What is a cyber security company doing talking about digital transformation? Our proposition is that the first step for effective cyber security is to know what assets you have, ideally in as much detail as possible. The same is with digital transformation; the first step for effective digital transformation is to know what you have got.
AICS 2022 - Bahrain
OT in Your Food and Drink? It's More Likely Than You Think
Annually the American Centre for Disease Control and Prevention (CDC) reports a sixth of Americans suffer from food borne illnesses, causing 3000 deaths a year. To reduce the number of incidents, the US established legislation to limit risk by setting standard methodology in production. The legislation requires the provision of well maintained records throughout the manufacturing process, allowing traceability of a product’s manufacture from farm to table, identifying areas of concern and informing decisions when mitigating problem areas. Similarly, the EU produced the General Food Law Regulation in 2002, requiring standards met with upkeeping records of food they supplied and received. Digitalisation aids these obligations by recording product data and increases productivity by automating processes of highly specialised manufacturing.
Awen's Adventures in Miniature Wonderland
One of many recent additions to Awen Collective's asset discovery tool, Dot, is the ability to parse and analyse network traffic of the Z21 protocol. Chances are you know a thing or two about model trains if "Z21" sounds familiar. Indeed, Z21 is a German organisation that maintains proprietary technologies to monitor and control miniature locomotives.
Dot Now Deployable on Siemens IOT2050
Following the recent annoucement of the partnership between Awen and Siemens, and whilst we work towards various routes to market in collaboration with them, we have also been busy integrating Dot into Siemens’ hardware offerings.
Cyber Attacks on OT on the rise, and why we should be concerned
Last week, cyber security experts Fortinet published a report on security trends within Operational Technology, again putting the spotlight on these highly vulnerable and increasingly attacked systems, many of which are responsible for providing critical services to society worldwide.
There was an indication that bespoke OT cyber attacks are on the increase, targeting specific vulnerabilities within SCADA and ICS systems. Whilst this is certainly a serious concern, almost more shocking is that the majority of attacks on OT systems are via IT-based legacy attacks which would no longer be effective on modern IT systems. These OT systems are comprised of aging hardware, running unpatched software, and leaving them highly vulnerable to even basic IT-based cyber attacks. This leads to an ability for bad-actors to be able to effectively disable an OT environment with no specialist or prior knowledge of the specific systems involved - leaving no specific ICS/SCADA devices secure, regardless of vendor, software or hardware involved.
There also seems to be continued ongoing neglect of basic cyber-hygiene within ICS and SCADA environments, with almost a third of OT devices directly connected to the internet, and another third accessible from the internet via the IT enterprise. Whilst there is an acknowledgement that there are many benefits from connecting the OT environment to the IT network to increase efficiencies and visibility, leading to optimisations and significant cost savings, these are in direct opposition to the increased security risk. These findings seem to point towards a scenario where potential cost savings are considered above the cyber-risk by the decision makers within these organisations, leading to the highly vulnerable situation that Fortinet are now reporting on.
To add to this, it is reported that more than 8 in 10 respondents to a survey stated that they are unable to identify all the devices connected to their OT and IT networks. How can OT operators begin to mitigate the cyber risk within their environments when they don’t even have the visibility into the devices they need to protect? This is something we are keenly aware of at Awen Collective, and we’re here to help. Our asset and risk discovery software, Dot, exists to provide a deep level of understanding of an OT environment, highlighting key concerns and helping cyber security, OT engineering and corporate compliance teams to manage their responsibilities with the best information available to them.
What the report doesn’t focus upon is the environments where these systems are operating, and the potential affects on the operators and their clients. Whilst many these systems exist within manufacturing facilities, and naturally there are huge costs associated with attacks within the manufacturing sector, there is more at play here than just monetary loss by large-scale manufacturers. ICS and SCADA systems are a key part of how providers of critical national infrastructure deliver their services to society. This includes the provision of electricity, water, sewerage, transportation and healthcare. If any of these services were interrupted or disabled due to a cyber attack, there’s a strong likelihood of widespread disruption, potentially leading to societal destabilisation and loss of life.
There has been an effort by EU legislators to address this concern, introducing the NIS Directive and ensuring that all EU states bring into law that critical national infrastructure operators are considering their cyber security across their entire IT and OT estates, and embedding good cyber security practice at all levels of their organisations. Based on this report, there should be some significant hurdles for CNI operators to overcome to get themselves entirely compliant with the directive. With fines of £17 million or 4% of annual turnover due to be levied against operators not found to be compliant, it should be a strong wake-up call for business decision-makers across CNI organisations. To help, Awen Collective offers Profile – a compliance checking tool for the NIS Directive, allowing a CNI organisation to easily and quickly determine their current compliance level, identify weaknesses to overcome and get advice on next steps.
We’re thankful to Fortinet for their report, and we’re looking forward to continuing to help ICS and SCADA operators solve the cyber security issues they have. If you’re looking for cyber security solutions for your OT environment, reach out to us at hello@awencollective.com.
Awen Kicks Off 2019!
Happy New Year! The Awen Collective team have been very busy since the start of 2019, including the release of Profile, our compliance checking tool for the NIS Directive, and the announcement of our next exciting product, Dot. Dot is an asset and risk discovery tool, build specifically for OT systems - directly addressing the challenges faced by operators of ICS networks and devices.
We took both Profile and Dot along with us to speak to some wonderful delegates from across Europe at the CEE Cyber Showcase in Vienna, to great reception. We’d like to thank everyone who came to listen to our presentations on Cyber Security and Incident Response in Critical National Infrastructure, and Asset Discovery and Incident Response Planning in Critical National Infrastructure, and those who visited our stand for a chat. Thank you also to Miles and the team at the Department for International Trade Austria, and their colleagues across Europe for running a very successful event.
We also had an article published in Information Age, with our CEO, Daniel, discussing how cyber-protection is evolving to meet NIS requirement in the utility sector.
We have many other exciting things on the horizon for Awen Collective - we’re looking forward to sharing more information soon!
As usual, if you would like contact us about any of our Products, Services or have any general queries about Digital Forensics & Incident Response then please do contact us now.
[NOTE 11/03/2020] CEE Showcase website was available at www.ceecybershowcase.com but no longer exists.