Security for Change, not Performance

Security for Change, not Performance

The latest notice of exploitation of critical infrastructure comes with an irresponsible set of actions:

  • Change all default passwords on PLCs and HMIs and use a strong password.
  • Require multifactor authentication for all remote access to the OT network, including from the IT network and external networks.
  • Disconnect the PLC from the open internet.?If remote access is necessary, control network access to the PLC.???Implement a Firewall/VPN in front of the PLC to control network access to the remote PLC. A VPN or gateway device can enable multifactor authentication for remote access even if the PLC does not support multifactor authentication. Unitronics also has a secure cellular based longhaul transport device that is secure to their cloud services.?Use an allowlist of IPs for access.?
  • Back up the logic and configurations on any Unitronics PLCs to enable fast recovery.
  • If possible, utilize a TCP port that is different than the default port TCP 20256.?

The problem with all of these suggestion is that are performative, an ineffective in the long run. Changing the default passwords, even using strong passwords. Is nothing more than putting a wait state in the breach given modern tools. As we saw with the LastPass breach, MFA is not real security anymore, either. Disconnecting from the Internet is a great recommendation, except hiding behind VPN isn't disconnecting from the Internet as VPN endpoints are literally ON the Internet. As Brian Deitch says: "If you can reach it, you can breach it." Similarly, changing TCP ports is not an effective maneuver as it is still out there, just on a different port. The saddest recommendation of all: "Backup to enable fast recovery." That is only useful if the SecOps team detects the breach, which is typically in days, if not weeks.


So, what IS a security measure for change and not performance? For one thing, cloaking access to private applications behind Zscaler's ZPA is one such measure. It is an action which can be taken to change the dynamic of the attack, as opposed to the above measures which merely delay it. If access is given via Browser Isolation, that truncates the attackers tools, even if they were to gain access. Another measure would be to deploy Deception technology. Deception leverages strategically-placed decoys to lure attackers for early detection, as well as protection of vital resources. With today's technology dynamic deception tools are entirely accessible and appropriate. The lack of pervasive use is simply mind-boggling.


Evin Hernandez

Entrepreneur, Security Strategist and Partner. Master of Red Teaming, Cyber Threat Research, and Malware Elimination. Skilled in vCISO & GRC. ‘True grit and hard work create the unbeatable.

11 个月
回复

要查看或添加评论,请登录

Maria Teigeiro, CISSP的更多文章

  • It's 2024. Do You Know Where Your Data Is?

    It's 2024. Do You Know Where Your Data Is?

    I recently read that "Approximately 35% of companies use AI". I would like to ammend that to say "are purposefully…

  • Islands of Data - Best of Breed in the Age of AI

    Islands of Data - Best of Breed in the Age of AI

    The "best of Breed" design principle has been a school of thought which suggested that by combining a myriad of…

    1 条评论
  • Balancing Sphere of Control vs Fault Domain

    Balancing Sphere of Control vs Fault Domain

    Today, we had a lesson in the balance of sphere of control vs fault domain as Crowdstrike issued a defective content…

    2 条评论
  • It Is Time For Security Through Simplicity

    It Is Time For Security Through Simplicity

    Almost 20 years ago, Cisco advocated for a "defense in depth" model for security. The idea was that optimal security…

  • Data Is the Fuel of AI

    Data Is the Fuel of AI

    We are in the dawn of the Age of AI. LLMs are proliferating and chips are powerful enough to run AI engines.

    2 条评论
  • Kevlar Halter Tops (Buying Data for AI)

    Kevlar Halter Tops (Buying Data for AI)

    Within 60 days, 2 out of the 5 SIEM leaders in Gartner's SIEM MQ (representing a total of 23 of the SIEM marketshare)…

    4 条评论
  • LLM/AI: Deja Vu

    LLM/AI: Deja Vu

    When you're as old as I am, you get to see that history does indeed repeat itself, no matter how new the technology. In…

    1 条评论
  • Security that Accelerates Business

    Security that Accelerates Business

    One of the best things about a useful security product, is that it not only secures the environment but also…

  • Deception + Black Holes = Cleanliness

    Deception + Black Holes = Cleanliness

    After my last post talking about how the time has come to put deception technology (previously known as honey pots) to…

  • Honey Pots: An Idea Whose Time Has Come

    Honey Pots: An Idea Whose Time Has Come

    Honey pots as a security concept have been around for decades. I first saw the idea of using a dedicate resource to…

    7 条评论

社区洞察

其他会员也浏览了