This is typically built on a flat, segmented Layer 2 architecture, he said. Flat networks connect devices to a single switch, and Layer 2 is the data layer in the ISO reference model.
As things become more connected, network operators must pay closer attention to the attack surface, Oswal says. “Threats move laterally, and the exposure of formally isolated OT systems can lead to potential cyber threats to IT and back again,” he says. “Many of these IoT systems are part of larger operations. If these systems are taken down, important telemetry data can be lost, leading to poor operational decisions, poor analytics, or disrupted operations,” Oswal says. “It could even result in loss of life.”
Industries such as manufacturing and oil and gas often ecuador mobile database on old legacy systems that lack security controls and weren't designed to be patched, says Larry Trowell, CEO of penetration testing firm NetSPI. "While these systems do a good job when properly maintained, they weren't always built with modern security in mind," he says.
The need to patch devices from different manufacturers also reduces the ability to service them comprehensively, Oswal says. “The systems are not designed to be updated frequently,” he says. “You often have to wait many weeks, even months, before there’s a real service window where all these OT and IIoT devices can be patched.”
According to Bryon Black, IT manager for South Coast Water District, patches for IIoT systems lag behind those for other enterprise systems. “In IIoT systems, especially in the infrastructure utility world, the patch rate is typically lower than in enterprise systems,” he says. “Patches for IIoT systems in the utility industry are typically several versions behind the current system (months, sometimes years). Upgrades occur after IIoT vendors certify (allow) upgrades to a certain level or version.”
While unpatched systems increase cybersecurity risk, they can be “tolerable,” Black says. He recommends protecting them as needed, without causing harm or damage to production systems. “System uptime and reliability are typically the top priority, but you want to make sure you have the best security possible,” Black says.
Features of implementing updates in industrial IoT
-
rakhirhif8963
- Posts: 533
- Joined: Mon Dec 23, 2024 3:11 am