Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT
Posted by: Christopher Warner
In an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), Industrial Control Systems (ICS), and the Industrial Internet of Things (IIoT) is more critical than ever. The interconnectedness of these systems within energy grids, water treatment facilities, transportation networks, and manufacturing plants makes them prime targets for attackers. A successful breach can disrupt entire cities or even countries, leading to both economic and physical harm.
A multi-layered security approach is essential to defend against these threats. This approach must include technical controls, process-oriented defenses, and—perhaps most importantly—collaboration between security executives and stakeholders across an organization.
The Key Types of Security Required for Critical Infrastructure
- Physical Security: While cybersecurity often grabs the headlines, physical Security remains a foundational pillar. Unauthorized physical access to OT environments could allow an attacker to manipulate equipment directly, inject malicious code, or steal sensitive data. Traditional measures such as perimeter fences, cameras, and access control systems are vital, but increasingly, these need to be integrated with digital security controls to respond to blended threats. I would include OPSEC (Operational Security), which should be trained, supported, and tested across all personnel in your organization and Third Party Vendors (TPRM).
- Network Security: Many ICS and OT environments were originally designed as isolated, air-gapped systems. However, integrating IoT/IIoT devices and modern data collection methods has connected these systems, increasing their vulnerability to cyberattacks. This is similar to how we went here in the first place, with folks plugging this in around Y2K.
- Segmentation: Engineers or IT Security, with the support of the C-suite, should support implementing proper ICS/OT Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS) designed for industrial environments must be implemented to monitor and block suspicious traffic.
- Endpoint Security: Industrial control systems often use vendor-specific hardware such as Programmable Logic Controllers (PLCs) and Human Machine Interfaces (HMIs). Protecting these endpoints requires a combination of traditional and specialized security solutions, such as advanced malware protection, host-based firewalls, Host Intrusion Detection/Prevention Systems (HIDS/HIPS), and patch management programs. Since many devices have long lifecycles and may not receive regular updates, it’s crucial to monitor for vulnerabilities and deploy protective controls where possible.
- Identity and Access Management (IAM): Managing who has access to critical systems is one of the most important security controls. Role-based access, multi-factor authentication (MFA), and privileged access management (PAM) solutions are essential to prevent unauthorized access. This is particularly critical in an environment where third-party vendors, contractors, and internal staff may all need different levels of access to OT systems.
- Supply Chain: Security Critical infrastructure relies heavily on a complex supply chain for both hardware and software. Each vendor, partner, or subcontractor represents a potential security risk. Supply chain security must include vetting vendors, conducting security assessments, and continuously monitoring for vulnerabilities or compromises within the broader ecosystem. Implementing standards such as the NIST Cybersecurity Framework (CSF) and ISO/IEC 27001 can help ensure supply chain security.
- Incident Response and Recovery: No system is entirely immune to breaches. Therefore, having a robust Incident Response Plan (IRP) is non-negotiable. This includes setting up protocols to detect, analyze, and respond to incidents in real time and outlining steps for recovery to minimize downtime. For industrial environments, this may also mean building redundancies and safety systems to mitigate the physical impact of cyber incidents.
- Safety and Risk Management: Beyond security, safety systems need to work in tandem with cybersecurity controls. Standards like ANSI/RIA, HAZOPS, Risk and Security frameworks help organizations minimize the risks posed by equipment malfunctions or process disruptions. Safety assessments, such as Hazard and Operability Studies (HAZOPS), should consider cybersecurity risks alongside traditional physical safety concerns, especially in industries where malfunctioning equipment can pose a threat to human life.
- Data Privacy and Security: With the advent of IIoT, more and more data is being collected in industrial environments. Whether it’s operational data or personally identifiable information (PII), organizations need to ensure that this data is protected. Implementing encryption, data loss prevention (DLP) solutions, and secure data storage practices can help safeguard critical data from theft or exposure.
The Need for Collaboration: A Unified Approach
While these security measures are essential, no single type of control is enough to fully protect critical infrastructure. The most effective defense strategy for OT, ICS, and IIoT environments is a collaborative, holistic approach that involves multiple stakeholders across the organization. This is where security executives—CSOs, CISOs, CIOs, CTOs—and operational leaders need to come together.
Breaking Down Silos
Historically, IT and OT have operated in silos. IT departments were responsible for network security and data protection, while OT teams focused on maintaining uptime and physical processes. However, with the convergence of IT and OT systems, these silos are no longer sustainable. Both teams need to work together to secure the entire ecosystem.
Security leaders must foster communication between different departments, ensuring that IT and OT teams collaborate on implementing security solutions. This includes sharing intelligence on potential threats, coordinating responses to incidents, and aligning on long-term security strategies.
Engaging Leadership and Stakeholders
Top-down support is critical for a unified security approach. Without executive buy-in, security programs often falter due to a lack of funding, prioritization, or cross-departmental coordination. Security executives must engage leadership early and often, providing clear insights into the risks faced by the organization and the importance of collaborative security measures.
Stakeholders, including engineers, operators, and external vendors, should be involved in developing security protocols and incident response plans. After all, those on the front lines of protecting our nation’s infrastructure can provide invaluable insight into potential vulnerabilities and practical solutions.
Adopting Industry Standards
Organizations should adopt frameworks to adhere to their internal and external regulatory entities. Some widely accepted industry standards such as the ISA/IEC 62443 series, NIST CSF, 800-53, 800-82 CIS 20 (18 now, I believe), SANS 5 (we like this one!). Then your regulators such as NERC-CIP, AWWA, TSA, HIPAA, GDPR, and several global privacy laws and US State laws that I’ve dealt with.
The frameworks do provide a decent blueprint for regulatory compliance, which is becoming increasingly important in critical infrastructure sectors. Start with performing a security program review to see where you stand in your security journey. Identify low-hanging fruit, major leaks in the damn, and identify your crown jewels. From there, build Incident Response Plans, War Game it!
Conclusion: Collaboration Is the Key to Success
Securing critical infrastructure in the digital age is no small feat, but it’s a challenge that can be met with the right combination of security controls and stakeholder collaboration. By breaking down silos, engaging leadership, and aligning on common security frameworks, organizations can build a robust, resilient defense against both current and emerging threats. The Security of OT, ICS, and IIoT systems doesn’t rest solely on the shoulders of the IT department. It’s a shared responsibility that requires ongoing cooperation between security executives, operational leaders, engineers, and external partners. Only by working together can we ensure that critical infrastructure remains secure, even in the face of ever-evolving cyber threats.
Christopher Warner
Senior Security Consultant - OT,
GuidePoint Security
Chris Warner has over 25 years of experience in operational technology (OT), IT, and Cyber-Physical Systems, having roles as an assessor, integrator, advisor, and thought leader across all 16 Critical Infrastructure Sectors.
Chris has significant experience leading various Information Security services, including security program reviews, governance, risk, and compliance (GRC) assessments, security program development, policy creation, and various advisory services to help organizations establish a unified view of risk.
Chris has earned a Master of Business Administration (MBA e-business), a Master of Arts in Organizational Management, a Bachelor of Science in Business Management, an Associate in Avionics Engineering and the OPSWAT OT Security Expert Certification. Additionally, Chris is a USAF, Disabled Veteran, a veteran member of InfraGard, and has held Tier 5 Top Secret/SCI/Q/Polygraph with Lifestyle clearances. Currently, Chris holds a Secret Clearance with the FBI and CISA.