Zero-Trust is a Paradigm Shift
Srinivas Kumar

Zero-Trust is a Paradigm Shift

Zero-Trust is a paradigm shift, and not a disruptive technology. Does it imply decommissioning brownfield devices? Does it require field device updates? Does it require costly upgrades to field devices? Does it mean a quarantine colony for non-compliant devices like network admission controls?

The Resistance

Firstly, the economic aspect of device transformation. Zero-Trust in brownfield (legacy) devices will require a “zero-cost” one-touch provisioning without hardware upgrades. With a low footprint (memory and storage) agent, this is technological possible on resource constrained field devices.

Secondly, the intellectual aspect of device transformation. Security practitioners believe and agree with zero-passwords and the need to digitally authenticate “commands” and by extension “responses” even if unencrypted because of real time performance (low latency) considerations. There are NIST approved cryptographic ciphers and network layer protocols to accomplish this without requiring reengineering of line of business (LOB) applications.?

Thirdly, the political aspect of device transformation. Device owners want the original equipment manufacturers (OEMs) to “protect” their devices. OEMs have no financial incentives or compliance mandates to do so on legacy (in-field) devices with a truck roll and field engineers. The network-based detection and prevention methods, software-defined edge (SD-Edge), and Secure Access Service Edge (SASE) solutions serve as a beginning on the CISO’s IT budget to “optimize” workflows across information technology (IT) and operational technology (OT) systems. However, CTOs and product security architects will have to “transform” devices for embedded trust in things to build-out a horizontal platform for IT-OT-IoT-IIoT systems – the holy grail for digital transformation to empower machine learning (ML) and artificial intelligence (AI) applications.

The cyber insurance companies need to determine how to underwrite policies with infrastructure modernization (greenfield) and infrastructure hardening (brownfield) factored in before they pick up the tab on payouts after a cyber-attack on a hybrid ecosystem with inadequate protection. The useful service lifetime of a brownfield device may ultimately determine premature retirement of the device from service with a rip-and-replace policy.

Why Zero-Trust Matters

Zero-Trust is an “explicit” trust model, in contrast to an “implicit” trust model. While authoritative identification and mutual (two-way) authentication are core elements of foundational trust, attestable runtime operational “integrity” is essential for high assurance of trustworthiness. Possession of a driver’s license may suggest that the driver is implicitly trusted, but unless the driver’s “current state of mind” is inspected (e.g., driving under the influence), explicit trustworthiness cannot be inferred. Similarly, in a peer-to-peer connection, the connected devices need to convey mutual trustworthiness. This may be accomplished using an immutable identity (from a hardware, firmware, or software-based root of trust), and a certificate issued to the attested identity by a private, public, or closed PKI system (i.e., certificate authority). A compelling reason to use cryptographic keys and certificates correctly is described in this video. X.509 certificates provide several benefits (with security attributes) and may be used in authentication ceremonies with the private key protected on embedded (headless) devices. This helps overcome the stigma of factory default and cached/persisted passwords being exploited to orchestrate sophisticated cyber-attacks through unprotected supply chains.

Digitally signed messages help in “tamper resistant” communications between authenticated peers over insecure media and/or transport protocols. Locks were intended to keep honest people honest; thieves break locks! Zero-Trust is an enhancement to “Blind Trust” in cyberspace where nation state and cybercrime syndicates are lurking. Traditional “closed” systems may also be breached through ingress points such as HMI (user) workstations, tablets, smart phones, and portable media (e.g., USB). Today, insider threats are a reality (e.g., a disgruntled employee, malicious actor, espionage, social/political activism, etc.). Whether systems are loosely coupled (open) or tightly coupled (closed/air gapped), to connect and communicate, establishing a reasonable level of trust provides cyber resilience in cyberspace where hackers are in possession of sophisticated tools and methods to land (infect) and propagate laterally. In fact, with mutually verifiable trust, network-based intrusion detection and firewall policies could be fine-tuned to reduce false positives and true negatives.

The Degrees of Zero-Trust?

Mocana’s TrustEdge CyberSec described in this video provides a solution without requiring any reengineering of LOB applications that may not be SSL enabled, for interoperability and scalability in public/private or closed PKI systems (without requiring Internet connectivity). It only requires a TCP/IP network stack on the target device. The keys are automatically renewed/rotated at configurable frequency. Certificates are auto-renewed (using the EST protocol – RFC 7030) before expiry or on-demand through Mocana TrustCenter. Certificates can be used for identification and authentication, with support for use of pre-shared keys provided as an option. The strategy required is to protect the high value assets that are on the attacker’s radar (e.g., Windows based HMI workstations, Linux controllers). Zero-Trust is a concept that can be implemented to the "grade" and “degree" of desired safety and protection controls.

Zero-Trust is not a "all or nothing" value proposition. It is about identifying high/imminent risks and addressing them head-on. Is there a supply chain risk exposure – as was the case in a recently publicized breach? Is there an insider threat that could exploit passwords? Is there an IT policy to rotate pre-shared keys (especially when administrators change)? Every technology has its pros and cons. TCP/IP, SSL/TLS, blockchain, and certificates are not perfect solutions but were designed with a specific purpose (and objective) in mind and provide reasonable benefits to relevant applications. Similarly, preserving status quo with “do nothing” also has its pros and cons. The real challenge in critical infrastructure and control systems is whether field device interoperability in a multi-vendor ecosystem is addressed through specifications as an industry standard for next generation device security. Cybersecurity has always been, and still is, an afterthought based on compliance drivers. In isolated/controlled environments the focus is on physical and logical access controls, and not on the sophisticated tools and methods in the arsenal of determined adversaries. That is why cyberwars are asymmetric warfare – detection is not protection.

The Road to Zero-Trust

The solution to address the cyber risks and challenges is not in its entirety a device owner/operator responsibility. The current recurring costs and effectiveness of network-based detection/prevention methods must be scrutinized for incremental value and sustainability. OEMs need to be held accountable. It is not a system integrator’s responsibility to harden devices – it is the OEM’s responsibility. There needs to be a modernization plan on a timeline even if it is based on a rip-and-replace policy rather than retrofitting protection controls to extend the service lifetime of brownfield devices (by another 10+ years). Ultimately, it is for the board of directors and cyber insurance companies to objectively define and implement the "grade" and “degree” of desired safety and protection.

Related Posts:

  • Protecting Devices in Operational Technologies, https://www.dhirubhai.net/pulse/protecting-devices-operational-technologies-srinivas-kumar
  • The C-Suite Guide to Device Modernization, https://www.dhirubhai.net/pulse/c-suite-guide-device-modernization-srinivas-kumar/
  • Wheels of Transformation, https://www.dhirubhai.net/pulse/wheels-transformation-srinivas-kumar/
  • A Definitive Guide to OT-IoT Modernization, https://www.dhirubhai.net/pulse/definitive-guide-ot-iot-modernization-srinivas-kumar/
  • Cyber Paralysis by Ransomware Stings, https://www.dhirubhai.net/pulse/cyber-paralysis-ransomware-stings-srinivas-kumar/
  • Ransomware Attacks Becoming the New Normal, https://www.dhirubhai.net/pulse/ransomware-attacks-becoming-new-normal-srinivas-kumar/
  • Ransomware is Cyber Warfare, https://www.dhirubhai.net/pulse/ransomware-cyber-warfare-srinivas-kumar/
  • The Supply Chain is Not a Trust Chain, https://www.dhirubhai.net/pulse/supply-chain-trust-srinivas-kumar/

Tim McAllister

Senior Director, Digital Trust at DigiCert | IoT & PKI Security Leader | Enabling Secure, Scalable Cybersecurity for Connected Devices

3 年

Thanks, Srinivas! Biggest challenges moving to #ZeroTrust: ? Economics - Who bears the brunt of costs for its absence? ? >98% brownfield in OT ? Understanding & prioritizing the risks - Where to start? The technology, processes, and people exist to begin to address this...

  • 该图片无替代文字
回复

要查看或添加评论,请登录

Srinivas Kumar的更多文章

  • A New Era for Cyber Resilience

    A New Era for Cyber Resilience

    As we welcome and celebrate the beginning of a new year, and the end of the first quarter of the 21st century, does a…

    3 条评论
  • The AI Act and Implications for IoT/IIoT Initiatives

    The AI Act and Implications for IoT/IIoT Initiatives

    The Artificial Intelligence (AI) Act, approved by European Union member states, lawmakers, and the European Commission,…

  • The IT-OT Dichotomy and Passage to Digitalization

    The IT-OT Dichotomy and Passage to Digitalization

    The difference between information technology (IT) and operational technology (OT) must be viewed from the perspective…

  • The Sherpa Guide to Keys and Certificates

    The Sherpa Guide to Keys and Certificates

    When it comes to salesmanship, the quintessential difference between computer salesmen and car salesmen is that the car…

  • Cyber Proofing Devices and Data

    Cyber Proofing Devices and Data

    Over the past decades it became evident that compromise of user and service accounts could play a major factor in high…

  • Innovation Requires Walking on a Tightrope

    Innovation Requires Walking on a Tightrope

    Launching a new technology startup, with just a novel idea and passion to build no-nonsense solutions for problems you…

    1 条评论
  • Cyber Attacks on Devices in the AI-ML Era

    Cyber Attacks on Devices in the AI-ML Era

    Any offensive advance in a conventional war requires taking down ground defenses with air power before launching a…

    2 条评论
  • Cyber Safety in the Era of Quantum Computing and AI

    Cyber Safety in the Era of Quantum Computing and AI

    As Sophocles, the ancient Greek tragedian, stated over 2400 years ago, “Nothing vast enters the life of mortals without…

    1 条评论
  • The Moral Imperative of Artificial Intelligence

    The Moral Imperative of Artificial Intelligence

    Historically, human society has evolved by turning the wheels, and adding the axles, before tightening the grip on the…

    1 条评论
  • Miles Per Cyberattack

    Miles Per Cyberattack

    If cybersecurity was an automobile, a key performance indicator would be “miles per cyberattack”, with infinite as the…

社区洞察

其他会员也浏览了