5 Ways to Limit the Impact of Ransomware in OT
Given the current state of risk and the potential for a renewed acceleration in ransomware incidents in industrial environments, how should organizations respond?
1. Understand Your Operational and Safety Risks from a Ransomware Attack
To gather this picture, an organization needs to have three key pieces of information:
- First, an understanding of the operational criticality of different assets in the environment. For instance, you may have certain plants, mills, or facilities that are absolutely critical to the financial performance of the business. Others may be less financially critical independently but are key suppliers to those critical sites. A business understanding of site/facility criticality is the foundation.
- Second, a comprehensive view of the ransomware risk to the assets in those facilities. Verve® typically does this through a “Technology Enabled Vulnerability Assessment”. This process provides a detailed picture of the software and hardware vulnerabilities, network protections, asset protections, patch status, and more within the OT environment. This 360° risk view provides clarity of the potential threats to the sites/facilities/plants.
- And third, the current status of recovery and response capabilities. The extent of any ransomware event can be reduced by a well-prepared organization. Robust and updated backups, a rapid incident response plan, and alerts on canary files to catch ransomware in its early stages, can all provide limiting factors. By assessing these response and recovery capabilities, the organization can determine the potential extent of an attack’s impact and mitigate effects.
2. Create a Site-Level Remediation and Protection Roadmap
Too often we have seen organizations jump into a certain initiative to try to reduce the risks from ransomware (and other potential OT attacks). For instance, a frequent starting point is a comprehensive network segmentation effort to reduce connectivity between IT and OT, as well as partitioning within the OT environment. While this step is part of a robust roadmap, it may not be the most impactful first step in the overall program, and it is insufficient as an isolated initiative.
Understanding risks, but also a proper sequence of initiatives, is key to making rapid, sustainable progress. Conducting an asset inventory before network segmentation builds a stronger foundation for protection from attacks, and accelerates the segmentation efforts. Leveraging existing tools, like threat detection software and network monitoring, works best within a strategic plan. Verve works with clients to create a “portfolio of initiatives” that build on one another. Balancing short-term protection within the development of a long-term security foundation is crucial for effective OT ransomware defense.
3. Accelerate the OT Security Roadmap Using the Site and Asset Prioritization and #1 Above
One of the advantages of the assessment mentioned earlier is that the technology is already in place to be able to promptly remediate identified risks – from patching, to configuration hardening, to managing risky software, users, and accounts. Our assessment helps accelerate time to protection.
Beyond accelerating those endpoint detections, there will be a range of additional protections and response capabilities necessary. One of the biggest challenges is determining the appropriate execution plan to protect the most critical sites and assets, while not getting bogged down on these complex sites and never getting breadth of protection to the “medium” criticality sites.
Verve recommends what we call a “bi-focal” approach to the execution. On one lens, we would pursue a robust program deployment across the most critical sites. However, in parallel, we would encourage a broad and shallow approach to apply limited protections to all sites at an enterprise level while the deeper efforts are occurring on the critical sites.
What this means in practicality is that the “gold” or most critical sites may need comprehensive network segmentation, new infrastructure, advanced anomaly and threat detection, backups, patching, user and access management. However, at the “silver” or “bronze” sites that individually may be less critical, but together make up a significant risk, you might apply prioritized vulnerability management and backups while waiting on a more comprehensive network segmentation effort.
4. Maintain the Success You Have Achieved
In many cases, the implementation of a security program is a resource-intensive task, but it is critical that the organization plans for the maintenance of any improvements achieved during the program. In Verve’s experience, this includes two key elements:
- A centralized OT Security Management platform that aggregates visibility, prioritization, and ability to manage assets that can significantly reduce the cost and resource requirements of securing distributed OT assets.
- A resource plan that goes beyond the initial remediation program deployment to include ongoing support and maintenance of the controls put in place.
One of our colleagues says, “Security has a tendency to rot.” His message is that there are many reasons why security programs can fail:
- Network rules put in place initially get changed during maintenance windows
- Updated patches don’t get applied
- AV signature updates get delayed
- New assets are added but never inventoried
- Backups fail and are not remediated
5. Organizational Commitment
This step is most critical in the maintenance period of the program. Security programs cannot get off the ground without the buy-in from executive leadership. Executive sponsorship verifies that OT security aligns with broader business objectives, creating a sustainable foundation for your security initiatives.
We often see many challenges occur once the program is launched and the hard work of maintaining commitment begins. Team members return to their day jobs, priorities arise, budgets reallocate, and many other obstacles can take precedence. This is where operational leaders must step forward as security champions, consistently reinforce the importance of security practices, and maintain team accountability through regular security training.
It is key that organizational commitment is more than a one-time effort. The best way to accomplish this is by aligning balanced scorecards with OT security as a focal element. This approach creates a culture of security where protection becomes everyone's responsibility, not just the security team's.
For IT/OT Security Managers, success hinges on the ongoing maintenance and support of implemented security controls. Comprehensive documentation of security processes, incident response plans, and system configurations is essential for continuity and effective knowledge transfer as teams evolve.
Success Story: Global Paper Production Safeguards 30 Mills
One of the largest global paper and packaging companies fell immune to a ransomware attack. They needed to secure vulnerabilities within 30 mills and 300 box plants while minimizing downtime and disruption. We helped them develop a comprehensive OT network segmentation strategy to strengthen cybersecurity and lower the risk of future attacks, which involved:
- A thorough assessment of existing operations
- Bespoke network segmentation for each site
- Extensive training for proper maintenance and alignment
- Resource management through Verve, a Rockwell Automation company
- Sourcing local and international equipment to address supply chain disruptions
With our help, the global paper and packing leader recovered from the ransomware attack and developed a robust defense against future threats.
Defend your critical infrastructure against targeted and non-targeted ransomware threats with wide-ranging protection.