Download document () of 20
Eaton-blog_cybersecurity_protection goals_1500_100.jpg

Cybercriminals and other attackers are increasingly targeting industrial facilities and critical infrastructure. In doing so, they are exploiting the attack surfaces created by the merging of industrial operating and classic information technologies (OT-IT convergence). The cyber threat to control and automation systems requires an adaptation of the interpretation in terms of the protection goals applicable to IT security: This is because it can result not only in immense economic harm, but also - especially with regard to critical infrastructures - in serious consequences for people and the environment.

 

Are information security and IT security the same thing?

With the growing cyber threat to industrial facilities, the classic protection goals for IT security are also changing. While IT security refers to the protection of technical systems, information security is more generally concerned with the protection of information - which, is also available on paper, for example. The two terms are often used synonymously, although strictly speaking information security is an area that is prioritized over IT security.

Which protection goals are part of IT security?

In the IT landscape, protecting data and systems is the ultimate goal of IT security. The following IT protection goals are mainly deployed in order to ward off corresponding threats:

icon_Linkedin_colored_256x256.png

Follow #EatonMachine on LinkedIn

Get every important blog post or new information Eaton is pulishing for machine and systembuilders. 

  • Confidentiality: Data may be accessed only by authorized users in the intended and permitted manner.
  • Integrity: Data, system functions and operating statuses must not be changed or impaired without being detected.
  • Availability: System failures should be minimized and lie within a predefined frame. Therefore, the use of the system should be ensured as intended.

In addition, other protection goals can be pursued. Examples include authenticity - the authenticity, verifiability and trustworthiness of an object or actor - or accountability, in which actions should be clearly assigned to the communication partners involved and proven.

While the focus of traditional IT security is on ensuring the confidentiality and integrity of data through strict access control and data encryption, the key security objectives for industrial control systems (ICS) are usually availability, integrity and authenticity.

Which cyber threats need to be considered?

Attackers today use a variety of different attack vectors, paths and approaches to gain access to a device or control network. Potential pathways for an attack on a network include:

  • External actors (both people and devices) accessing the network via the Internet.
  • Infected laptops that can access the network behind the firewall.
  • Infected USB sticks and PLC logic programs.
  • Compromised supply chains where attackers can infiltrate backdoors through malicious firmware and configurations.
  • Internal users with insufficient knowledge and training about cyber threats.
  • Internal users compromised through social engineering.

 

How does ISO/IEC 27001 (DIN 27001) help?

Clear guidelines for planning, implementing, monitoring and improving information security are provided by ISO/IEC 27001. This is a leading international standard for information security management systems (ISMS) and therefore an important standard for certification related to IT security. The implementation of this standard helps to defend against cyberattacks and protects the company from outages, loss of information and their consequences. With ISO/IEC 27001, information security and IT security can be optimized in a systematic and structured manner. In order to achieve this, the standard not only describes the requirements for setting up, realizing, operating and improving an IMSM, but also includes requirements for assessing and dealing with cyber threats, and always based on the specific needs of a company.

 

What is an information security management system?

An information security management system is a framework for defining rules and procedures to ensure, verify, and improve information security. This means that it is not a software tool or anything similar. An ISMS provides methods for identifying and assessing risks relevant to the company, defining security objectives, and also defining and documenting responsibilities, communication channels, systems, and processes.

 

What does the BSI's IT Baseline Protection mean?

The IT Baseline Protection developed by the German Federal Office for Information Security (BSI) is a proven standard for setting up an ISMS. In Germany, it is considered the guideline for information security.

IT Baseline Protection provides a technical foundation and a comprehensive working tool for information security. A comprehensive approach is central to this: in addition to technical aspects, infrastructural, organizational and personnel issues are also considered. In this way, necessary security measures can be systematically identified and implemented. The BSI standards provide proven procedures for this, while the IT Baseline Protection Compendium provides specific requirements. This allows an ISMS to be implemented in a company.

Based on the standards of the BSI, HiSolutions AG, a consulting company for security and IT management, has created a recommended checklist for IT security. This is aimed primarily at small and medium-sized enterprises for which the introduction of a complete ISMS seems disproportionate. Although the checklist cannot replace a methodical comprehensive IT security concept, it is an implementation aid for all those for whom a comprehensive security concept is not (yet) available or is difficult to implement. For various subject areas (organization, employees, protection against malware and attacks ...), the most important requirements are named, with which information security can be influenced positively in a significant way.

 

Conclusion

Securing IT infrastructures is a complex task that requires a methodical approach. To achieve the IT protection goals, an ISO/IEC 27001 approach and the establishment of an information security management system are recommended. Eaton describes in the white paper "Cybersecurity considerations for industrial control systems". which measures users must take to protect industrial control systems and automation components in particular from cyberattacks and how manufacturers develop "secure" products.

Learn more about cybersecurity

To protect industrial control systems from the increasing number of cyber attacks, a multi-layered 'defense-in-depth' defense is required. The last line of defense here is automation components and devices. Eaton describes the steps users must take to protect industrial controls and automation components from cyberattacks and how Eaton develops 'secure' products in this white paper.

Related posts