iot-ot and it security convergence · an ot (or iot) approach that says: "we own the...

26
CONFIDENTIAL AND PROPRIETARY This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. IoT-OT and IT Security Convergence Ruggero Contu Research Director Gartner

Upload: others

Post on 02-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

CONFIDENTIAL AND PROPRIETARYThis presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

IoT-OT and IT Security Convergence

Ruggero Contu

Research Director

Gartner

Page 2: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

1 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

By 2020, over 25% of identified attacks in enterprises will involve IoT, though IoT will account for less than 10% of IT security budgets

Strategic Planning Assumption

Page 3: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

2 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Cyberphysical SecurityCan Be

a Matter of Life or Death

Page 4: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

3 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Key Issues

1. What organizational and cultural challenges is the convergence between IoT-OT and IT security bringing?

2. What are the security processes and approaches needed to cater for specific requirements and also for the diversity of ecosystems?

3. What technology should you consider?

Page 5: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

4 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Key Issues

1. What organizational and cultural challenges is the convergence between IoT-OT and IT security bringing?

Page 6: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

5 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Our View of Security Will Change (Whether We Like It or Not)

Digital Security

Information Security

IT Security

OTSecurity

PhysicalSecurity IoT Security

Cyber-security

Page 7: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

6 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Operational technology "Traditional" IT

Consumer technology Business technology

Be Prepared for Blurring of Roles, Decision Rights and Authority

Workplace applications

Business applications

Mobile systems and applications

Hosted servicesBI

Back-office applications

Social networking

Collaboration

Dashboard

Energy management

systems

Business processes

Production information

management

Networking

GovernancePerformance

Reliability and riskSecurity

Budget and asset management

Asset analysis

Meters and sensors

HVAC control

systems

Media players

Email

Page 8: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

7 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Cultural Differences=Different Priorities

Culture of Engineers: Reliability and safety, fault tolerance, determinism, consistency and longevity.

Solution Approach: Find example, iteratively optimize for performance and use, lockdown.

Culture of IT: Frequent change, shorter lifetimes for products and systems, user or customer convenience and "the user experience".

Solution Approach: Develop standards, assess requirements, build/buy best fit at lowest cost, plan for upgrades and support.

Page 9: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

8 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

What IT Can Learn From Engineers?

Physics matter … the physical world always gets in the way. Real time, means real time. Physical security should always be part of a

cybersecurity solution. Things wear out, and asset reliability will save

you. There is no such thing as greenfield, it's brown

at best. Learn to live with the old.

Page 10: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

9 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

What Engineers Can Learn From IT

Governance and policy for support infrastructure have value

Continuous asset and threat awarenesshave value

Improperly managed IT impacts stability, putting safety and reliability at risk

IT can prepare OT for pace of technology change

Use tools and processes to manageconstant software change

Page 11: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

10 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

An IT approach that says we need to control what gets bought, and how it is deployed, will fail.

An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail.

To take on responsibility, and share:Governance, standards, platforms, security, SLA.

Alignment on these is critical.

Move From "Ownership" to Share Responsibilityand Accountability

Page 12: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

11 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Digital Security Requires a Revised View of Organization

Security system and local operationsSecurity system and local operations

AdministrationImplementationIncident responsePatch managementChange managementIdentity/Access management

AnalyticsDesign

MonitoringProject management

Risk/Threat assessmentVulnerability assessment

AccountabilityMediation/Arbitration forum

Resource allocation, strategic planMonitor operational performance

Security engineering and management

Security engineering and management

ArchitectureAwareness, education

Testing, assurance

Program managementPolicy development, implementation

Chief security officer

Steering committee

Security governance Security governance

Risk managementRisk management

Security manager(s)

AwarenessProcedures developmentLocal policy enforcement

SLA monitoring, complianceExternal services management

Page 13: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

12 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Key Issues

1. What are the security processes and approaches needed to cater for specific requirements and also for the diversity of ecosystems?

Page 14: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

13 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

OT Has Its Own Unique Security Needs

• Heterogeneous• Continuous• Reliable• Physical• Focused

Graphic source: canstockphoto.com

Page 15: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

14 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

• Safety is an absolute• Time is a critical parameter

when measuring and controlling mission-critical processes

• Real time is measuredin milliseconds

• Resilience: That "fail-safe"is a design practice

It All Starts (and Ends) With Safety

Page 16: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

15 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Key Approaches

Show discipline in design Adhere to standards Identify and address dependencies Build independent operations Test, test, test — and then test Leverage the supply chain

Page 17: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

16 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Asset Management Key

What do we own and where is it? What's it worth? What condition is it in? What do we need to do to it? When do we need to do it? How much money do we need? How do we achieve sustainability?

(aka: What can IT learn from ISO 55000 (physical) asset management and apply to ISO 27036)

Page 18: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

17 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Risk-Resilient Balance for the Integrated Organization

Governance Compliance Control Protection

Reliability Speed Assurance Transparency

RISK RESILIENCE

PrivacySafety

ValueCost

Page 19: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

18 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Key Issues

1. What technology should you consider?

Page 20: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

19 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

What Engineers Know About IoT and OT Vendor Risks

Many start-ups=risks IT vendors increasing

partnerships in OT areas.OT vendors are exploring IT

techniques

Page 21: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

20 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Securing Old and Diverse Systems — Back to the Future!

Learning to live with a hybridold-new product set Prepare for a new breed of vendors

— and an old set of vendors Beware of vendors limitations The supply chain issue

Page 22: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

21 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

a Very Fragmented MarketSample List Security Providers

Platform Providers

Industry Specialists

i.e., Automotive

OT SecurityOTSecurity

Page 23: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

22 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

a Very Fragmented MarketSample List Security Providers

Chip-Based Security

Traditional IT Security

Background

Cross-Platform

IoT Security

Page 24: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

23 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

OT Security Controls Approaches

•Monitoring and response: Anomalies detection with provision of functions to permit response to them.

•Network segmentation: Managing data flow between defined networks, ie firewalls and unidirectional gateways, and products that aid in keeping that data flow secure.

•Access control: Controls to manage access of users to systems or one system to another system. This includes identity and access management, remote access and privileged access management.

•Endpoint protection: Protection of endpoints, including devices besides PCs or mobile devices, ie anti-malware, personal firewall, port and device control, memory protection, and related capabilities

Page 25: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

24 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Find the OT environments and stakeholders in your organization. What are their roadmaps and plans (hint: this isn’t likely your CIO)

Assess your current state of OT security using qualified sources. Expand your IT security planning to include OT / IoT

security requirements (and vice versa) Identify your IT/OT security supply chain. Leverage OT security principles in IT where applicable.

Recommendations

Page 26: IoT-OT and IT Security Convergence · An OT (or IoT) approach that says: "We own the technology and make the decisions, but then you guys deal with the implications ..." will fail

25 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.

Select OT security products via a formal assessment that addresses reliability and safety concerns of OT production and operations.

Establish OT security governance, strategy and management via a combined IT/OT security practice that can evaluate and manage both IT and OT security products.

Focus on key areas of OT security, such as network segmentation, access management, and anomaly detection and response.

Ensure OT engineers participate in OT security policy development and requirements setting.

Include training programs for IT security team members in OT skills. .

Recommendations