Try the on-demand periods from the Low-Code/No-Code Summit to discover ways to efficiently innovate and obtain effectivity by upskilling and scaling citizen builders. Watch now.
Dangerous actors goal manufacturing, processing crops and utilities as open targets as a result of the operational know-how (OT) and IT integrations used don’t present the safety wanted to guard the core methods that run crops. By making the most of broad safety gaps between IT, OT and industrial management methods (ICS) that weren’t designed for securing operations, unhealthy actors seize the chance to launch ransomware assaults.
Typically even large-scale assaults, together with these on Colonial Pipeline and JBS Meals, which illustrate the vulnerability of crops, utilities and methods, are the results of IT and OT methods’ safety gaps that unhealthy actors have a tendency to take advantage of.
IT/OT gaps result in safety breaches
Processing crops, utilities, producers and provide chains that depend on IT and OT methods have tech stacks designed for velocity, effectivity and store ground management. Sadly, ICS, IT, OT and legacy enterprise useful resource planning (ERP) methods usually are not usually designed with safety as a major objective. In consequence, the tech stacks constructed on these methods have broad IT/OT safety gaps the place implicit belief leaves them susceptible to assaults.
Eighty-six p.c of course of and discrete producers report having restricted visibility into their ICS environments, making them an open goal for cyberattacks. On the system degree, a typical ICS is tough to retrofit and allow extra strong instruments like zero-trust community entry (ZTNA) on the utility degree. In consequence, these methods change into targets for unhealthy actors who can scan IT and OT infrastructure and tech stacks and discover open providers, IP addresses and different endpoints which can be solely unprotected. That is such an issue that the U.S. Cybersecurity and Infrastructure Safety Company (CISA) issued an alert earlier this yr warning of such assaults focusing on ICS and SCADA units.
Occasion
Clever Safety Summit
Be taught the important position of AI & ML in cybersecurity and business particular case research on December 8. Register to your free cross as we speak.
Register Now
A current survey by the SANS Institute, in collaboration with Nozomi Networks, discovered that essentially the most outstanding problem organizations report with securing OT applied sciences and processes is integrating legacy and getting older OT know-how with fashionable IT methods.
“With the evolution of latest assault frameworks, legacy units, evolving know-how choices and useful resource constraints, the largest problem with securing management methods applied sciences and processes is the technical integration of legacy and getting older ICS/OT know-how with fashionable IT methods,” the survey’s authors write. “Services are confronted with the truth that conventional IT safety applied sciences usually are not designed for management methods and trigger disruption in ICS/OT environments, and so they want route on prioritizing ICS-specific controls to guard their precedence property.”
Fifty-four p.c mentioned it’s the biggest problem they face in securing their operations as we speak, adopted by conventional IT safety applied sciences not being designed for management methods and inflicting disruption in OT environments. Moreover, 39% of the respondents say ransomware is essentially the most important concern concerning assaults on their ICS- and OT-based infrastructure.

The SANS examine additionally factors out that a number of ICS services fell sufferer to the Ekans ICS-tailored ransomware. Notable corporations, together with Honda and multinational vitality firm Enel Group, the place the adversary group demanded $14 million in ransom for the decryption key and to forestall the attackers from releasing terabytes of stolen information.
Honeywell helps shut gaps with zero belief
Getting zero belief proper throughout manufacturing and processing crops and utilities optimized for OT and ICS methods is a problem as a result of, in contrast to conventional IT stacks and community infrastructure which have endpoints with an OS or firmware put in, OT and ICS-based methods depend on programmable logic controllers (PLCs) to observe plant and equipment course of efficiency.
Infrastructure operators that hold water remedy, electrical utilities and course of manufacturing crops working depend on supervisory management and information acquisition (SCADA) methods which can be designed for monitoring, not safety. Defending the supply, reliability and security of their industrial management methods and operations can change into more difficult as new processes are added to an current plant.
Upwards of 85 distributors are vying to supply zero-trust capabilities to processing crops and utilities by providing endpoint detection and response (EDR), managed providers, and cloud-based platforms for working complete processing operations. One participant within the house, Honeywell, differentiates itself by how a lot information it will possibly seize throughout numerous networks and interpret it in actual time to avert intrusions and breaches.
“Honeywell was the group that had cybersecurity specialists who have been in a position to attain our goal. With our OT DCS engineers, their mentality, and current collaboration with Honeywell engineers, we had a strong basis to construct on,” Ioannis Minoyiannis, head of automation at Motor Oil, mentioned on Honeywell’s web site.
Earlier this month, on the firm’s Honeywell Join 22 occasion, it launched two advances in its cybersecurity options aimed toward serving to processing crops and utilities progress on ZTNA framework initiatives. Moreover, its Superior Monitoring and Incident Response (AMIR) managed cybersecurity service added dashboard visibility.
Offering larger visibility and management over risk detection, safety monitoring, alerting and incident response primarily based on safety data and occasion administration (SIEM) and safety orchestration and automation and response (SOAR) capabilities, Honeywell helps course of producers and utilities construct out ZTNA frameworks.
By figuring out and responding to threats quicker with early risk detection, risk searching, remediation and incident response, AMIR managed providers helps producers make progress on their ZTNA initiatives. Moreover, risk notifications and steerage assist harden endpoints and provides any group perception into how finest to section networks sooner or later whereas implementing least-privileged entry.
Honeywell’s AMIR managed service is a step within the route of treating each id and endpoint as a brand new safety perimeter for a processing plant, producer or utility.

Honeywell’s service is for all ICS property, no matter producer
Preserving the design standards for ZTNA frameworks as outlined by NIST requirements, Honeywell’s AMIR managed service is vendor-neutral, supporting each Honeywell and non-Honeywell property on an ICS community. The AMIR managed service is designed to assist mitigate complicated OT safety incidents, threats and cyberattacks by way of incident response help supplied by Honeywell’s safety professionals.
Info and updates are additionally supplied through automated and rapid customized alerts and routine pattern stories. As well as, the corporate designed the enterprise dashboard to supply prospects with help 24/7.
“AMIR helps fill a significant safety hole that many industrial prospects at present face: the lack to observe OT environments 24/7 and proactively detect and reply to evolving threats,” mentioned Jeff Zindel, vp and common supervisor of Honeywell cybersecurity. “The addition of an AMIR dashboard presents prospects enhanced visibility to know the standing of recognized incidents and the steps being taken by Honeywell OT cyber professionals to assist reply to lively threats.”
Cyber App Management, beforehand often called Utility Whitelisting, was additionally launched, with vendor-agnostic help for each Honeywell and non-Honeywell management methods. It’s designed to supply an extra safety layer that ensures solely identified and trusted functions can run on ICS property. The Nationwide Institute of Requirements and Expertise (NIST) considers Cyber App Management important for OT safety.
Cyber App Management makes use of the newest software program launch from safety specialist VMware Carbon Black, with particular guidelines and configurations crafted particularly for OT environments, developed by Honeywell’s OT Cybersecurity Facilities of Excellence and Innovation.
Prioritizing ZTNA for the longer term
Dangerous actors will proceed to prioritize the softest targets that ship the biggest ransomware funds, starting with processing and utility crops which can be core to produce chains. Locking up a provide chain with ransomware is the payout multiplier that attackers need as a result of producers usually pay as much as hold their companies working.
Any enterprise that integrates OT, IT and ICS methods could wish to study the advantages of pursuing a ZTNA-based framework to safe its infrastructure. Implementing a ZTNA framework doesn’t must be costly or require a complete employees. Gartner’s 2022 Market Information for Zero Belief Community Entry is one reference that may outline guardrails for any ZTNA framework. With each id a brand new safety perimeter, producers should prioritize ZTNA going into 2023.