When you’re trying to decide how you’re going to do remote connectivity, you have to take into consideration security, not just convenience,” says Scott Christensen, GrayMatter’s Cyber Practice Director.
“You always need to be asking, ‘Are we doing this in a way that’s risk averse?'”
Authorities say plant operators in Oldsmar, Fla., immediately noticed the cyber attack when a cursor unexpectedly started to move across a computer screen and increased the amount of lye the system adds to treat drinking water from 100 parts per million to 11,100 parts per million.
An operator who noticed the increase, and saw bizarre activity earlier in the day, prevented plant systems from making the increase.
Officials told Wired that they have uninstalled TeamViewer, a popular remote-access software that allows remote desktop viewing and control. Oldsmar is in Pinellas County, the most densely populated county in Florida and part of the Tampa-St. Petersburg-Clearwater metro area, which just hosted Super Bowl LV.
Christensen said that many times, utilities with limited resources and staffing rely on the default settings of remote-access software, which often does not offer the proper level of security.
“We try to minimize risk but still allow for day-to-day operations, and we do that by ensuring clients have encrypted communications, so both ends of a connection are secured and authenticated so someone can’t take advantage as they did in this case,” Christensen said.
“Another method is through deception technology, which could have diverted this attack to a fake device where no harm can occur,” he said. “That way, you don’t have to hope someone is paying attention to the screen at the very moment a hacker tries to add a dangerous amount of lye to the water.”
This includes who has access, what systems they can access and the methods used to connect.
OT cyber professionals often lament the loss of the “air gap,” the technique of keeping your OT network physically disconnected from other networks. This became impractical with most modernization efforts and can be used against users as it provides a loss of visibility.
By using tools and technologies that focus on hardening and defining the barrier and by implementing compensating controls at the perimeter you can achieve a similar risk level without loss of the efficiencies of modernization. This can include tools such as encryption, segmentation, deception and authentication.
Many times an objective third party can help you evaluate where the gaps in your security program exist and what options exist to close that gap. Finding a partner who can perform a comprehensive review of your OT infrastructure is important.
Schedule a one-on-one, customized cyber briefing to get started.Get Started
Canadian Utility Connects At-Home Operators to Plant Operations
How Water/Wastewater Unlocks Government Cybersecurity Funding
West View Water Authority Begins Data-Driven Digital Utility Plan to Benefit Customers
How the City of Cincinnati Built the Smartest Sewers in the World
|cookielawinfo-checbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|