-
driven policies and regulations; and to protect their reputations, finances, employees and relationships from cyber-driven
disruption. OPSWAT. Trust no file. Trust no device.™
Network
Storage Email For
Access
Security Security Developers
Control
9
Trust no file. Trust no device.