Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Uncategorized

Protecting Critical Infrastructure: Forrester Research Suggests Merits of ‘Zero Trust’ Approach

by Patience Wait
May 24, 2018
in Uncategorized
Reading Time: 4 mins read
A A
Critical Infrastructure
Share on FacebookShare on Twitter

People across the U.S. were awed and dismayed at video footage of the failure of the Oroville Dam main and emergency spillways in February 2017. More than 180,000 residents who lived downstream had to be evacuated, and a year later the cost of the failure – from state and federal emergency response to repairing the damage – was estimated at $870 million or more.

That failure was caused by record-breaking rainfall, and residents received warning before the flooding. But what if the failure was caused not by Mother Nature but man-made actions, without the opportunity to warn people? For instance, in December 2014 hackers used phishing emails to hack into a South Korean nuclear power plant and threatened to destroy or shut down its nuclear reactors.

Download Report

Forrester Research has released a new report, “Protecting Industrial Control Systems and Critical Infrastructure From Attack,” that identifies cyber weaknesses in industrial control systems (ICSs), including those in critical infrastructure such as utilities, pipelines, and the electrical grid, as a major national security issue.

Cyber attacks against ICSs are increasing rapidly, the report found. Reports of ICS attacks filed with the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team have increased from 198 in fiscal year 2012 to 290 in FY2016.

The weaknesses of current ICSs are well known:

  • ICS devices, which once required physical access to connect them, are now connected to the Internet, as organizations sought more efficient ways to operate their businesses;
  • Nation-state adversaries find infrastructure an attractive target, and they have the manpower and expertise to target them;
  • ICSs are particularly vulnerable to insider threats, not just through hacking but simple physical access to facilities and equipment; and
  • Consolidation in heavy industries, from oil and gas to electrical utilities, has given companies a hodge-podge of networks, equipment and devices to monitor and control, making it a much more complex environment from a security standpoint.

Compounding the problem, from a cyber standpoint, is that legacy ICSs often were built and installed for long-term use in a production environment – often a decade or more. They have significant uptime requirements (think about it: how long can a part of the electric grid be shut down without causing problems?). Many of them weren’t really designed to be patched, and their software may no longer be supported. There are other complicating factors, but you get the idea.

The Forrester report recommends taking a “zero trust” approach to security for operations technology (OT) full of ICSs. Among the key elements:

  • Mapping assets, understanding network traffic, and blocking unknown traffic. Creating a map will show where OT networks are connected to the Internet; this will allow segmenting the networks and making sure their devices aren’t Internet-accessible. And it’s necessary to know valid network traffic, such as maintenance activities, to identify and block malicious traffic.
  • Assume all traffic is suspicious until it’s been authorized, inspected, and secured. And use a data-centric and identity-centric approach, which will help isolate attacks and limit the attacker’s ability to move sideways within the network and cause more damage.
  • Create an intelligent alerting system. While OT systems may report the operational status of individual components, they usually don’t provide context – is a system down because of a mechanical failure, an environmental/weather issue, or a cyber attack?

Want to learn more about a Zero Trust approach to protecting critical infrastructure? Click here for the report and click here to get started.

Tags: Blue Ridge Networks Critical InfrastructureCritical Infrastructure CybersecurityCritical Infrastructure ThreatsForrester CybersecurityForrester ResearchICS SecurityProtecting ICSProtecting Industrial ControlsZero Trust Approach

RELATED POSTS

Zero Trust Approach
Cyber Security

VIDEO: Comply-to-Connect is Foundational to a Federal Zero Trust Approach

November 1, 2021
Implementing a Zero Trust
Civilian

Public Sector Agencies are Implementing a Zero Trust Approach to Cybersecurity

September 1, 2021
Finding a Low-Code Platform that is ‘Federal Ready’
Operations

Finding a Low-Code Platform that is ‘Federal Ready’

January 19, 2017

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9416 shares
    Share 3766 Tweet 2354
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    82 shares
    Share 33 Tweet 21
  • FedRAMP is the Foundation of Trusted and Secure Government

    35 shares
    Share 14 Tweet 9
  • Why the Government Needs a Cloud-Native Workforce

    18 shares
    Share 7 Tweet 5

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us