How to Effectively Address Vulnerabilities in IIoT Networks
IIoT devices operate over both “dedicated” connections and 4G or 5G cellular networks, Oswal says, so securing these networks requires a comprehensive approach. This includes a Zero Trust security model, which involves segmented “least privilege” policies that determine which machines can communicate.
“understanding the asset management of all your devices, ensuring that every connection from an IIoT device to the outside world is initially least privileged and is constantly monitored for attackers deploying command and control (C2, or C&C) infrastructure,” Oswal says.
Attacks on IIoT systems highlight the dangers of ecuador mobile database third-party systems to access and infiltrate malware, Trowell says. To address vulnerabilities in IIoT networks, he says, organizations need real-time communications and an accurate inventory of assets. “Not only will this allow teams to know if something is down, but they will also be able to monitor the type of traffic flowing through the network to ensure that traffic is not coming from outside the network and that nothing can get into the network,” Trowell says.
Asset inventory is especially important when industrial devices or endpoints are supplied by different manufacturers, Oswal notes. Organizations can use both commercial monitoring systems and open-source tools to achieve this.
“Attack surface management (ASM) tools can be a big help here,” says Trowell. He recommends conducting ongoing testing of assets to identify vulnerabilities in the network and gain insight into the attack surface. “Given the criticality of these networks, an ASM solution that has a penetration testing component or works in conjunction with a pentesting program is ideal,” he says.
Once network managers have visibility into devices in the IIoT network, they should use automation to dynamically implement segmentation processes, Oswal advises. Segmentation is also one step in implementing a zero-trust policy, which includes the principle of least privilege, he says.
A comprehensive approach also involves
-
- Posts: 730
- Joined: Mon Dec 23, 2024 3:13 am