SANS Institute, a leading cybersecurity training provider, empowers cybersecurity professionals through top-notch training, certifications, and degree programs, all designed to enhance global security. Dragos, an industrial cybersecurity firm, specializes in providing software, cyber threat intelligence, and professional services to protect critical infrastructure. SANS, in partnership with Dragos, present a new blog series that delves into the critical aspects of OT cybersecurity. This series aims to educate both practitioners and executives on the intricacies of securing operational environments. This is Part 3. If you’re new to this blog series, read Part 1 here and Part 2 here.
In an era where industrial operations increasingly rely on digital technologies, the security of operational technology (OT) and industrial control systems (ICS) is paramount. The latest blog from Dragos, titled "The Five Critical Controls for Industrial Cybersecurity," underscores the practices necessary to shield critical infrastructure from cyber threats that could disrupt operations or endanger lives.
Key Controls for Effective OT Cybersecurity Programs
The blog presents a strategic approach devised by SANS authors and instructors Robert M. Lee and Tim Conway, who analyzed past ICS cyberattacks to derive five essential controls for an effective OT cybersecurity program. These controls are designed to be outcome-focused and adaptable, fitting various environments and risk models seamlessly.
- ICS Incident Response Plan: Develop a robust incident response plan specifically for ICS environments, encompassing detection, response, and recovery from cyber incidents.
- Defensible Architecture: Create a network design that segments and isolates critical systems to minimize attack surfaces and reduce potential cyber incident impacts.
- ICS Network Visibility and Monitoring: Implement continuous monitoring to detect anomalies and threats, utilizing tools that enhance visibility into network traffic and system activities.
- Secure Remote Access: Ensure secure access to ICS environments through multi-factor authentication, encrypted communications, and stringent access controls.
- Risk-Based Vulnerability Management: Regularly assess vulnerabilities, prioritizing remediation based on the risk to critical systems.
Utilizing the Five Critical Controls
Dragos emphasizes the importance of these controls with an easy-to-follow infographic and a Benchmarking Worksheet, helping organizations assess their cybersecurity maturity and make informed enhancements. For access to these resources as well as a comprehensive guide to implementing these controls, read the full blog here.
Enhance Your Cybersecurity Knowledge
For professionals looking to deepen their understanding of the distinctions between ICS/OT and IT security, SANS Institute offers a valuable free resource. Our white paper, The Five ICS Cybersecurity Critical Controls, provides clear details and implementation guidance on the five most relevant critical controls for an ICS/OT cybersecurity strategy. Download the free SANS white paper here.