Strengthening Operational Technology Security
Strengthening Operational Technology Security
Technology Security
Best Practices for Improving Cyber Readiness and Mitigating Risk
Executive Summary
Operational technology (OT) is a favorite target for threat actors. OT security incidents can
impair business-critical operations, disrupt essential services, and even threaten public health
and safety. Numerous disconcerting OT cybersecurity events made the headlines in 2022
including:
• An attack on a UK water company where adversaries gained access to the systems used
to control the chemical levels in public water supplies
• A Canadian mining company incident that shut down mining operations for over a week,
affecting revenues
Going forward, operators of OT systems must take a fresh look at their security systems, pro-
cesses, and design principles to reduce exposure and comply with emerging government and
industry regulations. This paper examines some of the OT security challenges accompanying
digital transformation, reviews the OT threat landscape, and describes practical steps OT
systems operators can take to improve cyber readiness and mitigate risk.
Organizational challenges
Quite frankly, most OT systems were not engineered with and are not operated with a security-first
mindset. OT systems are typically beyond the purview and control of security-conscious CISOs
and CIOs. Most OT systems are designed, procured, and managed by engineering organizations
that are primarily focused on meeting key business performance objectives related to system up-
time and efficiency. Many OT systems operators are not well versed in cybersecurity, governance,
and compliance matters.
Technological challenges
Many OT systems operators are constrained by aging, fragile technology that is inherently vulne-
rable. Operational technology has a lifespan of 10+ years, compared to 3-5 years for IT systems.
Legacy OT devices sometimes run unsupported or end-of-life software that is easy prey for adver-
saries.
Unlike in the IT world, in the OT world, security patches and firmware updates are often kept to a
minimum. Many OT engineering teams have a “not broke, don’t fix it” mentality. Their primary moti-
vation is to maintain system stability and availability to keep the business running smoothly.
Threat actors are increasingly setting their sights on OT systems. Contemporary threat groups like
CHERNOVITE and BENTONITE specifically target industrial control systems. Malware variants like
Incontroller (aka PIPEDREAM) exploit vulnerabilities in OT protocols (MODBUS, CODESYS, OPC
UA, etc.) allowing adversaries to gain control of PLCs and other OT devices.
Many of these cyberattacks are linked to rogue nation states. Nation-state-backed attacks on criti-
cal infrastructure doubled year-over-year in Microsoft’s 2022 Digital Defense Report, accounting for
40% of all nation-state-backed attacks. According to Microsoft, the spike was due in large part to
Russia-backed groups targeting Ukrainian infrastructure and the infrastructure of Ukrainian allies,
including the United States.
1. Stuxnet, the first malware known to target industrial control systems, was designed to be implanted via a USB thumb
drive. Stuxnet attacks were scarce because they required physical system access. Today, adversaries can easily
orchestrate large-scale malware campaigns directly over the internet, targeting inadequately secured OT networks
• In 2014, researchers discovered that for several years a threat group known as Dragonfly
had been using Havex backdoor malware to infiltrate industrial control systems at energy,
pharmaceutical, defense, and chemical companies across Europe and North America.
While these attacks were believed to be part of non-disruptive corporate espionage
campaigns, they served as a harbinger of things to come, demonstrating just how
susceptible to attack some OT systems are.
• In 2015, a threat group known as Sandworm used BlackEnergy 3 malware to gain access
to a Ukrainian energy company’s SCADA network, ultimately disrupting power for 225,000+
customers in one of the first widely publicized cyberattacks on a major energy provider.
• In 2017, attackers deployed Triton (aka Trisis) malware to infiltrate the safety control
systems of a Saudi Arabian petrochemical plant, reportedly disabling an emergency plant-
process shutdown system.
4. Fully isolate the OT network using firewalls, unidirectional gateways, and micro segmentation
techniques. By segregating the OT network you can defend against web-borne malware and
internet-originated attacks, and prevent attackers from leveraging internet-based command
and control servers and malware downloaders.
5. Ensure OT user accounts are separate from IT user accounts. Do not share accounts and
passwords across OT and IT domains. Threat actors often use compromised corporate
network and IT system credentials to gain unauthorized access to OT systems.
6. Secure privileged access. Privileged accounts like OT system and application admin accounts are
prime targets for adversaries. Bad actors can exploit privileged accounts to shut down systems
and disrupt critical infrastructure. Use a privileged access management (PAM) solution to isolate,
broker, and audit privileged sessions. Store privileged account credentials in a hardened digital
vault. Rotate credentials on a regular basis to defend against credential leakage and abuse.
Enterprize Zone
Domain Application Enterprise
IT Netwok Controllers Servers Workstations
Management Zone
Cyper Ark Privileged
OT DMZ Access Manager
Gateway
8. Secure access for remote employees. Use multifactor authentication (MFA) to secure access for
engineers, technicians, and other employees accessing OT systems remotely. MFA mitigates
phishing attacks and prevents adversaries from exploiting compromised credentials.
9. Diligently track and resolve OT security vulnerabilities. Threat actors routinely exploit OT system
and protocol vulnerabilities to wage attacks. Closely monitor OT vendor and CISA security
advisories. Use OT lifecycle management tools to automate firmware updates and software
patches and quickly address zero-day vulnerabilities.
10. Remove hard-coded OT device credentials from applications and scripts. Unknowing app
developers sometimes store device passwords in clear text, making life easy for threat actors.
Reduce risks by educating developers and removing passwords from OT apps and automation
scripts. Use a secrets management solution to safely store credentials in a secure, external vault.
Regularly rotate credentials to boost security.
11. Strengthen identity security for IT systems to further defend against external threats. Implement
a comprehensive identity security solution that provides continuous threat prevention, detection,
and response capabilities. Adversaries often target inadequately secured IT systems as an initial
point of attack. The Sandworm group, for example, uses BlackEnergy 3 malware to penetrate
corporate IT networks. Once in, they pivot to SCADA networks to gain access to the distribution
management system of a victim’s power grid.
12. Establish a security-first culture. Conduct regular cybersecurity training to increase awareness
and improve cyber hygiene. Threat actors often carry out phishing campaigns and other
social engineering schemes to trick unsuspecting users into relinquishing passwords or other
confidential information that can be used to orchestrate attacks.
13. Conduct penetration tests and tabletop exercises to assess cyber readiness and identify
vulnerabilities. Be proactive. Not all OT vulnerabilities immediately appear in CISA’s known
exploited vulnerabilities catalog.
NIST SP 800-82 also provides practical guidance to help you build a business case for an OT
cybersecurity program and to help you set up and implement the program.
r I de
ve nt
co i
ty
Re
•
Framework
Respon
tect
Pro
d
Detect
IEC 62443 defines a secure network architecture and functional requirements. It also provide
guidelines to help OT systems operators measure their maturity level for each requirement,
and make continuous improvements to strengthen their security posture over time. The IEC
framework segregates the network into distinct zones to isolate threats and align security con-
trols with risk levels. By segmenting networks, and placing IT assets and OT assets in distinct
zones, operators can defend OT systems against web-borne malware and external attackers.
Many malicious attackers and cybercriminals have the ways and means to succeed. Some are
backed by rogue nation states with deep pockets and technological expertise. Others take advan-
tage of Ransomware-as-a-Service platforms and open-source tools that make it all too easy to
carry out advanced malware campaigns.
Now is the time to act. OT systems operators must take proactive measures to improve cyber
readiness and mitigate risk. By adopting an OT security framework and following the best practices
described in this paper you can strengthen your security posture and defend OT systems against
supply chain vulnerabilities, ransomware attacks, and other advanced threats.
Next steps
Together, PwC and CyberArk can help you plan, execute, and evolve your OT security strategy. To
learn more contact PwC or CyberArk.