You are on page 1of 4

INSPIRA

OT Security

In recent years, the Industrial Control Systems (ICS) as well as the cost savings derived from replacing
upon which much of our critical infrastructure and dedicated proprietary equipment with off-the-shelf
manufacturing industry depends, have come under hardware and software, come at the cost of
increasingly frequent and sophisticated cyber-attacks. increased vulnerability.
This is a consequence of the inevitable convergence
of Operational Technology (OT) with Information ICS have recently become attractive targets for
Technology (IT). As in all spheres of computing, the terrorism and STATE SPONSORED cyber-warfare with
advantages of increased network connectivity very sophisticated and advanced persistence
through open standards such as Ethernet and TCP/IP, threats.

CHANGE DRIVERS & THREAT LANDSCAPE


With big-data analytics, the industries have recognized improve automation, reduce hardware and data
that sharing and leveraging the data from ICS/OT helps centre footprints, shorter deployment times, more
business to increase productivity, reduce operation cost savings, higher performance, and less siloed IT
cost, improve an organizations proactive maintenance and OT departments and finally meet the regulatory
support model, address the skills shortage problems, ad compliance requirements

VULNERABILITIES
Due to their unique history and conception, separate
from the evolving world of IT, ICS present a number of
unique challenges:

Inherent lack of security Expanding attack surface

The “air-gap” fallacy: The superficially seductive Continued use of outdated hardware and
idea of creating an “air-gap” between the ICS software operating systems which may be
and all other networks is no longer realistic incompatible with standard modern defenses
such as antivirus software.

Use of embedded software written with scant No Encryption.


adherence to the security techniques

Insufficient regulation of component manufacture Limited access control / permission management


and supply chain

Poor network segmentation Lack of security expertise among the engineers

Infrequent updates and patching

inspiraenterprise.com
INSPIRA OT SECURITY EXPERTISE

Figure:1 Inspira OT security Reference Architecture based on Purdue Model and compliant to IEC 62443

COMPREHENSIVE MULTI LAYERED SECURITY

1. Layered firewalls with centralized management providing the below functions:

INTERNET PERIMETER IT-OT PERIMETER RUGGEDIZED SCADA

Stateful access control, URL & Stateful access control, Stateful access control,
content Filtering, Gateway SCADA/ICS protocol DPI, SCADA/ICS protocol DPI,
anti-virus, ant-malware, ant- bot, ant-malware, ant- bot, anti ant-malware, ant- bot, anti
anti -spam, IPS, VPN -spam, IPS, VPN -spam, IPS, VPN

inspiraenterprise.com
2. Anti-APT Sandbox: Capable of identifying zero day attacks and anti DDoS protection

3. Identity and Access Management: The solution comprises of LDAP, self provisioning, PIM, SSO, Multi
factor authentication (MFA) which can be integrated with existing Active directory ,

4. Physical Access control systems,

5. Uni directional gateways (data diodes)

6. Secure Remote access with zero trust firewall functions and ICS protocol visibility

7. Certificate Authority and certificate life cycle management

8. Endpoint Protection: Anti-AV, Host IPS, Anti Exploit, Endpoint detection and response, Application
whitelisting, Data loss prevention, disk and file encryption

9. Asset inventory,

10. Backup,

11. Patch management,

12. OT threat intel and ICS threat intel feeds for ICS indicators of compromise (IOC’s)

13. ICS Visibility

Real time Asset inventory ICS cyber security risk


ICS vulnerability assessment
and network visualization monitoring

100+ SCADA protocols


ICS threat and anomaly
Dashboard and reporting supported for deep packet
detection
inspection

Continuously monitor
Improve response time to Integrated with SIEM and
networks & detect
suspicious behaviour ICS Threat Intelligence
malicious activity

inspiraenterprise.com
INSPIRA SERVICES

Threat Hunting

OT Security Risk
Assessment/
Architectural
Review/ ICS Training
compliance/
Governance
Service
Real Time situation Incidence
awareness with Response
managed big data Retainer
security analytics

Vulnerability
Assessment and
Penetration
testing

Follow Us
contact_mea@inspiraenterprise.com
inspiraenterprise.com

inspiraenterprise.com

You might also like