Professional Documents
Culture Documents
OT Security
In recent years, the Industrial Control Systems (ICS) as well as the cost savings derived from replacing
upon which much of our critical infrastructure and dedicated proprietary equipment with off-the-shelf
manufacturing industry depends, have come under hardware and software, come at the cost of
increasingly frequent and sophisticated cyber-attacks. increased vulnerability.
This is a consequence of the inevitable convergence
of Operational Technology (OT) with Information ICS have recently become attractive targets for
Technology (IT). As in all spheres of computing, the terrorism and STATE SPONSORED cyber-warfare with
advantages of increased network connectivity very sophisticated and advanced persistence
through open standards such as Ethernet and TCP/IP, threats.
VULNERABILITIES
Due to their unique history and conception, separate
from the evolving world of IT, ICS present a number of
unique challenges:
The “air-gap” fallacy: The superficially seductive Continued use of outdated hardware and
idea of creating an “air-gap” between the ICS software operating systems which may be
and all other networks is no longer realistic incompatible with standard modern defenses
such as antivirus software.
inspiraenterprise.com
INSPIRA OT SECURITY EXPERTISE
Figure:1 Inspira OT security Reference Architecture based on Purdue Model and compliant to IEC 62443
Stateful access control, URL & Stateful access control, Stateful access control,
content Filtering, Gateway SCADA/ICS protocol DPI, SCADA/ICS protocol DPI,
anti-virus, ant-malware, ant- bot, ant-malware, ant- bot, anti ant-malware, ant- bot, anti
anti -spam, IPS, VPN -spam, IPS, VPN -spam, IPS, VPN
inspiraenterprise.com
2. Anti-APT Sandbox: Capable of identifying zero day attacks and anti DDoS protection
3. Identity and Access Management: The solution comprises of LDAP, self provisioning, PIM, SSO, Multi
factor authentication (MFA) which can be integrated with existing Active directory ,
6. Secure Remote access with zero trust firewall functions and ICS protocol visibility
8. Endpoint Protection: Anti-AV, Host IPS, Anti Exploit, Endpoint detection and response, Application
whitelisting, Data loss prevention, disk and file encryption
9. Asset inventory,
10. Backup,
12. OT threat intel and ICS threat intel feeds for ICS indicators of compromise (IOC’s)
Continuously monitor
Improve response time to Integrated with SIEM and
networks & detect
suspicious behaviour ICS Threat Intelligence
malicious activity
inspiraenterprise.com
INSPIRA SERVICES
Threat Hunting
OT Security Risk
Assessment/
Architectural
Review/ ICS Training
compliance/
Governance
Service
Real Time situation Incidence
awareness with Response
managed big data Retainer
security analytics
Vulnerability
Assessment and
Penetration
testing
Follow Us
contact_mea@inspiraenterprise.com
inspiraenterprise.com
inspiraenterprise.com