HomeCyber SecuritySecure remote access: awareness is high, confidence is low – Technologist
Secure remote access: awareness is high, confidence is low – Technologist
July 28, 2024
Industrial operational technology (OT) and industrial control systems (ICS) are typically complex and specialised systems that are installed, maintained, and supported by product vendors and often third-party technicians, operators, and contractors. This cadre of external parties provides product/system support and maintenance due to their specific technical expertise and industry knowledge.
Additionally, owing to the locations where most industrial facilities are built, remote access to OT assets and operations is all but mandatory. The TakePoint Research report, The State of Industrial Secure Remote Access, states that remote access is now a universal and fundamental requirement for most industrial enterprises.
The same report, however, noted that ensuring all access is safe and secure and cannot be exploited or abused by malicious actors, whether external or internal, remains a challenge.
The report concludes that industrial secure remote access (I-SRA) strategies have become a critical building block for every OT environment. The report recommends that securing remote access and building an overall cybersecurity strategy should be approached like any other business decision, with advantages and associated risks that must be reviewed.
The report cautions that many challenges around people, technologies, and processes need to be considered and that these will likely vary between and within industries. It also recommends that organisations begin by identifying their operational objectives and risk appetite to develop an appropriate strategy.
“A diverse, multidisciplinary approach will help organizations align with various stakeholders and expectations while successfully deploying and securing remote access to industrial environments.”
TakePoint Research
The sponsor of the report, Cyclo, picked three key findings:
1. Third-party access is the top reason for enabling I-SRA
Across all industries, 72% of respondents ranked third-party access as the number-one reason for securing remote access.
“This isn’t too surprising, as OT environments tend to depend heavily on third parties due to a significant skills gap, original equipment manufacturer (OEM) maintenance requirements, and risk mitigation, among other factors,” said Kevin Kumpf, chief OT/ICS security strategist at Cyclo.
2. I-SRA is not just a “big company” problem
The TakePoint report reveals a linear relationship between company size and the sheer volume of remote connections: the bigger the company, the more connections (see Figure 1).
Kumpf acknowledged that larger companies may have a larger attack surface to secure, but they are also more likely to have teams robust enough to do so. “In contrast, small companies may lack the budget, headcount, and experience necessary to adequately defend their systems,” he added.
Figure 1: Concern about remote access threats to OT/ICS systems
Source: The State of Industrial Secure Remote Access, TakePoint Research
3. Across all industries, concerns outweigh confidence
Kumpf says the most striking finding of the survey is that across all industries, respondents were more concerned about threats than confident in their current I-SRA solutions. “A common practice is to give teams remote access to critical systems because operations depend on it. However, that access is far less secure than these organisations would like them to be,” he noted.
Figure 1: Concern about access risks vs confidence in current solutions
Source: The State of Industrial Secure Remote Access, TakePoint Research
Kumpf opined that industrial settings have built brittle workarounds for securing remote access, like firewalls and virtual private networks (VPNs), and have sought to implement frameworks like NIST 800-82 or ISA/IEC62443.
“Still, they recognise that the problem is not solved,” commented Kumpf who wrote that VPNs struggle to scale and cannot cover the full range of OT use cases.
Kevin Kumpf
“Due to a lack of SRA solutions built specifically for OT, there’s a frequent need to rely on tools designed for IT. These are far from ideal because they often require a cloud connection, need regular patching that requires downtime, or interrupt sensitive OT processes.”
Azeem Rajpoot, the author behind Technolo Gist, is a passionate tech enthusiast with a keen interest in exploring and sharing insights about the rapidly evolving world of technology.
With a background in Technologist, Azeem brings a unique perspective to the blog, offering in-depth analyses, reviews, and thought-provoking articles. Committed to making technology accessible to all, Azeem strives to deliver content that not only keeps readers informed about the latest trends but also sparks curiosity and discussions.
Follow Azeem on this exciting tech journey to stay updated and inspired.