When I transitioned from cybersecurity in IT to Operational Technology (OT), I was initially surprised to discover that encrypting network traffic is not as common as it is in IT. Even more surprising was learning that many cybersecurity software vendors in OT rely on open network communication to monitor risks and threats. This approach seemed akin to suggesting that police can only be effective if everyone leaves their front doors unlocked.
However, after spending more time in the field and engaging with industry experts, I began to understand the rationale behind leaving OT networks unencrypted. But the question remains: do the benefits truly outweigh the risks? Let’s explore this topic further in the article.
OT networks have a rich history, evolving significantly over time. Initially, OT was all about mechanical systems and analog devices, such as steam engines and telegraph systems, where control over machines was mostly manual or involved simple mechanical contraptions.
As technology advanced through the 20th century, OT shifted from purely mechanical systems to electronic and digital ones. The introduction of electronic components like transistors and microprocessors revolutionized OT, allowing for more precise and reliable control over industrial processes.
The real transformation began with the integration of computer technology. In the late 20th century, computer-based control systems like Programmable Logic Controllers (PLCs) and Supervisory Control and Data Acquisition (SCADA) systems became prevalent. These systems enabled more sophisticated automation and control of industrial processes.
Historically, OT networks utilized proprietary protocols optimized for specific functions. Some of these protocols, such as Modbus, Profibus, and DNP3, have become standard industrial communication protocols. These protocols facilitated communication between various hardware components and software systems, often through wired connections like Ethernet.
In OT networks, the priorities are indeed different from those in IT networks. The typical priority list in OT networks is:
In the IT realm, the confidentiality, integrity, and availability of data are paramount. While data theft is a concern in OT, the primary focus is on ensuring continuous production uptime. Consider the consequences of shutting down a power grid, turning off traffic lights, or closing a pipeline. Actions like rebooting a computer or disconnecting a suspicious device, which are routine in IT, can pose significant risks to the physical world and lead to substantial revenue losses in OT environments.
OT protocols often lack built-in encryption for several reasons:
As the convergence of IT and OT networks continues and cyber threats evolve, there is a growing recognition of the need to enhance security measures, including encryption, in OT environments. However, implementing these changes requires careful consideration to avoid disrupting critical operations.
While encryption enhances security, it is not a silver bullet. It should be part of a comprehensive security strategy that includes network segmentation, access controls, and continuous monitoring. Below are certain points to consider whether to encrypt or not to encrypt:
Encrypting OT Traffic:
Not Encrypting OT Traffic::
While network encryption can make OT environments more secure by protecting data integrity and confidentiality, it must be carefully implemented to avoid disrupting critical operations. Balancing security with performance and operational requirements is key.
As we advance into Industry 4.0, the integration of OT systems with cloud-based services becomes increasingly prevalent. This shift underscores the critical importance of securing encrypted traffic between OT systems. By leveraging passive monitoring techniques such as Intrusion Detection Systems (IDS), Network Traffic Analysis Tools, and Deep Packet Inspection (DPI), organizations can effectively identify and mitigate potential security threats. Additionally, implementing best practices like strong access controls, data encryption, network segmentation, and regular security audits ensures the protection of sensitive data and critical infrastructure.
--------------------
Author: Vinny Sagar, Solution Architect, swIDch
With over 15 years of experience in pre-sales, consulting and software development in the Identity and Cyber Security space Vinny has helped many clients across various industries and regions to design and deploy Zero Trust solutions that meet their specific needs and challenges.
--------------------
swIDch will continue its quest to innovate and pioneer next-generation authentication solutions. To stay up-to-date with the latest trends sign up to our newsletter and check out our latest solutions.