cybersecurity for operational technology€¦ · cybersecurity for operational technology iiot...

4
OVERVIEW OF THREATS CYBERSECURITY FOR OPERATIONAL TECHNOLOGY IIOT SENSORS Elevator CCTV Turbine Engine Smart Lamp Post Power Grid Manufacturing Plant Smart Meters Smart Sensors Industrial IT Industrial OT Note: Industrial Internet of Things straddles both the Industrial IT and Industrial OT layers. MalOT Lateral Movement Remote Access M2M Attacks MITM Unauthorised Devices Internet Connecting All My Smart Sensors

Upload: others

Post on 07-Jun-2020

24 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CYBERSECURITY FOR OPERATIONAL TECHNOLOGY€¦ · CYBERSECURITY FOR OPERATIONAL TECHNOLOGY IIOT SENSORS Elevator CCTV Turbine Engine Smart Lamp Post Power Grid Manufacturing Plant

OVERVIEW OF THREATS

CYBERSECURITY FOROPERATIONAL TECHNOLOGY

IIOT SENSORS

Elevator

CCTV

Turbine Engine

Smart Lamp Post

Power GridManufacturing

Plant

Smart Meters

Smart Sensors

Industrial IT

Industrial OT

Note: Industrial Internet of Things straddles both the Industrial IT

and Industrial OT layers.

MalOTLateral MovementRemote Access

M2M AttacksMITMUnauthorised Devices

Internet ConnectingAll My Smart Sensors

Page 2: CYBERSECURITY FOR OPERATIONAL TECHNOLOGY€¦ · CYBERSECURITY FOR OPERATIONAL TECHNOLOGY IIOT SENSORS Elevator CCTV Turbine Engine Smart Lamp Post Power Grid Manufacturing Plant

ADDRESSING CYBERSECURITY THREATS

KEY BENEFITS OF ACYBERSECURITY STRATEGY AND PROGRAMME

Avoiding / minimising

costs of business interruption from

an attack

Protecting the business against

reputational damage

Protecting key competitive and client data from

leakage

Pre-emptive user training to ensure

adequate responses to unanticipated

cyber attacks

Managing risks of connected devices being weaponised

to cause substantive damage

“FIND”the vulnerabilities

“MONITOR”for future

vulnerabilities“FIX”the vulnerabilities

CYBERSECURITY DEVELOPMENT

LIFECYCLE

THREAT

PATCH

Page 3: CYBERSECURITY FOR OPERATIONAL TECHNOLOGY€¦ · CYBERSECURITY FOR OPERATIONAL TECHNOLOGY IIOT SENSORS Elevator CCTV Turbine Engine Smart Lamp Post Power Grid Manufacturing Plant

FIND PHASE– RISK ASSESSMENT

FIX PHASE– REMEDIATION AND PREVENTION

Key deliverable – Remediation Recommendation Report + Implementation Consultancy

Key deliverable – Risk Assessment Report

Identifying effectiveness of personal and system data protection and ensuring compliance with local regulatory standards.

Policy or system adaptations advised to minimise risk of data leakages from internal networks or publicly accessible web servers.

Assessment and testing of networks, operating systems and web applications. Can include HTTP/SMTP Distributed Denial of Service (DDoS) assessment.

Assessing configuration hardening of systems against industry-accepted security standards.

SLR will highlight applications and threats that expose vulnerabilities in their security’s posture.

Performing one-off post-mortem investigations of cybersecurity incidents and recommending actionable steps for future prevention.

Privacy Impact Assessments

Data Leakage Prevention Consultation

Vulnerability Assessment and Penetration Testing

System Configuration Audit

Security Lifecycle Review (SLR)

Incident Response and Investigation

Figure 1: Sample SLR Report

High-Risk File Types

The file types shown represent a greater risk to the organisation due to a combination of new vulnerabilities being discovered, existing and unpatched flaws, and prevalence of use in attacks.

70.63%

of all files are high-risk types

Email LinkIndustry Average

ExcelIndustry Average

PDFIndustry Average

WordIndustry Average

PowerpointIndustry Average

12.47%10.56%

6.79%1.78%

4.28%3.99%

3.18%0.34%

2.88%0.17%

Page 4: CYBERSECURITY FOR OPERATIONAL TECHNOLOGY€¦ · CYBERSECURITY FOR OPERATIONAL TECHNOLOGY IIOT SENSORS Elevator CCTV Turbine Engine Smart Lamp Post Power Grid Manufacturing Plant

A Smart City in a Box Solution by Surbana Jurong

[email protected] https://surbanajurong.com

Figure 2: Sample of dashboard for SC Portal + Network Topology Map of devices monitored via the SCADA application

MONITOR PHASE– SECURITY COMMAND CENTRE

PROJECT 24K – A CASE STUDY IN OPERATIONAL TECHNOLOGY MONITORING

Advisory for an aggregation of tools and data from various threat intelligence, SIEMs, active directories etc. SCADA Application can integrate with tools typically used in a security operations centre.

Endpoint monitoring:

>1,000,000monitoring points

Device monitoring:

~ 50,000devices

Impacting:

~1 millionhomes

Smart Cities Portal can stream in critical monitoring data from SCADA applications that are typically used for endpoint detection of unknown threats and attacks. From the SC Portal, key alerts can be piped into a Smart Incident Management System (SIMS) to drive an actionable response from the relevant IT vendor / personnel to address emergent threats.

About Surbana Jurong:

Surbana Jurong Private Limited (SJ) is one of the largest Asia-based urban, industrial and infrastructure consulting firms. Leveraging technology and creativity, SJ provides one-stop consultancy solutions across the entire value chain of the urbanisation, industrialisation and infrastructure domains.

Headquartered in Singapore, the SJ Group has a global workforce of 13,000 employees in 113 offices across 44 countries in Asia, Australia, the Middle East, Africa and the Americas, and an annual turnover of around S$1.3 billion.

SJ has a track record of over 50 years, and has built over a million homes in Singapore, crafted master plans for more than 30 countries and developed over 50 industrial parks globally.

Working with partners to deliver edge protection services and an operations centre service.

Implementation of SCADA Application

Setting Up of Security Command Centre Dashboard

Provision of Security Operations Centre (SoC) Services

SJ’s motto ‘Building Cities, Shaping Lives’ reflects its belief that development is more than just steel and concrete. SJ creates spaces and designs infrastructure where people live, work and play, shaping cities into homes with sustainable jobs where communities and businesses can flourish.

About Project 24k:

Surbana Jurong also undertakes the management of the Integrated Estate Management System, a comprehensive software that monitors over 40,000 assets across the public housing townships in Singapore. This includes integrating feedback and vendor service level arrangements. Recently, as part of the company’s service offerings to the public housing townships, Project 24k was enacted to add in an operational technology monitoring layer to manage cybersecurity risks to the system and devices.

KEY STATISTICS