IT-OT Convergence: Conflict Resolution

Wednesday, May 3, 2017 @ 04:05 PM gHale


By Katherine Brocklehurst
Who’s responsible for industrial cyber security in your organization? Whether it’s Information Technology (IT) or a cross-functional ICS operations and process control group – often labeled Operations Technology (OT) – each has a very different approach to resolving cyber security risk.

And when you bring the two together, there are often very incompatible approaches that can lead to conflict.

Pre-Internet, the line between IT and OT was quite clear. Today, that line has been blurred. Technology can potentially allow connectivity to nearly any device on the plant floor and out to field locations. And it’s also connecting IT and OT in new ways too.

RELATED STORIES
Cyber Defense: A Tale of 2 Movies
Lessons Learned with Water Utility Breach
Insecure IIoT More Apparent
Securing Legacy ICS

IT and OT are very different organizations that have begun to converge. There are many causes of the OT and IT conflict, but they must start resolving their issues.

Resisting Convergence
IT and OT are resisting convergence happening all around them says Luigi De Bernardini, chief executive of Autoware, an MES and smart manufacturing automation firm in Italy. When working with clients in large manufacturing automation projects he finds “many manufacturers still see strong resistance to bringing information and operational technologies together, with mistrust coming from both sides.”

Bernardini said that must change.

“Continuing to operate separately not only slows the adoption of solutions based on technologies that fall outside of ICS operations’ comfort zone, but also exposes companies to fault or security risks that could significantly impact production.”

Different Viewpoints
IT and OT are very different worlds with very different responsibilities. Fundamentally, IT secures data. An intentional or unintentional cyber threat could result in the loss of intellectual property, corporate financials and employee or customer information – and the ripple effect can be costly, ranging from $200K to $4M per incident.

In contrast, ICS logic executes control processes with physical impact. A cyber threat could have devastating physical consequences to critical infrastructure and services, employees, human life and safety and the environment – as has been shown in numerous publicized incidents.

If you’re in OT, how many times have you heard that “IT thinks” they can solve “the security issue” in the plant? If you’re in IT, how many times have you worried about cyber threats and risks coming into relatively flat ICS networks, and yet offers to assist are not welcome?

Different Priorities
The different priorities IT and OT each have are a key point as to why conflicts arise so easily between the two groups.

IT’s top priority is to protect the data. OT’s priority, however, is to protect the availability and integrity of the process with security (confidentiality) coming last.

The security solutions each might choose for the ICS operations environment would also be very different due to many variables. This could include regulatory and compliance requirements, network architectures, performance/production requirements, employee and environmental safety considerations, risk tolerance and management goals, asset types (hardware, software and operating systems), availability requirements or security goals – the list goes on and on.

Each group has a biased lens when considering ICS cyber risks and consequences.

IT’s Perspective
IT’s top priority is protecting data (confidentiality), such as intellectual property, corporate financials, employee or customer private data. They figuratively look across the demilitarized zone (DMZ) thinking of the many changes that could bring a stronger security posture to OT environments.

A few of the things IT pulls out of their kit bag include:
• Stronger network segmentation
• Access control lists to restrict and manage permissions and access to key resources
• Geographic or organizational groupings of data and assets
• Strong password hygiene
• Routine patching processes (automated and with much higher frequency)
• Security policies to apply everywhere

OT’s Concerns
OT’s top priorities would certainly add the safety dimension to the typically top priority of availability. When considering suggestions from IT to secure ICS environments, OT will often invoke cyber security inertia to assure control processes and production yield are not placed at risk due to changes.

Reasonable explanations ICS security cannot be implemented are:
• Fragile PLCs may not have enough memory to handle high traffic, such as a broadcast storm or unexpected function codes that cause a reboot.
• Not all patches, even those released by ICS vendors are required. It takes time to assess whether even the ICS-CERT Advisories are appropriate for the devices in place.
• Anti-virus or automatic patching is completely atypical and requires considerable testing, scheduling and may even require vendor participation to assure warrantees stay intact.
• Flat network architectures are favored with minimal or no subnets or secure zones to isolate unrelated systems and processes. In this way, OT can minimize performance latency that could disrupt time-sensitive processes, and all resources are easily available to operators should they need to quickly pivot to manage another set of systems and processes.
• Shared credentials are common on many types of systems, new and legacy. This allows users to quickly gain access without strong password hygiene and frequent password changes that are difficult to keep everyone in sync. 
• Remote access is ideal for staff to connect from home or even vendors to connect from the Internet to conduct maintenance or diagnostics on equipment.

Protection of information is important, but production losses translate immediately into business losses. Cyber threats that can disrupt production, cause damage, affect visibility and control or jeopardize safety would also affect business profitability. Any changes by IT are not appropriate or allowed. Further, OT is still skeptical of the real risk to their ICS operations and control processes, believing the risks and consequences to be hype and rarities.

Conflict Resolution
Consultants that perform risk assessments in ICS operations environments say organizations must experience a cyber incident before they’re willing to take serious action.

So, what are potential actions your organization can take to ease the conflict and mistrust with IT and OT convergence and at the same time increase ICS security?

1. Get Strategic Alignment at the Highest Levels
Luigi De Bernardini said most of his clients “still have two strongly separated departments for operations and IT. They have different people, goals, policies and projects.”

Instead, Bernardini recommends starting with reorganizing IT and OT departments to be strategically aligned and unified. He suggests at least the Chief Information Officer (CIO)/ Chief Information Security Officer (CISO) and Chief Operations Officer (COO) should have “partly common and overlapping goals and targets, which would force them to work cooperatively.”

The CIO/CISO must also accept complete responsibility for the cyber security of the ICS and for any safety incidents, reliability incidents, or equipment damage caused directly or indirectly by cyber incidents.

2. Coordinate a Joint Task Force
NIST SP800-82r2 and Bernardini recommend creating a joint task force as a cross-functional cyber security team to share their varied domain knowledge and experience to evaluate and mitigate risk to the ICS. NIST goes so far as to specifically name titles that should be a part of this cyber security task force, which at minimum should include:
• A member of the IT staff
• A control engineer
• A control system operator
• A network and system security expert
• A member of the management staff
• A member of the physical security department

The task force should also consult: site management/facility superintendent, a control system vendor and/or system integrator and the CIO/CISO.

3. Pilot Projects and Governance
One of the first things the joint cyber security task force can do is to identify simple pilot projects to work on together. A suggestion might be to jointly create a list of the most critical ICS assets that absolutely must be secured. Rank them in priority order, and begin to assess what to do.

These pilot projects will offer value with a low-risk benchmark to help the company train and progressively build a specific mix of shared IT/OT skills. This will also aid in determining how to jointly reduce conflict when deciding on steps toward improving ICS security.

Ultimately, the joint cyber security team should have “joint governance and responsibility to execute projects, harmonize duplicated or overlapping systems and processes, and promote the development of the interdisciplinary skills that are now missing in most companies,” Bernardini said.

Marathon, Not a Sprint
Mitigating the conflicts inherent in IT and OT convergence, and improving ICS security doesn’t happen overnight.

This is a serious challenge for any organization and difficult for many to undertake.

Managers need to learn to share goals, jointly evaluate business risks and consequences together, and train the broader group on shared skills, which will ultimately lead to appropriate ICS security products, processes, policies and people.

Also, joint governance for IT and OT projects shouldn’t be underestimated. IT commonly has stronger project management models, but they cannot just be taken “as-is” into ICS operations.

The two collaborating and cooperating departments need to extend their skills to adapting the IT security project models for use in operations with consideration of all the differences inherent in their security priorities and risk biases.

An effective industrial cyber security program is a lifecycle and a journey – the first step is getting the journey started.
Katherine Brocklehurst is with Belden’s Industrial IT group. Her area of responsibility covers industrial networking equipment and cyber security products across four product lines and multiple market segments. She has 20 years of experience in network security, most recently with Tripwire. Click here to view Katherine’s full blog.



Leave a Reply

You must be logged in to post a comment.